داستان آبیدیک

access legitimacy


فارسی

1 کامپیوتر و شبکه:: اعتبار دسترسی

Nevertheless, verifying the access legitimacy of a user and securely updating a ciphertext in the cloud based on a new access policy designated by the data owner are two critical challenges to make cloud-based big data storage practical and effective. On the other hand, verifiable secret sharing based schemes rely on RSA [13]-[15] for access legitimacy verification. When a user needs to decrypt a stored ci- phertext, its access legitimacy should be verified by other participating users and the secret shares obtained from other users must be validated for correct recovery. The scheme can verify a user's access legitimacy and validate the information provided by other users for correct plaintext recovery. Such applications usually require the data to be stored in a cloud in ciphertext format, and the access of the data by a user requires multiple other users to verify the access legitimacy of the user.

واژگان شبکه مترجمین ایران


معنی‌های پیشنهادی کاربران

نام و نام خانوادگی
شماره تلفن همراه
متن معنی یا پیشنهاد شما
Captcha Code