Results 71 to 80 of about 1,828 (182)

An assured deletion scheme for encrypted data in Internet of Things

open access: yesAdvances in Mechanical Engineering, 2019
With the development of Internet of Things, heterogeneous data from all kinds of sensors are processed and stored in the cloud server provider. Cloud can be regarded as one of the important layers in the Internet of Things architecture and Internet of ...
Haibing Mu, Yuanyuan Li
doaj   +1 more source

PerfWeb: How to Violate Web Privacy with Hardware Performance Events

open access: yes, 2017
The browser history reveals highly sensitive information about users, such as financial status, health conditions, or political views. Private browsing modes and anonymity networks are consequently important tools to preserve the privacy not only of ...
A Tang   +8 more
core   +1 more source

A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments

open access: yesIEEE Access
In the Industrial Internet of Things (IIoT), the vast amount of data generated by interconnected devices presents significant challenges in storage management.
Jakkarin Lapmoon, Somchart Fugkeaw
doaj   +1 more source

Deduplication on Encrypted Data in Cloud Computing

open access: yesInternational Journal of Innovative Science and Research Technology (IJISRT)
Cloud storage is a crucial component of cloud computing, allowing users to expand their storage without upgrading their equipment and overcome resource constraints. Cloud users' data is always encrypted before being outsourced to ensure their security and privacy. However, encrypted data may result in a significant waste of cloud resources.
Aditya Tryambak Sambare   +4 more
openaire   +1 more source

ObliviSync: Practical Oblivious File Backup and Synchronization [PDF]

open access: yes, 2016
Oblivious RAM (ORAM) protocols are powerful techniques that hide a client's data as well as access patterns from untrusted service providers. We present an oblivious cloud storage system, ObliviSync, that specifically targets one of the most widely-used ...
Aviv, Adam J.   +3 more
core   +1 more source

Prochlo: Strong Privacy for Analytics in the Crowd

open access: yes, 2017
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)--
Abadi M.   +22 more
core   +1 more source

Efficient private record linkage of very large datasets [PDF]

open access: yes, 2013
Increasingly, administrative data is being used for statistical pur- poses, for example registry based census taking. In practice, this usu- ally requires linking separate files containing information on the same unit, without revealing the identity of ...
Schnell, R.
core  

Secure Deduplication of Encrypted Data: Refined Model and New Constructions [PDF]

open access: yes, 2018
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) which aims to reconcile this apparent contradiction is an active research topic. In this paper, we propose a formal security model for SDoE.
Jian Liu 0012   +3 more
openaire   +3 more sources

Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership

open access: yesTongxin xuebao, 2015
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and ...
Yue CHEN   +4 more
doaj   +2 more sources

Record-Linkage from a Technical Point of View [PDF]

open access: yes
TRecord linkage is used for preparing sampling frames, deduplication of lists and combining information on the same object from two different databases.
Rainer Schnell
core  

Home - About - Disclaimer - Privacy