Cryptanalysis of an integrity checking scheme for cloud data sharing.
Yuan ZhangChunxiang XuJining ZhaoXiaojun ZhangJunwei WenPublished in: J. Inf. Secur. Appl. (2015)
Keyphrases
- data sharing
- integrity checking
- integrity constraints
- data access
- distributed data
- data integration
- deductive databases
- information sharing
- hard and soft constraints
- peer to peer
- semantic interoperability
- constraint logic programming
- cloud computing
- private data
- hash functions
- data mining
- database applications
- management system
- data model
- multimedia
- secret key
- decision making