Integrity checking protocol with identity-based proxy signature in mobile cloud computing

Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an ident...

Full description

Saved in:
Bibliographic Details
Main Authors: Li YAN, Run-hua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, Yan XU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015232/
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items