Results 21 to 30 of about 29,957 (282)

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

Seamless roaming and guaranteed communication using a synchronized single-hop multi-gateway 802.15.4e TSCH network [PDF]

open access: yes, 2018
Industrial wireless sensor networks (WSNs) are being used to improve the efficiency, productivity and safety of industrial processes. An open standard that is commonly used in such cases is IEEE 802.15.4e.
Haxhibeqiri, Jetmir   +3 more
core   +2 more sources

Double Sliding Window Chunking Algorithm for Data Deduplication in Ocean Observation

open access: yesIEEE Access, 2023
As an essential means to eliminate redundant data, data deduplication technology significantly affects today’s era of massive data growth. In recent years, due to the rapid development of a series of related industries, such as marine monitoring ...
Shuai Guo   +3 more
doaj   +1 more source

Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]

open access: yes, 2015
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi   +3 more
core   +1 more source

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems

open access: yesIEEE Access, 2019
The deduplication based on attribute-based encryption can be well used in eHealth systems to save storage space and share medical records. However, the excessive computation costs of existing schemes lead to inefficient deduplication.
Hua Ma   +4 more
doaj   +1 more source

FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems

open access: yesIEEE Access, 2022
Deduplication technology can obtain higher space utilization by keeping only one duplicate. But in a distributed storage system, the overall deduplication ratio will be limited due to redundancy elimination across nodes.
Wenbin Yao   +3 more
doaj   +1 more source

Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata

open access: yesTongxin xuebao, 2015
Building effective deduplication index in the memory could reduce disk access times and enhance chunk fingerprint lookup speed,which was a big challenge for deduplication algorithms in massive data environments.As deduplication data set had many samples ...
Wen-bin YAO   +3 more
doaj   +2 more sources

Research on Routing Strategy in Cluster Deduplication System

open access: yesIEEE Access, 2021
A cluster deduplication system can coordinate the work of multiple nodes, which can better alleviate the disk index bottleneck existing in the large-scale data backup system.
Qinlu He   +5 more
doaj   +1 more source

Generalized Deduplication: Bounds, Convergence, and Asymptotic Properties

open access: yes, 2019
We study a generalization of deduplication, which enables lossless deduplication of highly similar data and show that standard deduplication with fixed chunk length is a special case.
Lucani, Daniel E.   +2 more
core   +1 more source

Deduplication-based Energy Effcient Storage System in Cloud Environment [PDF]

open access: yes, 2015
In cloud computing, companies usually use high-end storage systems to guarantee the I/O performance of virtual machines (VM). These storage systems cost a lot of energy for their high performance.
DONG Mianxiong   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy