Sign in

Secure Protocol for Identity-based Provable Data Possession in Cloud Storage.

Cheng-Ta HuangCheng-Yu YangChi-Yao WengYen-Wen ChenShiuh-Jeng Wang
Published in: ICCCS (2019)
Keyphrases
  • data sources
  • data quality
  • data analysis
  • xml documents
  • end users
  • cloud storage
  • cloud computing
  • similarity search
  • data distribution
  • original data
  • computing resources
  • sensitive data
  • security analysis