Results 1 to 10 of about 1,828 (182)

Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication

open access: yesApplied Sciences (Switzerland)
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Weichun Wang, Yuchong Hu
exaly   +4 more sources

Secure Encrypted Data With Authorized Deduplication in Cloud [PDF]

open access: yesIEEE Access, 2019
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong   +4 more
doaj   +2 more sources

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating

open access: yesIEEE Access, 2020
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult.
Shuguang Zhang   +2 more
exaly   +3 more sources

Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication [PDF]

open access: yesScientific Reports
Cloud computing enables data storage and application deployment over the internet, offering benefits such as mobility, resource pooling, and scalability. However, it also presents major challenges, particularly in managing shared resources, ensuring data
J. K. Periasamy   +3 more
doaj   +2 more sources

Deduplication on Encrypted Big Data in Cloud

open access: yesIEEE Transactions on Big Data, 2016
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form.
Zheng Yan, Wenxiu Ding, Xixun Yu
exaly   +5 more sources

Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication

open access: yesIEEE Access, 2020
Searchable encryption is a promising technique that allows cloud service provider return the interested files to the user, even if the shared files are encrypted.
Xueyan Liu, TingTing Lu, Shufen Niu
exaly   +3 more sources

Game Theoretical Analysis on Encrypted Cloud Data Deduplication [PDF]

open access: yesIEEE Transactions on Industrial Informatics, 2019
Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them ...
Xueqin Liang   +2 more
exaly   +3 more sources

Rekeying for Encrypted Deduplication Storage [PDF]

open access: yes2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
Rekeying refers to an operation of replacing an existing key with a new key for encryption. It renews security protection, so as to protect against key compromise and enable dynamic access control in cryptographic storage. However, it is non-trivial to realize efficient rekeying in encrypted deduplication storage systems, which use deterministic ...
Jingwei Li 0001   +3 more
openaire   +3 more sources

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

open access: yesInformation, 2021
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj   +1 more source

Data popularity-based encrypted deduplication scheme without third-party servers

open access: yesTongxin xuebao, 2022
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording ...
Guanxiong HA   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy