Results 31 to 40 of about 1,828 (182)
CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu +3 more
doaj +1 more source
Key-exposure resilient integrity auditing scheme with encrypted data deduplication
For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could ...
Xiangsong ZHANG, Chen LI, Zhenhua LIU
doaj +2 more sources
Key-customizable encrypted deduplication with access control for cloud storage
With the rapid development and application of the Internet, traditional storage resources have been found unable to meet the growing demand for massive data storage.
Bolun GU, Zikai XU, Weihai LI, Nenghai YU
doaj +3 more sources
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan +3 more
doaj +1 more source
A Compression Technique Exploiting References for Data Synchronization Services [PDF]
Department of Computer Science and EngineeringIn a variety of network applications, there exists significant amount of shared data between two end hosts. Examples include data synchronization services that replicate data from one node to another.
Nam, Wooseung
core
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley +1 more source
A secure deduplication scheme for encrypted data
Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is ...
Vishal Passricha +3 more
openaire +3 more sources
Six artificial intelligence strategies advance autism research from tool optimization to paradigm shift: causal modeling, spatiotemporal networks, multimodal integration, digital twins, social cognition mapping, collaborative learning, and context‐aware interventions for precision care.
Ting Zhang +3 more
wiley +1 more source
Security challenges of small cell as a service in virtualized mobile edge computing environments [PDF]
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are ...
A Fragkiadakis +31 more
core +5 more sources

