Results 121 to 130 of about 310 (139)
Some of the next articles are maybe not open access.

Distributed Key Generation for Encrypted Deduplication

Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Large-scale cloud storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2) users demand encryption of their data to ensure privacy.
openaire   +1 more source

Interactive Message-Locked Encryption and Secure Deduplication

2015
This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are both correlated and dependent on the public system parameters. The new ingredient that makes this possible is interaction.
Mihir Bellare, Sriram Keelveedhi
openaire   +1 more source

A novel encryption scheme for data deduplication system

2010 International Conference on Communications, Circuits and Systems (ICCCAS), 2010
In order to solve the problem that encryption files can not benefit from the data deduplication technology, a novel encryption scheme is proposed. According to the method, the basic encryption unit is transformed from the file to the chunks; and the chunk contents are used to generate the symmetric keys, which ensure the determinate mapping between ...
Can Wang   +3 more
openaire   +1 more source

Enabling Encrypted Cloud Media Center with Secure Deduplication

Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015
Multimedia contents, especially videos, are being exponentially generated today. Due to the limited local storage, people are willing to store the videos at the remote cloud media center for its low cost and scalable storage. However, videos may have to be encrypted before outsourcing for privacy concerns. For practical purposes, the cloud media center
Yifeng Zheng   +5 more
openaire   +1 more source

Information Leakage in Encrypted Deduplication via Frequency Analysis

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a deterministic encryption approach that encrypts each plaintext chunk with a key derived from the content of the chunk itself, so that identical ...
Jingwei Li   +3 more
openaire   +1 more source

Deduplication of Encrypted Data

2021
Liang Xueqin, Yan Zheng
openaire   +2 more sources

Secure Generalized Deduplication via Multi-Key Revealing Encryption

2020
Cloud Storage Providers (CSPs) offer solutions to relieve users from locally storing vast amounts of data, including personal and sensitive ones. While users may desire to retain some privacy on the data they outsource, CSPs are interested in reducing the total storage space by employing compression techniques such as deduplication.
Daniel E. Lucani   +4 more
openaire   +3 more sources

An enhanced MinHash encryption scheme for encrypted deduplication

2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022
Qiaowen Jia   +4 more
openaire   +1 more source

Encrypted Data Management with Deduplication in Cloud Computing

IEEE Cloud Computing, 2016
Cloud computing plays an important role in supporting data storage, processing, and management in the Internet of Things (IoT). To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. However, duplicated data that are encrypted under different encryption schemes could be stored in the cloud, which ...
Wang, Mingjun   +4 more
openaire   +3 more sources

A lightweight encrypted deduplication scheme supporting backup

Journal of Systems Architecture, 2023
Xinyan Wu   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy