Results 191 to 200 of about 6,891 (225)
Some of the next articles are maybe not open access.

An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

Materials Today: Proceedings, 2023
Abstract The cloud server stores its unique DE-duplicate data replication cloud storage system as outsourced only data copies. Deduplication cloud storage audits can verify the integrity of data stored in the cloud, while the cloud calculates the need to maintain only one copy of the copied file.
Vidhyanandhini Krishnasamy   +1 more
openaire   +1 more source

Block Level Data-Deduplication and Security Using Convergent Encryption to Offer Proof of Verification

2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020
Cloud computing is a promising cutting-edge technology because of its cost-efficiency and flexibility to store and access the data. Preserving the data in cloud has become great challenge as the end users store their privacy data in daily life. But majority of the data in the cloud storage is redundant.
B. Tirapathi Reddy   +4 more
openaire   +1 more source

Image Encryption Using Infinite Series Convergence

18th International Conference on Systems Engineering (ICSEng'05), 2006
Encryption of data is important for transmission of secured data to an authorized person. In the present work, image encryption is performed by an encipher algorithm based on the closed form of an infinite series. The pixel coordinates of the image are scrambled by the encipher algorithm which converts the image to a single dimensional matrix.
openaire   +1 more source

Attribute-Based Convergent Encryption Key Management for Secure Deduplication in Cloud

2020
Data deduplication is a methodology for eliminating duplicate copies of data by keeping the single copy of data with proper access policies, instead of maintaining duplicates of the same data. It reduces cloud storage slot and communication bandwidth.
E. Silambarasan   +2 more
openaire   +1 more source

Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud

2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), 2020
Conventional encryption schemes are being used over the years for securing outsourced data to cloud. However, this impedes deduplication- the ability to identify and remove duplicate data from storage server. The idea of Convergent Encryption was introduced to overcome this problem which ensures that identical plaintext files will always produce ...
Tariqul Islam, Kiho Lim, D. Manivannan
openaire   +1 more source

DICE: A dual integrity convergent encryption protocol for client side secure data deduplication

2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2017
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth.
Ashish Agarwala   +2 more
openaire   +1 more source

Convergent encryption enabled secure data deduplication algorithm for cloud environment

Concurrency and Computation: Practice and Experience
SummaryThe exponential growth of data poses a critical challenge for cloud storage systems. Redundant data consumes valuable storage space and increases infrastructure costs. Data deduplication, a technique for eliminating duplicate data copies, offers a promising solution.
Shahnawaz Ahmad   +4 more
openaire   +1 more source

Holographic encryption system in the Fresnel domain with convergent random illumination

Optical Engineering, 2010
A secure holographic system is proposed, based on the principle of two-wave encryption in the Fresnel domain under convergent random illumination. The convergent random wavefront, instead of the commonly used plane wavefront, improves the security of a holographic encryption system, providing better protection from unauthorized users.
openaire   +1 more source

A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment

Wireless Personal Communications, 2018
A super-connected society is emerging in which things and things or people and things communicate with each other through the Internet of Things. Since devices in the existing IoT environment have limitations such as low power, volume, and performance, a new paradigm has been suggested by integrating with cloud computing technology.
Byung-Wook Jin   +2 more
openaire   +1 more source

Towards Converging Fully Homomorphic Batch Encryption with Data Integrity Assurance in Cloud Setting

2019
In encryption scheme setting, users who possess the right key can authorize to do computation with the data. In particular, cloud storage users lose their rights in terms of integrity on data, even after they ends up metered service from a CSP(Cloud Storage service provider), There is a possibility of dishonest computation over an old data by CSP also.
S. Hariharasitaraman, S. P. Balakannan
openaire   +1 more source

Home - About - Disclaimer - Privacy