Results 51 to 60 of about 310 (139)
New method for file deduplication in cloud storage
Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting ...
Chao YANG +6 more
doaj +2 more sources
Humanitarian organisations are increasingly utilising biometric data. However, we know little about the extent and scope of this practice, as its benefits and risks have attracted all the attention so far. This paper explores the biometric practices of the United Nations Refugee Agency, the United Nations World Food Programme, the International ...
Çağlar Açιkyιldιz
wiley +1 more source
An assured deletion scheme for encrypted data in Internet of Things
With the development of Internet of Things, heterogeneous data from all kinds of sensors are processed and stored in the cloud server provider. Cloud can be regarded as one of the important layers in the Internet of Things architecture and Internet of ...
Haibing Mu, Yuanyuan Li
doaj +1 more source
Deduplication on Encrypted Data in Cloud Computing
Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources.
Aditya Tryambak Sambare +4 more
openaire +1 more source
In the Industrial Internet of Things (IIoT), the vast amount of data generated by interconnected devices presents significant challenges in storage management.
Jakkarin Lapmoon, Somchart Fugkeaw
doaj +1 more source
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and ...
Yue CHEN +4 more
doaj +2 more sources
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage.
M. Pavithra, M. Prakash, V. Vennila
doaj +1 more source
RESIST: Randomized Encryption for Deduplicated Cloud Storage System
Abstract Cloud computing offers scalable and ubiquitous storage services in a pay-as-you-go fashion. Data deduplication is one of the important technologies of cloud storage services. It reduces storage and communication costs by skipping uploading and storing redundant data copies.
Jay Dave +5 more
openaire +1 more source
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems. [PDF]
Wang Z, Gao W, Yang M, Hao R.
europepmc +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source

