Verification of an image morphing based technology for improving the security in cloud storage services.
Ryota HanyuKazuki MurakamiQiangfu ZhaoPublished in: ISIC (2014)
Keyphrases
- cloud storage
- cloud services
- image morphing
- cloud computing
- cloud infrastructure
- service providers
- computing resources
- distributed computing
- web services
- context aware
- cost effective
- ciphertext
- mobile services
- service oriented
- information security
- file system
- data center
- third party
- data management
- information systems
- databases
- database
- security requirements
- information sharing
- intrusion detection