Proof of cipher text ownership based on convergence encryption [PDF]
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire +1 more source
Privacy-Preserving Distributed Optimization via Subspace Perturbation: A General Framework [PDF]
As the modern world becomes increasingly digitized and interconnected, distributed signal processing has proven to be effective in processing its large volume of data.
Christensen, Mads Græsbøll +2 more
core +2 more sources
Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space [PDF]
ABSTRACT The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services. Identifying common checkoff data both files storing them only once. Deduplication can yield cost savings by increasing the utility of a given amount
Jayapandian, N, Md Zubair Rahman, A M J
openaire +4 more sources
Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining [PDF]
We investigate unification problems related to the Cipher Block Chaining (CBC) mode of encryption. We first model chaining in terms of a simple, convergent, rewrite system over a signature with two disjoint sorts: list and element.
Anantharaman, Siva +3 more
core +5 more sources
Lengths May Break Privacy – Or How to Check for Equivalences with Length [PDF]
Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes ...
A. Armando +4 more
core +4 more sources
Intensive Convergence Encryption for Secure Deduplication in Cloud
Deduplication is used for eliminating the duplicate copy of same data and providing security to them. Replica of same data is obtained by encrypting the same information with different key. Surplus amount of data is being stored in the cloud environment to shrink the data in storage space convergence encryption technique is used.
Divya A., Priyanka J.
openaire +1 more source
A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks [PDF]
As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from ...
Abbasi, Qammer H. +5 more
core +1 more source
Convergent Encryption Enabled Secure Data Deduplication Algorithm for Cloud Environment
Abstract The exponential growth of data management nowadays is quite a tedious and critical issue. It is also evident that methods employed for collecting data for cloud storage exert additional load on different cloud servers operated by many enterprises. Various approaches are used these days to reduce the burden on computer servers. One such
Shahnawaz Ahmad +2 more
openaire +1 more source
YAPA: A generic tool for computing intruder knowledge [PDF]
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two ...
B. Blanchet +12 more
core +5 more sources
La privacidad de los datos en el Internet de las Cosas Médicas (IoMT) sigue siendo una preocupación crítica cuando se manejan datos biomédicos. Si bien los estudios existentes se centran en la criptografía y la privacidad diferencial, pocos de ellos capturan la utilidad y la autenticidad de los datos.
Shamima Akter, Farhana Reza, Manik Ahmed
openaire +2 more sources

