Skip to main navigation Skip to search Skip to main content

A Public Auditing Scheme with Data Recovery

  • Tsu Yang Wu
  • , Chien Ming Chen*
  • , King Hang Wang
  • , Jimmy Ming Tai Wu
  • , Jeng Shyang Pan
  • *Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

Abstract

In order to solve the integrity verification of outsourced file in cloud, we based on the concept of regenerating code (RC) to propose a new public auditing scheme with data recovery in this paper. With the advantage of RC, our scheme provides a (k,n) recovery functionality, i.e., only encoded data blocks from any k cloud servers, user can recover the original data files, where n denotes the total number of cloud servers and k ≤ n.

Original languageEnglish
Title of host publicationGenetic and Evolutionary Computing
Subtitle of host publicationProceedings of the Twelfth International Conference on Genetic and Evolutionary Computing, December 14-17, Changzhou, Jiangsu, China
EditorsJeng-Shyang Pan, Shih-Pang Tseng, Bixia Sui, Jerry Chun-Wei Lin
PublisherSpringer
Pages595-602
Number of pages8
ISBN (Electronic)9789811358418
ISBN (Print)9789811358401
DOIs
Publication statusPublished - 11 May 2019
Event12th International Conference on Genetic and Evolutionary Computing, ICGEC 2018 - Changzhou, China
Duration: 14 Dec 201817 Dec 2018
https://link.springer.com/book/10.1007/978-981-13-5841-8

Publication series

NameAdvances in Intelligent Systems and Computing
Volume834
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365
NameICGEC: International Conference on Genetic and Evolutionary Computing

Conference

Conference12th International Conference on Genetic and Evolutionary Computing, ICGEC 2018
Abbreviated titleICGEC 2018
Country/TerritoryChina
CityChangzhou
Period14/12/1817/12/18
OtherConference Proceedings
Internet address

User-Defined Keywords

  • Bilinear pairing
  • Data recovery
  • Public audit
  • Regenerating code

Fingerprint

Dive into the research topics of 'A Public Auditing Scheme with Data Recovery'. Together they form a unique fingerprint.

Cite this