搜索结果: 1-15 共查到“军事学 Cloud Storage”相关记录23条 . 查询时间(0.109 秒)
Definitions for Plaintext-Existence Hiding in Cloud Storage
Cloud Storage Side-channel analysis Information Leakage
2018/8/20
Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client si...
Secure Cloud Storage Scheme Based On Hybrid Cryptosystem
Cloud storage ECC based public key cryptography hybrid cryptosystem
2018/3/26
This paper presents a secure cloud storage scheme based on hybrid cryptosystem, which consists of Elliptic Curve Cryptography (ECC), Advanced Encryption Standard (AES), and one-way hash function. Here...
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Privacy-enhancing technologies private cloud services dynamic searchable symmetric encryption
2017/12/25
Searchable encryption has received a significant attention from the research community with various constructions being proposed, each achieving asymptotically optimal complexity for specific metrics ...
Security notions for cloud storage and deduplication
storage systems generic cryptographic components
2017/12/19
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise sec...
CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage
Cloud storage shared data public auditing, identity privacy
2017/9/28
As data sharing has become one of the most popular features offered by cloud storage services, designing public auditing mechanisms for integrity of shared data stored at the cloud becomes much more i...
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage
Secure Keyword Search Cloud Storage
2017/8/21
Cloud computing is very popular for its computing and storage capacity at lower cost. More and more data are being moved to the cloud to reduce storage cost. On the other hand, since the cloud is not ...
Cloud Storage File Recoverability
Proofs of Retrievability Proofs of Recoverability Cloud Storage
2017/2/24
Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether a...
XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data
cloud storage convergent encryption
2016/12/7
Data deduplication, aiming to eliminate duplicate data, has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. Unfortunately, as an increasing number of sensit...
Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust
Merkle tree hash functions authentication codes
2016/12/7
We propose log-structured ADSs for lightweight verification in cloud outsourcing. Our approach is leveraging recently available commercial TEE (trusted execution environment, such as Intel SGX). For s...
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage
Cloud System Data Outsourcing Oblivious RAM
2016/3/9
Oblivious RAM (ORAM) is a security-provable approach for protecting clients' access patterns to remote cloud storage. Recently, numerous ORAM constructions have been proposed to improve the communicat...
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
privacy-preserving auditing cloud storage bilinear pairing
2016/1/7
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacy- p...
SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System
Cyber-physical-social System Cloud storage Public integrity verification
2015/12/29
Cyber-physical-social system (CPSS) allows individuals to share personal information
collected from not only cyberspace, but also physical space. This
has resulted in generating numerous data at a u...
Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
applications public-key cryptography
2015/12/24
We consider a sensor network setting in which the sensed samples are encrypted individually using different keys before being streamed to a cloud storage. For large systems with high capacity, e.g. ge...
Improving security and efficiency for multi-authority access control system in cloud storage
Attribute-level revocation
2014/3/6
Multi-Authority Attribute-Based Encryption (MA-ABE) is an emerging cryptographic primitive for enforcing fine-grained attribute-based access control on the outsourced data in cloud storage. However, m...
Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
Cloud Storage Client-side Deduplication
2014/3/10
Client-side deduplication is a very effective mechanism to reduce both storage and communication cost in cloud storage service. Halevi~\emph{et al.} (CCS '11) discovered security vulnerability in exis...