Results 41 to 50 of about 310 (139)

Secure Deduplication of Encrypted Data: Refined Model and New Constructions [PDF]

open access: yes, 2018
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) which aims to reconcile this apparent contradiction is an active research topic. In this paper, we propose a formal security model for SDoE.
Jian Liu, Li Duan, Yong Li, N. Asokan
openaire   +2 more sources

Elevating Cloud Security With Advanced Trust Evaluation and Optimization of Hybrid Fireberg Technique

open access: yesIET Software, Volume 2025, Issue 1, 2025.
The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns. Existing models often struggle to achieve an optimal balance between these factors, particularly in dynamic cloud environments.
Himani Saini   +9 more
wiley   +1 more source

Game Theoretical Analysis on Encrypted Cloud Data Deduplication [PDF]

open access: yesIEEE Transactions on Industrial Informatics, 2019
Duplicated data storage wastes memory resources and brings extra data-management load and cost to cloud service providers (CSPs). Various feasible schemes to deduplicate encrypted cloud data have been reported. However, their successful deployment in practice depends on whether all system players or stakeholders are willing to accept and execute them ...
Yan, Zheng   +6 more
openaire   +2 more sources

Service Continuity Support Initiatives of Community‐Based Healthcare and Social Care Organisations in Emergencies: A Systematic Review

open access: yesHealth &Social Care in the Community, Volume 2025, Issue 1, 2025.
Objective The aim of this systematic review is twofold: firstly, to identify the practice changes and interventions that have been adopted and implemented by community‐based health and social care organisations to ensure service continuity; and second, to explore high‐quality research‐driven recommendations regarding the development, implementation and
Farhana Haque Nila   +4 more
wiley   +1 more source

Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack

open access: yesTongxin xuebao, 2020
For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer ...
Xin TANG   +3 more
doaj   +2 more sources

A Systematic Review of Intelligent Agents, Language Models, and Recurrent Neural Networks in Industrial Maintenance: Driving Value Creation for the Mining Sector

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
This PRISMA 2020–compliant systematic review examines how intelligent agents, large language models (LLMs), and recurrent neural networks (RNNs) can be combined for industrial maintenance, with a sector‐specific focus on mining. Scopus and Web of Science (2018–2025) were searched using replicable queries, and a dual text‐representation pipeline (TF–IDF
Luis Rojas   +3 more
wiley   +1 more source

Efficacy of Digital Health Interventions Used for Adolescent's Sexual Health: An Umbrella Review

open access: yesHealth Science Reports, Volume 7, Issue 12, December 2024.
ABSTRACT Background and Aims Adolescents face many barriers and challenges associated with sexual and reproductive health (SRH). These barriers can include limited access to youth‐friendly healthcare services, lack of information, and stigma. Digital health interventions has the capability to enhance clinical management.
Sanam Borji‐Navan   +2 more
wiley   +1 more source

A survey analysis of quantum computing adoption and the paradigm of privacy engineering

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based ...
Nour Mousa, Farid Shirazi
wiley   +1 more source

UReslham: Radar reflectivity inversion for smart agriculture with spatial federated learning over geostationary satellite observations

open access: yesComputational Intelligence, Volume 40, Issue 3, June 2024.
Abstract The frequent occurrence of severe convective weather has certain adverse effects on the smart agriculture industry. To enhance the prediction of severe convective weather, the inversion model effectively fills radar reflectivity data gaps by leveraging geostationary satellite data, offering more comprehensive and accurate support for ...
Zhengyong Jin   +4 more
wiley   +1 more source

Design of a large language model for improving customer service in telecom operators

open access: yesElectronics Letters, Volume 60, Issue 10, May 2024.
This study addresses the inefficiencies of traditional customer service systems in telecom operations, which need help with timely data retrieval and precision. A customized large language model (LLM) is developed using the LangChain framework tailored for telecom customer service.
Ma Xiaoliang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy