Results 1 to 10 of about 6,772 (106)

Proof of cipher text ownership based on convergence encryption [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire   +1 more source

Privacy-Preserving Distributed Optimization via Subspace Perturbation: A General Framework [PDF]

open access: yes, 2020
As the modern world becomes increasingly digitized and interconnected, distributed signal processing has proven to be effective in processing its large volume of data.
Christensen, Mads Græsbøll   +2 more
core   +2 more sources

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space [PDF]

open access: yesBrazilian Archives of Biology and Technology, 2018
ABSTRACT The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services. Identifying common checkoff data both files storing them only once. Deduplication can yield cost savings by increasing the utility of a given amount
Jayapandian, N, Md Zubair Rahman, A M J
openaire   +4 more sources

Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining [PDF]

open access: yes, 2014
We investigate unification problems related to the Cipher Block Chaining (CBC) mode of encryption. We first model chaining in terms of a simple, convergent, rewrite system over a signature with two disjoint sorts: list and element.
Anantharaman, Siva   +3 more
core   +5 more sources

Lengths May Break Privacy – Or How to Check for Equivalences with Length [PDF]

open access: yes, 2013
Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes ...
A. Armando   +4 more
core   +4 more sources

Intensive Convergence Encryption for Secure Deduplication in Cloud

open access: yesInternational Journal of Computer Applications, 2016
Deduplication is used for eliminating the duplicate copy of same data and providing security to them. Replica of same data is obtained by encrypting the same information with different key. Surplus amount of data is being stored in the cloud environment to shrink the data in storage space convergence encryption technique is used.
Divya A., Priyanka J.
openaire   +1 more source

A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks [PDF]

open access: yes, 2018
As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from ...
Abbasi, Qammer H.   +5 more
core   +1 more source

Convergent Encryption Enabled Secure Data Deduplication Algorithm for Cloud Environment

open access: yes, 2022
Abstract The exponential growth of data management nowadays is quite a tedious and critical issue. It is also evident that methods employed for collecting data for cloud storage exert additional load on different cloud servers operated by many enterprises. Various approaches are used these days to reduce the burden on computer servers. One such
Shahnawaz Ahmad   +2 more
openaire   +1 more source

YAPA: A generic tool for computing intruder knowledge [PDF]

open access: yes, 2009
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two ...
B. Blanchet   +12 more
core   +5 more sources

Convergence of Blockchain, k-medoids and homomorphic encryption for privacy preserving biomedical data classification

open access: yesInternet of Things and Cyber-Physical Systems, 2022
La privacidad de los datos en el Internet de las Cosas Médicas (IoMT) sigue siendo una preocupación crítica cuando se manejan datos biomédicos. Si bien los estudios existentes se centran en la criptografía y la privacidad diferencial, pocos de ellos capturan la utilidad y la autenticidad de los datos.
Shamima Akter, Farhana Reza, Manik Ahmed
openaire   +2 more sources

Home - About - Disclaimer - Privacy