Results 111 to 120 of about 310 (139)
Some of the next articles are maybe not open access.
Rekeying for Encrypted Deduplication Storage
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016Rekeying refers to an operation of replacing an existing key with a new key for encryption. It renews security protection, so as to protect against key compromise and enable dynamic access control in cryptographic storage. However, it is non-trivial to realize efficient rekeying in encrypted deduplication storage systems, which use deterministic ...
Jingwei Li +3 more
openaire +1 more source
HEDup: Secure Deduplication with Homomorphic Encryption
2015 IEEE International Conference on Networking, Architecture and Storage (NAS), 2015Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers (CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest.
Rodel Miguel +2 more
openaire +1 more source
Encrypted Data Deduplication in Cloud Storage
2015 10th Asia Joint Conference on Information Security, 2015Cloud storage is a remote storage service, where users can upload and download their data anytime and anywhere. However, it raises issues regarding privacy and data confidentiality because all the data are stored in the cloud storage. This is a subject of concern for users, and it affects their willingness to use cloud storage services.
Chun-I Fan, Shi-Yuan Huang, Wen-Che Hsu
openaire +1 more source
Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018Cross-user deduplication is an emerging technique to ease the burden of cloud storage in big data era by storing only one copy of duplicate data. Efficiency reflects the feasibility and is a basic consideration when applying the deduplication scheme. However, in order to achieve certain level of security, existing works suffer from heavy overhead of ...
Xin Tang +3 more
openaire +1 more source
Secure Cloud Data Deduplication with Efficient Re-Encryption
2021 International Conference on Intelligent Technologies (CONIT), 2021After the emergence of the cloud architecture, many companies migrate their data from conventional storage i.e., on bare metal to the cloud storage. Since then huge amount of data was stored on cloud servers, which later resulted in redundancy of huge amount of data.
Mohd Aman, Prashant Verma, D Rajeswari
openaire +1 more source
Encrypted Big Data Deduplication in Cloud Storage
2019Encrypted data deduplication is an efficient way to solve the waste of resources caused by duplicated data in cloud storage services without the loss of security. In this chapter, we proposed three data deduplication schemes on encrypted big data with flexible data access control, data deletion, and data update.
Zheng Yan +5 more
openaire +3 more sources
A Bandwidth-Efficient Middleware for Encrypted Deduplication
2018 IEEE Conference on Dependable and Secure Computing (DSC), 2018Data deduplication is a vital component of current cloud storage systems for optimized space utilization. However, users cannot fairly enjoy the storage savings of deduplication. Uploading two identical files consumes twice the storage quota from a user's account, but the server may store one file copy only.
Helei Cui +4 more
openaire +1 more source
Secure Random Encryption for Deduplicated Storage
2017In Storage Services, Deduplication is used to reduce the data size by eliminating storage of duplicate data. Deduplication is an effective data reduction technique to minimize the storage cost as well as communication cost. However, Deduplication raises significant security issues. Malicious users and semi-trusted Storage Server tries to learn the data
Jay Dave +4 more
openaire +1 more source
Tunable Encrypted Deduplication with Attack-resilient Key Management
ACM Transactions on Storage, 2022Conventional encrypted deduplication approaches retain the deduplication capability on duplicate chunks after encryption by always deriving the key for encryption/decryption from the chunk content, but such a deterministic nature causes information leakage due to frequency analysis.
Zuoru Yang +3 more
openaire +1 more source
Secure Deduplication Scheme for Cloud Encrypted Data
International Journal of Advanced Pervasive and Ubiquitous Computing, 2019Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS but this causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is an effective data
Vishal Passricha +2 more
openaire +1 more source

