Results 271 to 280 of about 24,383,852 (329)
Some of the next articles are maybe not open access.
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models
IACR Cryptology ePrint ArchiveDeduplication is a vital preprocessing step that enhances machine learning model performance and saves training time and energy. However, enhancing federated learning through deduplication poses challenges, especially regarding scalability and potential ...
Aydin Abadi +2 more
semanticscholar +1 more source
Secure Enterprise Data Deduplication in the Cloud
2013 IEEE Sixth International Conference on Cloud Computing, 2013With the advent of cloud computing as a new paradigm and technology, and the increased tendency of decision makers to envision a staged migration to cloud services, most enterprises are choosing to outsource their data to cloud storage providers, for better management of their IT resources, in terms of security, control, space and storage costs.
Fatema Rashid, Ali Miri, Isaac Woungang
openaire +1 more source
Secure Auditing and Deduplicating Data in Cloud
IEEE Transactions on Computers, 2016As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data ...
Jingwei Li 0001 +3 more
openaire +1 more source
Design of an exact data deduplication cluster
012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 2012Data deduplication is an important component of enterprise storage environments. The throughput and capacity limitations of single node solutions have led to the development of clustered deduplication systems. Most implemented clustered inline solutions are trading deduplication ratio versus performance and are willing to miss opportunities to detect ...
Jürgen Kaiser +3 more
openaire +1 more source
Privacy in Cross-User Data Deduplication
Mobile Networks and Applications, 2018With the ever increasing volume of digital data, using data deduplication techniques in archival storage has become imperative in large scale cloud systems. In a storage system based on a cross-user data deduplication technique, data is uploaded to the server by the client if only it has not been uploaded by him or any other clients previously ...
Hoda Jannati +2 more
openaire +1 more source
Encrypted Data Deduplication in Cloud Storage
2015 10th Asia Joint Conference on Information Security, 2015Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. However, it raises issues regarding privacy and data confidentiality because all the data are stored in the cloud storage. This is a subject of concern for users, and it affects their willingness to use cloud storage services.
Chun-I Fan, Shi-Yuan Huang, Wen-Che Hsu
openaire +1 more source
Droplet: A Distributed Solution of Data Deduplication
2012 ACM/IEEE 13th International Conference on Grid Computing, 2012Creating backup copies is the most commonly used technique to protect from data loss. In order to increase reliability, doing routinely backup is a best practice. Such backup activities will create multiple redundant data streams which is not economic to be directly stored on disk. Similarly, enterprise archival systems usually deal with redundant data,
Yang Zhang 0026 +2 more
openaire +1 more source
Block locality caching for data deduplication
Proceedings of the 6th International Systems and Storage Conference on - SYSTOR '13, 2013Data deduplication systems discover and remove redundancies between data blocks by splitting the data stream into chunks and comparing a hash of each chunk with all previously stored hashes. Storing the corresponding chunk index on hard disks immediately limits the achievable throughput, as these devices are unable to support the high number of random ...
Dirk Meister +2 more
openaire +1 more source
IEEE Internet of Things Journal
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing.
Bingyun Liu +5 more
semanticscholar +1 more source
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing.
Bingyun Liu +5 more
semanticscholar +1 more source
Cooperative Memory Deduplication With Intel Data Streaming Accelerator
IEEE computer architecture lettersMemory deduplication plays a critical role in reducing memory consumption and the total cost of ownership (TCO) in hyperscalers, particularly as the advent of large language models imposes unprecedented demands on memory resources.
Houxiang Ji +4 more
semanticscholar +1 more source

