Advances, Systems and Applications
From: Distributed data hiding in a single cloud storage environment
Approaches | Credentials cloud account | Lists of files | Duplicate files in the same cloud | Duplicate files at the receiver |
---|---|---|---|---|
Moyou and Ndoundam approach [13] | c0,c1,c2,…,cn−1 | L(0),L(1),…,L(k−1) | none | none |
Approach 1 | c0 | none | yes | none |
Approach 2 | \(c^{\prime }_{0}\) | L(0),L(1),…,L(n−1) | none | yes |
Approach 3 | c0, \(c^{\prime }_{0}\) | L(0),L(1),…,L(n−1) | none | yes |