Results 1 to 10 of about 310 (139)

Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication [PDF]

open access: yesScientific Reports
Cloud computing enables data storage and application deployment over the internet, offering benefits such as mobility, resource pooling, and scalability. However, it also presents major challenges, particularly in managing shared resources, ensuring data
J. K. Periasamy   +3 more
doaj   +2 more sources

Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication

open access: yesApplied Sciences
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Chuang Gan   +7 more
doaj   +2 more sources

Data access control policy of encrypted deduplication system

open access: yesTongxin xuebao, 2020
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was ...
Chunfu JIA, Guanxiong HA, Ruiqi LI
doaj   +3 more sources

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating

open access: yesIEEE Access, 2020
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult.
Shuguang Zhang   +3 more
doaj   +1 more source

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

open access: yesInformation, 2021
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj   +1 more source

Data popularity-based encrypted deduplication scheme without third-party servers

open access: yesTongxin xuebao, 2022
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording ...
Guanxiong HA   +3 more
doaj   +2 more sources

Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication

open access: yesIEEE Access, 2020
Searchable encryption is a promising technique that allows cloud service provider return the interested files to the user, even if the shared files are encrypted.
Xueyan Liu   +4 more
doaj   +1 more source

A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation

open access: yesIEEE Access, 2023
To protect data privacy, users prefer to store encrypted data in cloud servers. Cloud servers reduce the cost of storage and network bandwidth by eliminating duplicate copies.
Yan Teng   +3 more
doaj   +1 more source

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

open access: yesBrazilian Archives of Biology and Technology, 2018
The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services.
N Jayapandian, A M J Md Zubair Rahman
doaj   +1 more source

A secure data deduplication system for integrated cloud-edge networks

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G.   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy