How to achieve non-repudiation of origin with privacy protection in cloud computing.
Wei WuJianying ZhouYang XiangLi XuPublished in: J. Comput. Syst. Sci. (2013)
Keyphrases
- cloud computing
- privacy protection
- trusted third party
- data center
- computing resources
- cloud computing environment
- service providers
- privacy preserving
- data management
- sensitive information
- data privacy
- business models
- data sharing
- information loss
- cost effective
- private information
- cloud computing platform
- security issues
- statistical databases
- database systems
- data sets