Provable Data Possession at Untrusted Stores.
Giuseppe AtenieseRandal C. BurnsReza CurtmolaJoseph HerringLea KissnerZachary N. J. PetersonDawn SongPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- data collection
- database
- data sets
- synthetic data
- data points
- data sources
- data processing
- data structure
- knowledge discovery
- training data
- statistical analysis
- attribute values
- original data
- experimental data
- data distribution
- sensitive data
- noisy data
- historical data
- application domains
- cloud computing
- decision trees
- data mining