Results 21 to 30 of about 310 (139)
Key-exposure resilient integrity auditing scheme with encrypted data deduplication
For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could ...
Xiangsong ZHANG, Chen LI, Zhenhua LIU
doaj +2 more sources
Key-customizable encrypted deduplication with access control for cloud storage
With the rapid development and application of the Internet, traditional storage resources have been found unable to meet the growing demand for massive data storage.
Bolun GU, Zikai XU, Weihai LI, Nenghai YU
doaj +3 more sources
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan +3 more
doaj +1 more source
Secure Cloud Data Deduplication with Efficient Re-Encryption
Data deduplication technique has been widely adopted by commercial cloud storage providers, which is important in coping with the explosive growth of data. To further protect the security of users' sensitive data in the outsourced storage mode, many secure data deduplication schemes have been designed and applied in various scenarios.
Haoran Yuan +5 more
openaire +2 more sources
Six artificial intelligence strategies advance autism research from tool optimization to paradigm shift: causal modeling, spatiotemporal networks, multimodal integration, digital twins, social cognition mapping, collaborative learning, and context‐aware interventions for precision care.
Ting Zhang +3 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Information Leakage in Encrypted Deduplication via Frequency Analysis
Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mainly build on deterministic encryption to preserve deduplication effectiveness.
Jingwei Li +4 more
openaire +2 more sources
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
Generative AI for Requirements Engineering: A Systematic Literature Review
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng +6 more
wiley +1 more source
Security control scheme for cloud data copy based on differential privacy model
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj +3 more sources

