Security weakness in the Proof of Storage with Deduplication.
Young-joo ShinJunbeom HurKwangjo KimPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security issues
- storage and retrieval
- security requirements
- access control
- information assurance
- storage requirements
- statistical databases
- information security
- intrusion detection
- security problems
- security policies
- security threats
- functional requirements
- security mechanisms
- record linkage
- computer security
- cloud storage
- databases
- database
- data storage
- information systems
- network security
- data management
- security protocols
- storage area network
- remote server
- neural network
- database systems
- security systems
- data security
- network management
- data cleaning
- random access
- theorem prover
- sensitive data
- theorem proving