Results 21 to 30 of about 1,828 (182)

Secure Cloud Data Deduplication with Efficient Re-Encryption

open access: yesIEEE Transactions on Services Computing, 2022
Data deduplication technique has been widely adopted by commercial cloud storage providers, which is important in coping with the explosive growth of data. To further protect the security of users' sensitive data in the outsourced storage mode, many secure data deduplication schemes have been designed and applied in various scenarios.
Haoran Yuan   +5 more
openaire   +2 more sources

Data access control policy of encrypted deduplication system

open access: yesTongxin xuebao, 2020
To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was ...
Chunfu JIA, Guanxiong HA, Ruiqi LI
doaj   +2 more sources

An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized auditing deduplication Model in Cloud Storage System [PDF]

open access: yes, 2017
As the cloud computing technology develops during the recent days, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management.
Mamatha, K. (K)   +2 more
core   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Authorized Deduplication of Encrypted data in Cloud

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Cloud computing technology is rapidly developing nowadays. The number of files stored and processed is increasing per day. This increase brings severe challenge in requirement of space, processing power and bandwidth. More than half of the data generated in the cloud is duplicate data.
Milind B. Waghmare, Suhasini V. Padwekar
openaire   +1 more source

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation [PDF]

open access: yes, 2017
Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results.
A Beimel   +57 more
core   +2 more sources

Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology

open access: yesJournal of Mathematics, 2022
The existing privacy big data encryption algorithm cannot achieve real-time update of big data and repeat more big data, resulting in low attack resistance and more malicious attack data.
Lei Liu, Xue Liu, Jiahua Wan
doaj   +1 more source

Greening cloud-enabled big data storage forensics : Syncany as a case study [PDF]

open access: yes, 2017
The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences.
Abdullah, MT   +4 more
core   +3 more sources

A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU

open access: yesICST Transactions on Security and Safety, 2021
Rekeying is a common way to protect outsourced data against key compromise and to enable data owners to enforce access control on their data. However, existing rekeying schemes are difficult to apply to the encryption dedu plication system which uses message-locked encryption for allowing the server to perform deduplication on users’ outsourced data ...
Guanxiong Ha   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy