Cloud security & proofs of retrievability : an extended survey
![Thumbnail](/xmlui/bitstream/handle/unipi/9406/Grimpa_Vasiliki.pdf.jpg?sequence=4&isAllowed=y)
View/ Open
Keywords
Cloud computing security ; PoR schemes ; Outsourced dataAbstract
In this paper we survey the most important POR schemes proposed since 2007
along with different methods used for various security requirements. through a
comparative study, a consolidated report of the techniques used in POR is presented.