Results 121 to 130 of about 310 (139)
Some of the next articles are maybe not open access.
Distributed Key Generation for Encrypted Deduplication
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014Large-scale cloud storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2) users demand encryption of their data to ensure privacy.
openaire +1 more source
Interactive Message-Locked Encryption and Secure Deduplication
2015This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are both correlated and dependent on the public system parameters. The new ingredient that makes this possible is interaction.
Mihir Bellare, Sriram Keelveedhi
openaire +1 more source
A novel encryption scheme for data deduplication system
2010 International Conference on Communications, Circuits and Systems (ICCCAS), 2010In order to solve the problem that encryption files can not benefit from the data deduplication technology, a novel encryption scheme is proposed. According to the method, the basic encryption unit is transformed from the file to the chunks; and the chunk contents are used to generate the symmetric keys, which ensure the determinate mapping between ...
Can Wang +3 more
openaire +1 more source
Enabling Encrypted Cloud Media Center with Secure Deduplication
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015Multimedia contents, especially videos, are being exponentially generated today. Due to the limited local storage, people are willing to store the videos at the remote cloud media center for its low cost and scalable storage. However, videos may have to be encrypted before outsourcing for privacy concerns. For practical purposes, the cloud media center
Yifeng Zheng +5 more
openaire +1 more source
Information Leakage in Encrypted Deduplication via Frequency Analysis
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a deterministic encryption approach that encrypts each plaintext chunk with a key derived from the content of the chunk itself, so that identical ...
Jingwei Li +3 more
openaire +1 more source
Secure Generalized Deduplication via Multi-Key Revealing Encryption
2020Cloud Storage Providers (CSPs) offer solutions to relieve users from locally storing vast amounts of data, including personal and sensitive ones. While users may desire to retain some privacy on the data they outsource, CSPs are interested in reducing the total storage space by employing compression techniques such as deduplication.
Daniel E. Lucani +4 more
openaire +3 more sources
An enhanced MinHash encryption scheme for encrypted deduplication
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022Qiaowen Jia +4 more
openaire +1 more source
Encrypted Data Management with Deduplication in Cloud Computing
IEEE Cloud Computing, 2016Cloud computing plays an important role in supporting data storage, processing, and management in the Internet of Things (IoT). To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. However, duplicated data that are encrypted under different encryption schemes could be stored in the cloud, which ...
Wang, Mingjun +4 more
openaire +3 more sources
A lightweight encrypted deduplication scheme supporting backup
Journal of Systems Architecture, 2023Xinyan Wu +3 more
openaire +1 more source

