Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure cloud storage
biblio
POROS: Proof of Data Reliability for Outsourced Storage
Submitted by aekwall on Mon, 11/25/2019 - 2:11pm
Resiliency
pubcrawl
composability
Metrics
proofs of reliability
reliable storage
secure cloud storage
verifiable storage
Outsourced Database Integrity
biblio
Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Submitted by K_Hooper on Wed, 05/09/2018 - 10:56am
outsourcing data services
security shortage
security problems
Security Audits
Security analysis
Secure storage
secure cloud storage
Scalability
Resiliency
Public key
public integrity auditing
public auditing scheme
public auditing
pubcrawl
Privacy-preserving
Cloud Computing
outsourcing
Mathematical model
low computational audit cost
integrity
Human behavior
Forgery
dynamic-hash-table based public auditing
dynamic hash table
dynamic data
data structure DHT
data blocks
Cryptography
cryptanalysis
countermeasures
biblio
Secure Cloud Storage and File Sharing
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
secure file sharing mechanism
online cloud services
pubcrawl
re-encryption
resilience
Resiliency
seamless file sharing technique
secure cloud storage
secure data-storage services
Secure File Sharing
native machines
security
security failure rates
security risks
security tools
Servers
sophisticated techniques
storage management
storage necessities
storage space
data maintenance
Cloud Computing
cloud service provider
cloud storage service providers
complex techniques
composability
computing resources
confidentiality
Cryptography
data integrity
Access Control
DIP
disintegration protocol
elastic data-storage services
encryption
encryption key
enormous volumes
Fingerprint recognition
Human behavior
Metrics
biblio
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing Among Cryptographic Clouds
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Asymmetric Encryption
Compositionality
Human behavior
hybrid proxy re-encryption
Metrics
Proxy re-encryption
pubcrawl
Resiliency
secure cloud storage