Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing.
Chunxiang XuXiaohu HeDaniel Abraha-WeldemariamPublished in: ICICA (2) (2012)
Keyphrases
- data storage
- cloud computing
- data management
- security issues
- cloud computing environment
- data integrity
- sensitive data
- cloud storage
- database management systems
- security protocols
- data privacy
- statistical databases
- computing resources
- data center
- access control
- big data
- data access
- service providers
- computing infrastructure
- database systems
- databases
- cloud services
- encrypted data
- information security
- security analysis
- security mechanisms
- application development
- data warehouse
- database
- business models
- query processing
- windows azure
- storage devices
- intrusion detection
- security requirements
- security policies
- hash functions
- virtual machine
- b tree
- cloud platform