What is it about?
In order to audit data integrity instead of retrieving the entire outsourced data from the cloud. We use the chameleon authentication tree structure to improve audit efficiency.
Photo by Markus Spiske on Unsplash
Why is it important?
We designed a new type of audit protocol using chameleon hash, which effectively reduces the recalculation of node hashes caused by dynamic data updates and supports virtual node settings.
Read the Original
This page is a summary of: Efficient audit protocol supporting virtual nodes in cloud storage, Transactions on Emerging Telecommunications Technologies, March 2020, Wiley, DOI: 10.1002/ett.3911.
You can read the full text:
The following have contributed to this page