咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 3 篇 cloud data stora...
  • 3 篇 cloud computing
  • 1 篇 interoperability...
  • 1 篇 central manageme...
  • 1 篇 data privacy
  • 1 篇 designated verif...
  • 1 篇 bloom filters
  • 1 篇 third-party audi...
  • 1 篇 merkle hash tree
  • 1 篇 storage correctn...
  • 1 篇 cloud service pr...
  • 1 篇 multi-owner auth...
  • 1 篇 federation agent
  • 1 篇 deduplication in...

机构

  • 1 篇 school of creati...
  • 1 篇 center for cyber...
  • 1 篇 school of comput...
  • 1 篇 department of te...
  • 1 篇 department of ee...
  • 1 篇 i.k.gujral punja...
  • 1 篇 department of cs...

作者

  • 1 篇 j.stanly jayapra...
  • 1 篇 celestine iwendi
  • 1 篇 vrajesh sharma
  • 1 篇 solomon guadie w...
  • 1 篇 kishore balasubr...
  • 1 篇 mohammad kamrul ...
  • 1 篇 rossilawati sula...
  • 1 篇 nipun chhabra
  • 1 篇 manju bala
  • 1 篇 b.d.parameshacha...

语言

  • 3 篇 英文
检索条件"主题词=cloud data storage"
3 条 记 录,以下是1-10 订阅
排序:
cloud data auditing with designated verifier
收藏 引用
Frontiers of Computer Science 2014年 第3期8卷 503-512页
作者: Solomon Guadie WORKU Chunxiang XU Jining ZHAO School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Implementation and Validation of the Optimized Deduplication Strategy in Federated cloud Environment
收藏 引用
Computers, Materials & Continua 2022年 第4期71卷 2019-2035页
作者: Nipun Chhabra Manju Bala Vrajesh Sharma I.K.Gujral Punjab Technical University Jalandhar144603india
cloud computing technology is the culmination of technical advancements in computer networks,hardware and software capabilities that collectively gave rise to computing as a *** offers a plethora of utilities to its c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
cloud data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 519-534页
作者: J.Stanly Jayaprakash Kishore Balasubramanian Rossilawati Sulaiman Mohammad Kamrul Hasan B.D.Parameshachari Celestine Iwendi Department of CSE Mahendra Institute of TechnologyNamakkal637503India Department of EEE Dr.Mahalingam College of Engineering and TechnologyPollachi642003India Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)43600BangiMalaysia Department of Telecommunication Engineering GSSS Institute of Engineering and Technology for WomenMysuruIndia School of Creative Technologies University of BoltonDeane RoadBoltonUnited Kingdom
Many organizations apply cloud computing to store and effectively process data for various *** user uploads the data in the cloud has less security due to the unreliable verification process of data *** this research,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论