Results 1 to 10 of about 6,985 (236)

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space [PDF]

open access: diamondBrazilian Archives of Biology and Technology, 2018
The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services.
N Jayapandian
exaly   +6 more sources

Enhanced Convergent Encryption Key Generation for Secured Data Deduplication in Cloud Storage

open access: diamondJournal of Physics: Conference Series, 2018
Data deduplication is broadlyfor maintaining asole copy of user's data in cloud storage servers. Data Deduplication is a process of verify that whether the data are already stored in the cloud storage or not and maintain a single copy of data in the cloud.
G. V. Uma, L. Jayasimman
exaly   +3 more sources

Convergent Encryption Enabled Secure Data Deduplication Algorithm for Cloud Environment [PDF]

open access: green, 2022
Abstract The exponential growth of data management nowadays is quite a tedious and critical issue. It is also evident that methods employed for collecting data for cloud storage exert additional load on different cloud servers operated by many enterprises. Various approaches are used these days to reduce the burden on computer servers. One such
Shahnawaz Ahmad   +2 more
openalex   +2 more sources

Enhanced Symmetric Convergent Encryption for Secured Data Deduplication in Cloud

open access: diamondProceeding International Conference on Science and Engineering, 2023
Cloud storage is a virtual setting that includes an amazing amount of processing power. The resources are in a state where they can serve users. Cloud data centres are the locations where all of this computing is maintained. In order to produce high-performance computing, the data centre houses a sizable number of powerful computers and servers ...
G. V. Uma
openalex   +3 more sources

Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining [PDF]

open access: yesLogical Methods in Computer Science, 2014
We investigate unification problems related to the Cipher Block Chaining (CBC) mode of encryption. We first model chaining in terms of a simple, convergent, rewrite system over a signature with two disjoint sorts: list and element.
Siva Anantharaman   +3 more
doaj   +7 more sources

A Survey on Data Redundancy Check in a Hybrid Cloud by using Convergent Encryption [PDF]

open access: diamondIndian Journal of Science and Technology, 2016
Background/Objectives: Data deduplication is the elimination of redundant data within an existing environment. It is mainly used in cloud storage environment for bandwidth optimization and to enhance storage space. This paper focuses on different dedupe techniques with a secure cloud. Methods/Statistical Analysis: Symmetric key encryption is used to
N. R. Anitha Rani   +2 more
openalex   +2 more sources

Implementation of Lashkari et al Scheme and Convergent Encryption on Cloud-Based Secure Deduplication Application

open access: diamondIOP Conference Series: Materials Science and Engineering, 2020
Abstract The development and growth of data is rapidly increasing and it triggers development on storage technology namely cloud storage. In this research, implementation of Lashkari et al scheme and convergent encryption was conducted on cloud application to provide data confidentiality service and cloud storage space efficiency.
Hermawan Setiawan, Rico Setyawan
openalex   +2 more sources

ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data

open access: diamondThe Scientific Temper
Cloud computing offers scalable and cost-effective storage solutions, but concerns over data security, unauthorized access, and storage inefficiencies remain significant. Data deduplication is crucial in reducing storage costs by eliminating redundant copies, yet traditional encryption methods hinder deduplication by generating unique ciphertexts for ...
Priya Nandhagopal, Jayasimman Lawrence
openalex   +3 more sources

Secure deduplication and integrity audit system based on convergent encryption for cloud storage

open access: yesTongxin xuebao, 2017
Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent ...
Xiao-yong GUO   +3 more
doaj   +3 more sources

Secure biometric authentication with de-duplication on distributed cloud storage [PDF]

open access: yesPeerJ Computer Science, 2021
Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services.
Vinoth Kumar M   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy