Results 141 to 150 of about 1,828 (182)
Some of the next articles are maybe not open access.

Encrypted Data Management with Deduplication in Cloud Computing

IEEE Cloud Computing, 2016
Cloud computing plays an important role in supporting data storage, processing, and management in the Internet of Things (IoT). To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. However, duplicated data that are encrypted under different encryption schemes could be stored in the cloud, which ...
Wang, Mingjun   +4 more
openaire   +3 more sources

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018
Cross-user deduplication is an emerging technique to ease the burden of cloud storage in big data era by storing only one copy of duplicate data. Efficiency reflects the feasibility and is a basic consideration when applying the deduplication scheme. However, in order to achieve certain level of security, existing works suffer from heavy overhead of ...
Xin Tang   +3 more
openaire   +1 more source

Secure Encrypted Data Deduplication Based on Data Popularity

Mobile Networks and Applications, 2020
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult. Current solutions rely heavily on trusted third parties, and does not recognize the popularity of data, resulting in unsatisfying security and efficiency.
Yunlong He   +3 more
openaire   +1 more source

Secure Random Encryption for Deduplicated Storage

2017
In Storage Services, Deduplication is used to reduce the data size by eliminating storage of duplicate data. Deduplication is an effective data reduction technique to minimize the storage cost as well as communication cost. However, Deduplication raises significant security issues. Malicious users and semi-trusted Storage Server tries to learn the data
Jay Dave   +4 more
openaire   +1 more source

ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of deduplication unfortunately come with a high
Pasquale Puzio   +3 more
openaire   +1 more source

Interactive Message-Locked Encryption and Secure Deduplication

2015
This paper considers the problem of secure storage of outsourced data in a way that permits deduplication. We are for the first time able to provide privacy for messages that are both correlated and dependent on the public system parameters. The new ingredient that makes this possible is interaction.
Mihir Bellare, Sriram Keelveedhi
openaire   +2 more sources

Enabling Encrypted Cloud Media Center with Secure Deduplication

Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, 2015
Multimedia contents, especially videos, are being exponentially generated today. Due to the limited local storage, people are willing to store the videos at the remote cloud media center for its low cost and scalable storage. However, videos may have to be encrypted before outsourcing for privacy concerns. For practical purposes, the cloud media center
Yifeng Zheng   +5 more
openaire   +1 more source

Toward Encrypted Cloud Media Center With Secure Deduplication

IEEE Transactions on Multimedia, 2017
The explosive growth of multimedia contents, especially videos, is pushing forward the paradigm of cloud-based media hosting today. However, the wide attacking surface of the public cloud and the growing security awareness from the society are both calling for data encryption before outsourcing to cloud.
Yifeng Zheng   +5 more
openaire   +1 more source

Distributed Key Generation for Encrypted Deduplication

Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Large-scale cloud storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2) users demand encryption of their data to ensure privacy.
openaire   +1 more source

Information Leakage in Encrypted Deduplication via Frequency Analysis

2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a deterministic encryption approach that encrypts each plaintext chunk with a key derived from the content of the chunk itself, so that identical ...
Jingwei Li 0001   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy