On the Security of Three Public Auditing Schemes in Cloud Computing.
Yang MingYumin WangPublished in: Int. J. Netw. Secur. (2015)
Keyphrases
- cloud computing
- security issues
- cloud computing environment
- cloud storage
- data privacy
- identity management
- distributed computing
- statistical databases
- network access
- access control
- computing resources
- cloud services
- computing infrastructure
- remote attestation
- trusted computing
- data management
- information security
- security mechanisms
- big data
- data center
- service providers
- business models
- security policies
- computing platform
- cloud computing platform
- computing technologies
- computer security
- security requirements
- virtual machine
- key management
- grid computing
- network security
- power consumption
- intrusion detection
- mobile devices
- private cloud
- cloud infrastructure
- databases