A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
Seamless roaming and guaranteed communication using a synchronized single-hop multi-gateway 802.15.4e TSCH network [PDF]
Industrial wireless sensor networks (WSNs) are being used to improve the efficiency, productivity and safety of industrial processes. An open standard that is commonly used in such cases is IEEE 802.15.4e.
Haxhibeqiri, Jetmir +3 more
core +2 more sources
Double Sliding Window Chunking Algorithm for Data Deduplication in Ocean Observation
As an essential means to eliminate redundant data, data deduplication technology significantly affects today’s era of massive data growth. In recent years, due to the rapid development of a series of related industries, such as marine monitoring ...
Shuai Guo +3 more
doaj +1 more source
Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi +3 more
core +1 more source
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems
The deduplication based on attribute-based encryption can be well used in eHealth systems to save storage space and share medical records. However, the excessive computation costs of existing schemes lead to inefficient deduplication.
Hua Ma +4 more
doaj +1 more source
FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems
Deduplication technology can obtain higher space utilization by keeping only one duplicate. But in a distributed storage system, the overall deduplication ratio will be limited due to redundancy elimination across nodes.
Wenbin Yao +3 more
doaj +1 more source
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples ...
Wen-bin YAO +3 more
doaj +2 more sources
Research on Routing Strategy in Cluster Deduplication System
A cluster deduplication system can coordinate the work of multiple nodes, which can better alleviate the disk index bottleneck existing in the large-scale data backup system.
Qinlu He +5 more
doaj +1 more source
Generalized Deduplication: Bounds, Convergence, and Asymptotic Properties
We study a generalization of deduplication, which enables lossless deduplication of highly similar data and show that standard deduplication with fixed chunk length is a special case.
Lucani, Daniel E. +2 more
core +1 more source
Deduplication-based Energy Effcient Storage System in Cloud Environment [PDF]
In cloud computing, companies usually use high-end storage systems to guarantee the I/O performance of virtual machines (VM). These storage systems cost a lot of energy for their high performance.
DONG Mianxiong +3 more
core +2 more sources

