Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public cloud storage
biblio
A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service
Submitted by grigby1 on Thu, 09/26/2019 - 9:42am
secret sharing
potential alternative
pubcrawl
public cloud data storage services
public cloud storage
public cloud storage service
Rabin's IDA output files
resilience
Resiliency
seamless secret sharing scheme implementation
Secret key
original file
Secure File Sharing
securing data
security
Servers
Shamir's SSA
short term
storage management
targeted file
targeting ordinary nontechnical users
Human behavior
Cloud Computing
Complexity theory
composability
Cryptography
data privacy
data security concern
defined public cloud storage services
defined service providers
file protection
free plans
authentication key
Human Factors
information dispersal
internet
local secure key-store
low-cost digital data
metadata
Metrics
nontechnical user
Organizations
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:24am
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
Identity-based remote data possession checking in public clouds
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
certificate management elimination
Cloud Computing
cloud server
Cryptographic Protocols
data outsourcing
ID-RDPC protocol
identity-based RDPC protocols
identity-based remote data possession checking protocol
PKI setting
public cloud storage
public key cryptography
public key infrastructure
spam
standard computational Diffie-Hellman problem
storage management
unsolicited e-mail