On the Security of a Cloud Auditing Storage Protocol.
Xu An WangXindi MaZhiwei ZhangJindan ZhangPublished in: INCoS (2023)
Keyphrases
- cloud storage
- inference control
- cloud computing
- statistical databases
- security protocols
- access control
- cryptographic protocols
- authentication protocol
- security properties
- key agreement protocol
- security model
- security analysis
- ban logic
- remote server
- communication protocols
- security issues
- key exchange protocol
- formal analysis
- cloud computing environment
- malicious code detection
- privacy preserving
- information security
- file transfer
- rfid systems
- mobile payment
- file system
- cloud services
- mutual authentication
- secure multiparty computation
- lightweight
- security requirements
- key distribution
- physical layer
- denial of service attacks
- diffie hellman
- semi honest
- computing infrastructure
- encrypted data
- data storage
- protocol specification
- security services
- security policies
- security mechanisms
- intrusion detection
- homomorphic encryption
- mobile agent system
- network layer
- secure routing
- virtual private network
- database management systems
- messages exchanged
- network security
- trusted third party
- provably secure
- network management
- rfid tags
- encryption algorithm
- application layer
- privacy protection
- elliptic curve