Back to Results
First PageMeta Content
Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software


1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv
Add to Reading List

Document Date: 2012-06-30 22:42:56


Open Document

File Size: 255,03 KB

Share Result on Facebook

City

File Policy / Policy Attribute / P OLICY / Background Time / /

Company

AES / Amazon / SmugMug / Intel Labs / Sij / /

Country

Singapore / /

Currency

pence / /

/

Event

Reorganization / /

Facility

library APIs / The Chinese University of Hong Kong / OpenSSL library / /

IndustryTerm

storage devices / cryptographic key management / revised policy revocation protocol / appropriate solution / public-key infrastructure / cloud storage services / business solution / feasible solution / decentralized key management / university department network / data outsourcing applications / straightforward solution / /

OperatingSystem

Linux / /

Organization

Chinese University of Hong Kong / Department of Computer Science and Engineering / /

Person

John C. S. Lui / Siei Rei / Bob / Cloud Pi / Patrick P. C. Lee / Pi Symmetric-key / Yang Tang / /

Position

general data outsourcing applications / Prime Minister / manager 1 File / manager / the client / manager / manager 1 Client / manager for this operation / manager 2 Metadata / manager ei / manager for assured deletion / manager for decryption / Private / local driver / key manager / jth key manager / Client Key manager / /

Product

Shamir / LibAWS+ / /

ProgrammingLanguage

C++ / /

Technology

public key infrastructure / Peer-to-Peer / Linux / symmetric-key encryption / PKI / P2P / private key / Secret key / SSL / public-key infrastructure / attribute-based encryption / encryption / ASCII / smartphones / policy Pi Symmetric-key encryption / HTTP / revised policy revocation protocol / /

SocialTag