Research Article
An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage
Table 1
Comparison of data security.
| Security items |
Chen and He [12] | Xu et al. [13] | Proposed mechanism |
| Data encoding | Low | Medium | High | Data transmission | ā | ā | High | Data placement | Medium | Low | High | Data reconstruction | Medium | High | High | Resistance of internal data leakage | Medium | High | High |
|
|