Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

DIA-MTTP high-level architecture.

More »

Fig 1 Expand

Table 1.

Notations used in the design of DIA-MTTP.

More »

Table 1 Expand

Table 2.

Math equations for tag generation.

More »

Table 2 Expand

Fig 2.

Distributed M2T data structure.

More »

Fig 2 Expand

Fig 3.

DIA-MTTP: Functional blocks, components and entities.

More »

Fig 3 Expand

Fig 4.

The D3U architecture.

More »

Fig 4 Expand

Fig 5.

The D3U protocol suite.

More »

Fig 5 Expand

Fig 6.

D3U protocol: Sub-protocols and their messages.

More »

Fig 6 Expand

Fig 7.

The LoA1DV architecture.

More »

Fig 7 Expand

Table 3.

Math equations for public verification.

More »

Table 3 Expand

Fig 8.

The LoA1DV protocol suite.

More »

Fig 8 Expand

Fig 9.

LoA1DV protocol: Sub-protocols and their messages.

More »

Fig 9 Expand

Fig 10.

The LoA2DV architecture.

More »

Fig 10 Expand

Table 4.

Math equations for private verification.

More »

Table 4 Expand

Fig 11.

The LoA2DV protocol suite.

More »

Fig 11 Expand

Fig 12.

LoA2DV protocol: Sub-protocols and their messages.

More »

Fig 12 Expand

Fig 13.

The DU architecture.

More »

Fig 13 Expand

Fig 14.

The DU protocol suite.

More »

Fig 14 Expand

Fig 15.

DU protocol: Sub-protocols and their messages.

More »

Fig 15 Expand

Table 5.

Cryptographic operations and their computational time (in seconds).

More »

Table 5 Expand

Fig 16.

Data corruption probability vs the number of requested blocks under different detection probabilities.

More »

Fig 16 Expand

Table 6.

Number of encrypted data blocks and their associated tags: With/without the data deduplication approach.

More »

Table 6 Expand

Fig 17.

Computational cost of the user in the D3U vs the number of data blocks.

More »

Fig 17 Expand

Fig 18.

Computational cost of the user in D3U vs the number of redundant data blocks (K = 1000, using Exp2).

More »

Fig 18 Expand

Fig 19.

Computational cost of the leader provider in the D3U vs the total number of data blocks in the file.

More »

Fig 19 Expand

Fig 20.

Computational cost of the leader provider in D3U: With/without the data deduplication approach.

More »

Fig 20 Expand

Fig 21.

Computational cost of the providers (Leader and non leaders) in D3U: With/without the hierarchical approach.

(K = 1000 data blocks).

More »

Fig 21 Expand

Fig 22.

Communication cost of the user in D3U: With/without data deduplication.

More »

Fig 22 Expand

Fig 23.

Communication cost of the user in D3U: Hierarchical approach vs non-hierarchical approach.

(K = 1000).

More »

Fig 23 Expand

Fig 24.

Communication costs for the providers vs the number of data blocks: With/without a hierarchical approach.

(n = 6 PCSes, * is Non-Hierarchical approach).

More »

Fig 24 Expand

Fig 25.

Communication cost incurred by the leader provider regarding the number of data blocks and PCSes.

More »

Fig 25 Expand

Fig 26.

Computational cost of PCS in LoA1DV: With/without nonces.

More »

Fig 26 Expand

Fig 27.

Communication cost of the L-TPA in LoA1DV vs the TPAs and the number of data blocks.

(|En_DB| = 0.025 KB and |DBTag| = 0.032 KB).

More »

Fig 27 Expand

Fig 28.

Communication cost of the L-TPA in LoA1DV against the number of data blocks.

(* is Key-based approach, n = 2).

More »

Fig 28 Expand

Fig 29.

Computational costs for the leader provider and the non leader provider in LoA1DV and LoA2DV vs the number of data blocks.

(n = 20).

More »

Fig 29 Expand

Fig 30.

Communication cost for the user in LoA1DV and LoA2DV.

(* the NonKey-based approach, and C = 20 data blocks).

More »

Fig 30 Expand

Fig 31.

Communication cost for the leader provider and the non leader provider in LoA1DV and LoA2DV.

(C = 100, n = 2, |m| = |G1| = 0.032 KB, considering only the proofs cost).

More »

Fig 31 Expand

Fig 32.

Communication cost of the non leader provider in LoA1DV and LoA2DV vs the data block number.

More »

Fig 32 Expand

Table 7.

Computational cost of tag generation against different sizes of data file and data block (in seconds).

More »

Table 7 Expand

Fig 33.

Communication costs of the L-TPA and the non leader TPA in LoA1DV and LoA2DV.

(n = 10, |m| = |G1| = 256 bits, |p| = 200 bits, using Key-based approach).

More »

Fig 33 Expand

Fig 34.

Computational cost of the user in DU vs the number of data blocks.

More »

Fig 34 Expand

Fig 35.

Storage cost at the TPAs: With/without the collaborative verification approach.

(10 TPAs, |n2| = 0.256 KB).

More »

Fig 35 Expand

Fig 36.

Storage cost for the DIA-MTTP entities with a different number of data blocks.

(10 TPAs, |m| = |G1| = 0.032 KB, |n2| = 0.256 KB, * without the collaborative verification approach).

More »

Fig 36 Expand

Fig 37.

Storage cost for each entity in the DIA-MTTP: With/without data deduplication.

(The redundancy data rate 20%).

More »

Fig 37 Expand

Table 8.

Comparing the DIA-MTTP with existing DIAs against the functional, security and reliability requirements in requirement specification section.

More »

Table 8 Expand

Table 9.

Comparing the DIA-MTTP with existing works against the efficiency requirements in section.

More »

Table 9 Expand