Results 11 to 20 of about 1,828 (182)
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation
To protect data privacy, users prefer to store encrypted data in cloud servers. Cloud servers reduce the cost of storage and network bandwidth by eliminating duplicate copies.
Yan Teng +3 more
doaj +1 more source
Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi +3 more
core +1 more source
The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services.
N Jayapandian, A M J Md Zubair Rahman
doaj +1 more source
A secure data deduplication system for integrated cloud-edge networks
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G. +5 more
doaj +1 more source
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user ...
Chunfu JIA +4 more
doaj +2 more sources
Message-Locked Encryption and Secure Deduplication [PDF]
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way to achieve secure deduplication (space-efficient secure outsourced storage), a goal currently targeted by numerous cloudstorage providers.
Mihir Bellare +2 more
openaire +2 more sources
Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on the
Taek-Young Youn +4 more
doaj +1 more source
Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [PDF]
With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images ...
ZHOU Yiteng, TANG Xin, JIN Luchao
doaj +1 more source
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source

