Results 1 to 10 of about 1,828 (182)
Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Weichun Wang, Yuchong Hu
exaly +4 more sources
Secure Encrypted Data With Authorized Deduplication in Cloud [PDF]
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong +4 more
doaj +2 more sources
SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult.
Shuguang Zhang +2 more
exaly +3 more sources
Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication [PDF]
Cloud computing enables data storage and application deployment over the internet, offering benefits such as mobility, resource pooling, and scalability. However, it also presents major challenges, particularly in managing shared resources, ensuring data
J. K. Periasamy +3 more
doaj +2 more sources
Deduplication on Encrypted Big Data in Cloud
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form.
Zheng Yan, Wenxiu Ding, Xixun Yu
exaly +5 more sources
Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
Searchable encryption is a promising technique that allows cloud service provider return the interested files to the user, even if the shared files are encrypted.
Xueyan Liu, TingTing Lu, Shufen Niu
exaly +3 more sources
Game Theoretical Analysis on Encrypted Cloud Data Deduplication [PDF]
Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them ...
Xueqin Liang +2 more
exaly +3 more sources
Rekeying for Encrypted Deduplication Storage [PDF]
Rekeying refers to an operation of replacing an existing key with a new key for encryption. It renews security protection, so as to protect against key compromise and enable dynamic access control in cryptographic storage. However, it is non-trivial to realize efficient rekeying in encrypted deduplication storage systems, which use deterministic ...
Jingwei Li 0001 +3 more
openaire +3 more sources
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj +1 more source
Data popularity-based encrypted deduplication scheme without third-party servers
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording ...
Guanxiong HA +3 more
doaj +2 more sources

