Results 11 to 20 of about 310 (139)
Authorized Deduplication of Encrypted data in Cloud
Cloud computing technology is rapidly developing nowadays. The number of files stored and processed is increasing per day. This increase brings severe challenge in requirement of space, processing power and bandwidth. More than half of the data generated in the cloud is duplicate data.
Milind B. Waghmare, Suhasini V. Padwekar
openaire +1 more source
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user ...
Chunfu JIA +4 more
doaj +2 more sources
Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on the
Taek-Young Youn +4 more
doaj +1 more source
Message-Locked Encryption and Secure Deduplication [PDF]
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way to achieve secure deduplication (space-efficient secure outsourced storage), a goal currently targeted by numerous cloudstorage providers.
Mihir Bellare +2 more
openaire +1 more source
Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [PDF]
With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images ...
ZHOU Yiteng, TANG Xin, JIN Luchao
doaj +1 more source
Deduplication on Encrypted Big Data in Cloud
Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form.
Ding, Wenxiu +5 more
openaire +4 more sources
Secure Encrypted Data With Authorized Deduplication in Cloud
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong +4 more
doaj +1 more source
The existing privacy big data encryption algorithm cannot achieve real-time update of big data and repeat more big data, resulting in low attack resistance and more malicious attack data.
Lei Liu, Xue Liu, Jiahua Wan
doaj +1 more source
CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu +3 more
doaj +1 more source
A secure deduplication scheme for encrypted data
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is ...
Vishal Passricha +3 more
openaire +2 more sources

