Results 41 to 50 of about 310 (139)
Secure Deduplication of Encrypted Data: Refined Model and New Constructions [PDF]
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) which aims to reconcile this apparent contradiction is an active research topic. In this paper, we propose a formal security model for SDoE.
Jian Liu, Li Duan, Yong Li, N. Asokan
openaire +2 more sources
The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns. Existing models often struggle to achieve an optimal balance between these factors, particularly in dynamic cloud environments.
Himani Saini +9 more
wiley +1 more source
Game Theoretical Analysis on Encrypted Cloud Data Deduplication [PDF]
Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them ...
Yan, Zheng +6 more
openaire +2 more sources
Objective The aim of this systematic review is twofold: firstly, to identify the practice changes and interventions that have been adopted and implemented by community‐based health and social care organisations to ensure service continuity; and second, to explore high‐quality research‐driven recommendations regarding the development, implementation and
Farhana Haque Nila +4 more
wiley +1 more source
For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer ...
Xin TANG +3 more
doaj +2 more sources
This PRISMA 2020–compliant systematic review examines how intelligent agents, large language models (LLMs), and recurrent neural networks (RNNs) can be combined for industrial maintenance, with a sector‐specific focus on mining. Scopus and Web of Science (2018–2025) were searched using replicable queries, and a dual text‐representation pipeline (TF–IDF
Luis Rojas +3 more
wiley +1 more source
Efficacy of Digital Health Interventions Used for Adolescent's Sexual Health: An Umbrella Review
ABSTRACT Background and Aims Adolescents face many barriers and challenges associated with sexual and reproductive health (SRH). These barriers can include limited access to youth‐friendly healthcare services, lack of information, and stigma. Digital health interventions has the capability to enhance clinical management.
Sanam Borji‐Navan +2 more
wiley +1 more source
A survey analysis of quantum computing adoption and the paradigm of privacy engineering
Abstract This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based ...
Nour Mousa, Farid Shirazi
wiley +1 more source
Abstract The frequent occurrence of severe convective weather has certain adverse effects on the smart agriculture industry. To enhance the prediction of severe convective weather, the inversion model effectively fills radar reflectivity data gaps by leveraging geostationary satellite data, offering more comprehensive and accurate support for ...
Zhengyong Jin +4 more
wiley +1 more source
Design of a large language model for improving customer service in telecom operators
This study addresses the inefficiencies of traditional customer service systems in telecom operations, which need help with timely data retrieval and precision. A customized large language model (LLM) is developed using the LangChain framework tailored for telecom customer service.
Ma Xiaoliang +4 more
wiley +1 more source

