Results 11 to 20 of about 1,828 (182)

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation

open access: yesIEEE Access, 2023
To protect data privacy, users prefer to store encrypted data in cloud servers. Cloud servers reduce the cost of storage and network bandwidth by eliminating duplicate copies.
Yan Teng   +3 more
doaj   +1 more source

Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]

open access: yes, 2015
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi   +3 more
core   +1 more source

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

open access: yesBrazilian Archives of Biology and Technology, 2018
The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services.
N Jayapandian, A M J Md Zubair Rahman
doaj   +1 more source

A secure data deduplication system for integrated cloud-edge networks

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G.   +5 more
doaj   +1 more source

AONT-and-NTRU-based rekeying scheme for encrypted deduplication

open access: yesTongxin xuebao, 2021
Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user ...
Chunfu JIA   +4 more
doaj   +2 more sources

Message-Locked Encryption and Secure Deduplication [PDF]

open access: yes, 2013
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way to achieve secure deduplication (space-efficient secure outsourced storage), a goal currently targeted by numerous cloudstorage providers.
Mihir Bellare   +2 more
openaire   +2 more sources

Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms

open access: yesEnergies, 2020
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on the
Taek-Young Youn   +4 more
doaj   +1 more source

Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [PDF]

open access: yesJisuanji kexue
With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images ...
ZHOU Yiteng, TANG Xin, JIN Luchao
doaj   +1 more source

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy