Skip to main content

and
  1. No Access

    Article

    Public auditing of log integrity for shared cloud storage systems via blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Wireless Networks (2020)

  2. No Access

    Article

    Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain

    Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...

    Hui Tian, Jia Wang, Chin-Chen Chang, Hanyu Quan in Mobile Networks and Applications (2023)