메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
V. Sujatha (Department of Computer Science and Engineering Vignan's Nirula Institute of Technology & Scienc)
저널정보
아태인문사회융합기술교류학회 아시아태평양융합연구교류논문지 아시아태평양융합연구교류논문지 제3권 제2호
발행연도
2017.1
수록면
1 - 9 (9page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
Cloud storage services became progressively fashionable. attributable to the importance of privacy, several cloud storage secret writing schemes are projected to guard information from those that don't have access. All such schemes assumed that cloud storage suppliers area unit safe and can't be hacked; but, in follow, some authorities (i.e., coercers) might force cloud storage suppliers to reveal user secrets or confidential information on the cloud, therefore altogether circumventing storage secret writing schemes. during this paper, we have a tendency to gift our style for a brand new cloud storage secret writing theme that allows cloud storage suppliers to make convincing faux user secrets to guard user privacy. Since coercers cannot tell if obtained secrets area unit true or not, the cloud storage suppliers make sure that user privacy continues to be firmly protected. Most of the projected schemes assume cloud storage service suppliers or reliable third parties handling key management square measure reliable and cannot be hacked; however, in follow, some entities would possibly intercept communications between users and cloud storage suppliers then compel storage suppliers to unhitch user secrets by exploitation government power or different suggests that. throughout this case, encrypted info square measure assumed to be known and storage suppliers square measure requested to unhitch user secrets.

목차

등록된 정보가 없습니다.

참고문헌 (4)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0