[ACM Press the Second Asia-Pacific Sympo
โ
Yau, Stephen S.; An, Ho G.
๐
Article
๐
2010
๐
ACM Press
โ 286 KB
Current cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of unauthorized disclosure of the users' sensitive data b