Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Lingwei SongJinxia WeiLicheng WangChenlei CaoXinxin NiuPublished in: Concurr. Comput. Pract. Exp. (2016)
Keyphrases
- storage management
- key distribution
- key management
- provably secure
- cryptographic protocols
- authentication protocol
- security protocols
- fault tolerant
- signature scheme
- database management
- blind signature
- data access
- diffie hellman
- encryption scheme
- oracle database
- data placement
- relational database systems
- database systems
- blind signature scheme
- secret key
- session key
- standard model
- data storage
- cloud computing
- security analysis
- data management
- wireless sensor networks
- database
- storage devices
- elliptic curve
- security model
- ad hoc networks
- flash memory
- distributed environment
- integrity constraints
- database management systems