Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space [PDF]
The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services.
N Jayapandian
exaly +6 more sources
Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage
Data deduplication is broadlyfor maintaining asole copy of user's data in cloud storage servers. Data Deduplication is a process of verify that whether the data are already stored in the cloud storage or not and maintain a single copy of data in the cloud.
G. V. Uma, L. Jayasimman
exaly +3 more sources
Convergent Encryption Enabled Secure Data Deduplication Algorithm for Cloud Environment [PDF]
Abstract The exponential growth of data management nowadays is quite a tedious and critical issue. It is also evident that methods employed for collecting data for cloud storage exert additional load on different cloud servers operated by many enterprises. Various approaches are used these days to reduce the burden on computer servers. One such
Shahnawaz Ahmad +2 more
openalex +2 more sources
Enhanced Symmetric Convergent Encryption for Secured Data Deduplication in Cloud
Cloud storage is a virtual setting that includes an amazing amount of processing power. The resources are in a state where they can serve users. Cloud data centres are the locations where all of this computing is maintained. In order to produce high-performance computing, the data centre houses a sizable number of powerful computers and servers ...
G. V. Uma
openalex +3 more sources
Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining [PDF]
We investigate unification problems related to the Cipher Block Chaining (CBC) mode of encryption. We first model chaining in terms of a simple, convergent, rewrite system over a signature with two disjoint sorts: list and element.
Siva Anantharaman +3 more
doaj +7 more sources
A Survey on Data Redundancy Check in a Hybrid Cloud by using Convergent Encryption [PDF]
Background/Objectives: Data deduplication is the elimination of redundant data within an existing environment. It is mainly used in cloud storage environment for bandwidth optimization and to enhance storage space. This paper focuses on different dedupe techniques with a secure cloud. Methods/Statistical Analysis: Symmetric key encryption is used to
N. R. Anitha Rani +2 more
openalex +2 more sources
Abstract The development and growth of data is rapidly increasing and it triggers development on storage technology namely cloud storage. In this research, implementation of Lashkari et al scheme and convergent encryption was conducted on cloud application to provide data confidentiality service and cloud storage space efficiency.
Hermawan Setiawan, Rico Setyawan
openalex +2 more sources
ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for ...
Priya Nandhagopal, Jayasimman Lawrence
openalex +3 more sources
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent ...
Xiao-yong GUO +3 more
doaj +3 more sources
Secure biometric authentication with de-duplication on distributed cloud storage [PDF]
Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services.
Vinoth Kumar M +4 more
doaj +2 more sources

