1
کامپیوتر و شبکه::
اعتبار دسترسی
Nevertheless, verifying the access legitimacy of a user and securely updating a ciphertext in the cloud based on a new access policy designated by the data owner are two critical challenges to make cloud-based big data storage practical and effective.
On the other hand, verifiable secret sharing based schemes rely on RSA [13]-[15] for access legitimacy verification.
When a user needs to decrypt a stored ci- phertext, its access legitimacy should be verified by other participating users and the secret shares obtained from other users must be validated for correct recovery.
The scheme can verify a user's access legitimacy and validate the information provided by other users for correct plaintext recovery.
Such applications usually require the data to be stored in a cloud in ciphertext format, and the access of the data by a user requires multiple other users to verify the access legitimacy of the user.
واژگان شبکه مترجمین ایران