A Review on Secure Data Deduplication: Cloud Storage Security Issue
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud. For providing
Priteshkumar Prajapati, Parth Shah
doaj +1 more source
Proof of cipher text ownership based on convergence encryption [PDF]
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire +1 more source
Security control scheme for cloud data copy based on differential privacy model
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj +3 more sources
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce ...
Nagappan Mageshkumar +5 more
doaj +1 more source
Privacy-Preserving Distributed Optimization via Subspace Perturbation: A General Framework [PDF]
As the modern world becomes increasingly digitized and interconnected, distributed signal processing has proven to be effective in processing its large volume of data.
Christensen, Mads Græsbøll +2 more
core +2 more sources
Secure Encrypted Data With Authorized Deduplication in Cloud
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong +4 more
doaj +1 more source
Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi +3 more
core +1 more source
A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks [PDF]
As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from ...
Abbasi, Qammer H. +5 more
core +1 more source
Intensive Convergence Encryption for Secure Deduplication in Cloud
Deduplication is used for eliminating the duplicate copy of same data and providing security to them. Replica of same data is obtained by encrypting the same information with different key. Surplus amount of data is being stored in the cloud environment to shrink the data in storage space convergence encryption technique is used.
Divya A., Priyanka J.
openaire +1 more source
A secure data deduplication system for integrated cloud-edge networks
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G. +5 more
doaj +1 more source

