The verifiable secure schemes for resisting attacks in cloud deduplication services.
Xuan LiYongluo ShenJun ZhangPublished in: Int. J. Grid Util. Comput. (2016)
Keyphrases
- private cloud
- cryptographic protocols
- cloud computing
- security mechanisms
- security protocols
- cryptographic algorithms
- security services
- identity management
- secure routing
- secret sharing
- stream cipher
- cloud services
- user privacy
- service providers
- chosen plaintext
- public key infrastructure
- cloud platform
- web services
- watermarking algorithm
- computing infrastructure
- service oriented
- security risks
- key agreement
- security requirements
- key management scheme
- access control
- security architecture
- protection mechanisms
- security measures
- cloud storage
- security threats
- electronic payment
- countermeasures
- protection schemes
- end users
- wireless sensor networks
- unauthorized access
- key management
- security analysis
- authentication protocol
- service level agreements
- security properties