Login / Signup
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage.
Cheng-Ta Huang
Cheng-Yu Yang
Chi-Yao Weng
Yen-Wen Chen
Shiuh-Jeng Wang
Published in:
ICCCS (2019)
Keyphrases
</>
data sources
data quality
data analysis
xml documents
end users
cloud storage
cloud computing
similarity search
data distribution
original data
computing resources
sensitive data
security analysis