1 - 4 of 4 Chapters
[Cloud computing has emerged as a promising technique that greatly changes the modern IT industry. In this chapter, we first give a brief introduction to cloud storage systems. Then, we explore some security issues in cloud storage systems, including data integrity and data confidentiality. We...
[In cloud storage systems, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which requires an independent...
[Cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot be relied to enforce the access policy. To...
[ Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, which requires a trusted authority to manage all the attributes and distributes keys in the system. In multi-authority cloud storage systems, the users’ attributes come from...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.