Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
Wenting ShenJing QinJia YuRong HaoJiankun HuPublished in: IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
- data sharing
- cloud storage
- encryption scheme
- ciphertext
- sensitive information
- sensitive data
- data protection
- protect sensitive
- private data
- data privacy
- encrypted data
- privacy protection
- standard model
- third party
- security analysis
- cloud computing
- data access
- privacy preserving
- data integration
- peer to peer
- distributed data
- information sharing
- encryption algorithm
- original data
- private information
- differential privacy
- file system
- digital libraries
- secret key
- signature scheme
- distributed computing
- databases
- service providers
- data model