Results 71 to 80 of about 1,828 (182)
An assured deletion scheme for encrypted data in Internet of Things
With the development of Internet of Things, heterogeneous data from all kinds of sensors are processed and stored in the cloud server provider. Cloud can be regarded as one of the important layers in the Internet of Things architecture and Internet of ...
Haibing Mu, Yuanyuan Li
doaj +1 more source
PerfWeb: How to Violate Web Privacy with Hardware Performance Events
The browser history reveals highly sensitive information about users, such as financial status, health conditions, or political views. Private browsing modes and anonymity networks are consequently important tools to preserve the privacy not only of ...
A Tang +8 more
core +1 more source
In the Industrial Internet of Things (IIoT), the vast amount of data generated by interconnected devices presents significant challenges in storage management.
Jakkarin Lapmoon, Somchart Fugkeaw
doaj +1 more source
Deduplication on Encrypted Data in Cloud Computing
Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources.
Aditya Tryambak Sambare +4 more
openaire +1 more source
ObliviSync: Practical Oblivious File Backup and Synchronization [PDF]
Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used ...
Aviv, Adam J. +3 more
core +1 more source
Prochlo: Strong Privacy for Analytics in the Crowd
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)--
Abadi M. +22 more
core +1 more source
Efficient private record linkage of very large datasets [PDF]
Increasingly, administrative data is being used for statistical pur- poses, for example registry based census taking. In practice, this usu- ally requires linking separate files containing information on the same unit, without revealing the identity of ...
Schnell, R.
core
Secure Deduplication of Encrypted Data: Refined Model and New Constructions [PDF]
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) which aims to reconcile this apparent contradiction is an active research topic. In this paper, we propose a formal security model for SDoE.
Jian Liu 0012 +3 more
openaire +3 more sources
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and ...
Yue CHEN +4 more
doaj +2 more sources
Record-Linkage from a Technical Point of View [PDF]
TRecord linkage is used for preparing sampling frames, deduplication of lists and combining information on the same object from two different databases.
Rainer Schnell
core

