Abstract | ||
---|---|---|
It is certain that cloud users are eager to ascertain where their sensitive data are stored. Misplacing the data probably divulges secret information. Therefore, researchers have designed mechanisms of geolocation of cloud data to allow cloud users to get geolocation of cloud data. However, to seek an approach to seeing through frauds is still a challenge. Trusted computing technology offers an al... |
Year | DOI | Venue |
---|---|---|
2015 | 10.1093/comjnl/bxu144 | The Computer Journal |
Keywords | DocType | Volume |
cloud computing,trusted computing,storage security,host geolocation | Journal | 58 |
Issue | ISSN | Citations |
10 | 0010-4620 | 5 |
PageRank | References | Authors |
0.49 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dong Lai Fu | 1 | 5 | 0.83 |
Xinguang Peng | 2 | 12 | 0.92 |
Yuli Yang | 3 | 8 | 2.27 |