Results 51 to 60 of about 310 (139)

New method for file deduplication in cloud storage

open access: yesTongxin xuebao, 2017
Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting ...
Chao YANG   +6 more
doaj   +2 more sources

‘I know you like the back of my hand’: biometric practices of humanitarian organisations in international aid

open access: yesDisasters, Volume 48, Issue 2, April 2024.
Humanitarian organisations are increasingly utilising biometric data. However, we know little about the extent and scope of this practice, as its benefits and risks have attracted all the attention so far. This paper explores the biometric practices of the United Nations Refugee Agency, the United Nations World Food Programme, the International ...
Çağlar Açιkyιldιz
wiley   +1 more source

An assured deletion scheme for encrypted data in Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
With the development of Internet of Things, heterogeneous data from all kinds of sensors are processed and stored in the cloud server provider. Cloud can be regarded as one of the important layers in the Internet of Things architecture and Internet of ...
Haibing Mu, Yuanyuan Li
doaj   +1 more source

Deduplication on Encrypted Data in Cloud Computing

open access: yesInternational Journal of Innovative Science and Research Technology (IJISRT)
Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources.
Aditya Tryambak Sambare   +4 more
openaire   +1 more source

A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments

open access: yesIEEE Access
In the Industrial Internet of Things (IIoT), the vast amount of data generated by interconnected devices presents significant challenges in storage management.
Jakkarin Lapmoon, Somchart Fugkeaw
doaj   +1 more source

Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership

open access: yesTongxin xuebao, 2015
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and ...
Yue CHEN   +4 more
doaj   +2 more sources

BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage.
M. Pavithra, M. Prakash, V. Vennila
doaj   +1 more source

RESIST: Randomized Encryption for Deduplicated Cloud Storage System

open access: yesArabian Journal for Science and Engineering
Abstract Cloud computing offers scalable and ubiquitous storage services in a pay-as-you-go fashion. Data deduplication is one of the important technologies of cloud storage services. It reduces storage and communication costs by skipping uploading and storing redundant data copies.
Jay Dave   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy