I'm working on a project which involves security of the cloud data.
The scenario is as follows:
Users A and B have registered to a cloud service (cloud assumed to be
semi-trusted). A and B both have secret keys (KA and KB) (for
symmetric encryption) and public keys (PKA and PKB) on the cloud
...
I'm working on a project which involves security of the cloud data.
The scenario is as follows:
Users A and B have registered to a cloud service (cloud assumed to be
semi-trusted). A and B both have secret keys (KA and KB) (for
symmetric encryption) and public keys (PKA and PKB) on the cloud
...
[ more ]