Results 21 to 30 of about 310 (139)

Key-exposure resilient integrity auditing scheme with encrypted data deduplication

open access: yesTongxin xuebao, 2019
For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could ...
Xiangsong ZHANG, Chen LI, Zhenhua LIU
doaj   +2 more sources

Key-customizable encrypted deduplication with access control for cloud storage

open access: yes网络与信息安全学报
With the rapid development and application of the Internet, traditional storage resources have been found unable to meet the growing demand for massive data storage.
Bolun GU, Zikai XU, Weihai LI, Nenghai YU
doaj   +3 more sources

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

open access: yesSensors, 2018
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan   +3 more
doaj   +1 more source

Secure Cloud Data Deduplication with Efficient Re-Encryption

open access: yesIEEE Transactions on Services Computing, 2022
Data deduplication technique has been widely adopted by commercial cloud storage providers, which is important in coping with the explosive growth of data. To further protect the security of users' sensitive data in the outsourced storage mode, many secure data deduplication schemes have been designed and applied in various scenarios.
Haoran Yuan   +5 more
openaire   +2 more sources

Six artificial intelligence innovation strategies applied to autism spectrum disorder research: A narrative review

open access: yesPediatric Investigation, EarlyView.
Six artificial intelligence strategies advance autism research from tool optimization to paradigm shift: causal modeling, spatiotemporal networks, multimodal integration, digital twins, social cognition mapping, collaborative learning, and context‐aware interventions for precision care.
Ting Zhang   +3 more
wiley   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Information Leakage in Encrypted Deduplication via Frequency Analysis

open access: yesACM Transactions on Storage, 2020
Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mainly build on deterministic encryption to preserve deduplication effectiveness.
Jingwei Li   +4 more
openaire   +2 more sources

Towards Enhancing Healthcare Data Privacy: Integrating BioClinicalBERT With Polyalphabetic Cipher for Entity Recognition and Anonymization

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu   +3 more
wiley   +1 more source

Generative AI for Requirements Engineering: A Systematic Literature Review

open access: yesSoftware: Practice and Experience, Volume 56, Issue 2, Page 141-170, February 2026.
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng   +6 more
wiley   +1 more source

Security control scheme for cloud data copy based on differential privacy model

open access: yes网络与信息安全学报, 2017
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj   +3 more sources

Home - About - Disclaimer - Privacy