2016
DOI: 10.17485/ijst/2016/v9i8/87923
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Integrity Policy for Encrypted Data in Secure Storage using Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Providing security to cloud storage is an important essential task. There are different types of encryption techniques [3][4][5][6] that are developed for encrypting the data before outsourcing it to the cloud. The main intention of the encryption techniques is to provide high security, 7 access control, and data confidentiality to the cloud data.…”
Section: Introductionmentioning
confidence: 99%
“…Providing security to cloud storage is an important essential task. There are different types of encryption techniques [3][4][5][6] that are developed for encrypting the data before outsourcing it to the cloud. The main intention of the encryption techniques is to provide high security, 7 access control, and data confidentiality to the cloud data.…”
Section: Introductionmentioning
confidence: 99%