Research Article
Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique
Table 1
Performance analysis.
| Functions | Guo et al. (2013) [9] | Han et al. (2013) [10] | Sheu et al. (2014) [1] | Park (2015) [4] | Proposed approach |
| Identification & authentication | No | Yes | No | Yes | Yes | Authorization | No | Yes | No | Yes | Yes | Confidentiality | Yes | Yes | No | Yes | Yes | Integrity | No | No | Yes | No | Yes | Antiattack capability | Weak | Medium | Weak | Medium | Strong |
|
|