Skip to main content

Advances, Systems and Applications

Table 8 Comparison of our approaches and Moyou and Ndoundam’s approach based on the key and management of the cloud storage environment

From: Distributed data hiding in a single cloud storage environment

Approaches

Credentials cloud account

Lists of files

Duplicate files in the same cloud

Duplicate files at the receiver

Moyou and Ndoundam approach [13]

c0,c1,c2,…,cn−1

L(0),L(1),…,L(k−1)

none

none

Approach 1

c0

none

yes

none

Approach 2

\(c^{\prime }_{0}\)

L(0),L(1),…,L(n−1)

none

yes

Approach 3

c0, \(c^{\prime }_{0}\)

L(0),L(1),…,L(n−1)

none

yes