|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Data storage security in cloud computing has become a major concern due to the increasing number of malicious attacks that exploit weaknesses in existing systems. It is necessary to develop protocols that can provide efficient and secure data storage. Probabilistic efficient and secure protocols can ensure data security while minimizing storage and communication costs. These protocols use randomization techniques and cryptographic mechanisms to gain resilience against attacks and improve data security in the cloud environment. Probabilistic efficient and secure protocols can also be used to protect data stored in the cloud from malicious external threats, further enhancing the security of data stored in the cloud. In addition, these protocols can also be used to improve robustness and reliability of the cloud environment by providing mechanisms to detect and restore corrupted or compromised data.
Keyword
Cloud Storage, Data Security, homomorphic encryption, data integrity
PDF Download (click here)
|
|
|
|
|