Results 11 to 20 of about 6,985 (236)

A Review on Secure Data Deduplication: Cloud Storage Security Issue

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud. For providing
Priteshkumar Prajapati, Parth Shah
doaj   +1 more source

Proof of cipher text ownership based on convergence encryption [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire   +1 more source

Security control scheme for cloud data copy based on differential privacy model

open access: yes网络与信息安全学报, 2017
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj   +3 more sources

Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

open access: yesInternational Journal of Intelligent Networks, 2023
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce ...
Nagappan Mageshkumar   +5 more
doaj   +1 more source

Privacy-Preserving Distributed Optimization via Subspace Perturbation: A General Framework [PDF]

open access: yes, 2020
As the modern world becomes increasingly digitized and interconnected, distributed signal processing has proven to be effective in processing its large volume of data.
Christensen, Mads Græsbøll   +2 more
core   +2 more sources

Secure Encrypted Data With Authorized Deduplication in Cloud

open access: yesIEEE Access, 2019
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong   +4 more
doaj   +1 more source

Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]

open access: yes, 2015
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi   +3 more
core   +1 more source

A Marketplace for Efficient and Secure Caching for IoT Applications in 5G Networks [PDF]

open access: yes, 2018
As the communication industry is progressing towards fifth generation (5G) of cellular networks, the traffic it carries is also shifting from high data rate traffic from cellular users to a mixture of high data rate and low data rate traffic from ...
Abbasi, Qammer H.   +5 more
core   +1 more source

Intensive Convergence Encryption for Secure Deduplication in Cloud

open access: yesInternational Journal of Computer Applications, 2016
Deduplication is used for eliminating the duplicate copy of same data and providing security to them. Replica of same data is obtained by encrypting the same information with different key. Surplus amount of data is being stored in the cloud environment to shrink the data in storage space convergence encryption technique is used.
Divya A., Priyanka J.
openaire   +1 more source

A secure data deduplication system for integrated cloud-edge networks

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G.   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy