Results 21 to 30 of about 1,828 (182)
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices [PDF]
Contains fulltext : 187230.pdf (preprint version ) (Open ...
Korak, Thomas +3 more
core +10 more sources
Secure Cloud Data Deduplication with Efficient Re-Encryption
Data deduplication technique has been widely adopted by commercial cloud storage providers, which is important in coping with the explosive growth of data. To further protect the security of users' sensitive data in the outsourced storage mode, many secure data deduplication schemes have been designed and applied in various scenarios.
Haoran Yuan +5 more
openaire +2 more sources
Data access control policy of encrypted deduplication system
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was ...
Chunfu JIA, Guanxiong HA, Ruiqi LI
doaj +2 more sources
An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized auditing deduplication Model in Cloud Storage System [PDF]
As the cloud computing technology develops during the recent days, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management.
Mamatha, K. (K) +2 more
core +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Authorized Deduplication of Encrypted data in Cloud
Cloud computing technology is rapidly developing nowadays. The number of files stored and processed is increasing per day. This increase brings severe challenge in requirement of space, processing power and bandwidth. More than half of the data generated in the cloud is duplicate data.
Milind B. Waghmare, Suhasini V. Padwekar
openaire +1 more source
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation [PDF]
Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results.
A Beimel +57 more
core +2 more sources
The existing privacy big data encryption algorithm cannot achieve real-time update of big data and repeat more big data, resulting in low attack resistance and more malicious attack data.
Lei Liu, Xue Liu, Jiahua Wan
doaj +1 more source
Greening cloud-enabled big data storage forensics : Syncany as a case study [PDF]
The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences.
Abdullah, MT +4 more
core +3 more sources
A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU
Rekeying is a common way to protect outsourced data against key compromise and to enable data owners to enforce access control on their data. However, existing rekeying schemes are difficult to apply to the encryption dedu plication system which uses message-locked encryption for allowing the server to perform deduplication on users’ outsourced data ...
Guanxiong Ha +4 more
openaire +1 more source

