Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication cost
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Attribute-based proxy re-encryption method for revocation in cloud storage: Reduction of communication cost at re-encryption
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
revoked users
easy storage
huge communication costs
hybrid encryption scheme
matching attributes
privacy concerns
Proxy re-encryption
proxy re-encryption method
revocation
data privacy
Syalim encryption scheme
symmetric encryption scheme
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
AES key
Scalability
Servers
Access Control
Cryptography
Data Security
encryption
abe
advanced encryption standard
Cloud Computing
attribute-based encryption
Attribute-Based Encryption (ABE)
Big Data
cloud storage
communication cost
Computational efficiency
data owner
biblio
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
lost attack
verification stage
tamper attack
storage management
Servers
Scalability
Resiliency
remote data integrity checking protocols
quantum computer attacks
public key cryptography
pubcrawl
provably secure
Protocols
matrix-vector multiplication
matrix multiplication
matrix-matrix multiplication
Cloud Computing
Lattices
lattice-based constructed cryptography
Identity management
identity-based remote data integrity checking protocol
ID-Based cryptography
Human behavior
data privacy
Data models
data integrity checking
data integrity
Cryptography
Cryptographic Protocols
communication cost
cloud storage
cloud service provider attack