Results 201 to 210 of about 372,243 (241)
Some of the next articles are maybe not open access.
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage
IEEE Transactions on Cloud Computing, 2022Cloud storage is a cost-effective platform to accommodate massive data at low cost. However, advances of cloud services propel data generation, which pushes storage servers to its limit. Deduplication is a popular technique enjoyed by most current cloud servers, which detects and deletes redundant data to save storage and bandwidth.
Ke Huang, Yi Mu, Fatemeh Rezaeibagha
exaly +2 more sources
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage
Automatic Control and Computer Sciences, 2020In cloud services, deduplication is a widely used data reduction technique to minimize storage and communication overhead. Nonetheless, deduplication introduces a serious security risk: a malicious client can obtain access to a file on storage by learning just a piece of information about the file. Proof of ownership schemes provides protection against
Jay Dave, Avijit Dutta, Parvez Faruki
exaly +2 more sources
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution
Computer Communications, 2016Abstract Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files would be sufficient. Albeit simple in theory, the implementation of this concept introduces many
Roberto Di Pietro +1 more
exaly +2 more sources
Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014In this paper, novel proof of retrieval (POR) and proof of ownership (POW) protocols for images based on the use of the SPIHT compression algorithm are proposed. The POR protocol can be run by the users to ensure that their images are stored securely in the cloud, and the POW protocol can be run by the cloud storage provider (CSP) to authenticate the ...
Fatema Rashid +2 more
exaly +2 more sources
Proofs of Ownership and Retrievability in Cloud Storage
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014With the development and maturity of cloud computing technology, the demand for cloud storage is growing. Deduplication is a basic requirement for cloud storage to save storage space of cloud servers. And as clients are untrusted from the perspective of the server, the notion of Proofs of Ownership (PoWs) has been proposed in client-side deduplication.
Ruiying Du +4 more
openaire +1 more source
Concurrently-secure credential ownership proofs
Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007We address the case in credential systems where a credential owner wants to show her credential to a verifier without taking the risk that the ability to prove ownership of the same (and any other) credential is transferred to the verifier. We define credential ownership proof protocols for credentials signed by standard signature schemes.
Siamak Fayyaz Shahandashti +2 more
openaire +1 more source
A proof of copyright ownership using moment-preserving
Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000, 2002A technique for proving copyright ownership of images is proposed. We use the moment-preserving to represent the characteristics of images. The secret key for copyright detection is generated from the image's feature and the owner's watermark/trademark. This strategy for a watermarking system is wholly different from traditional work.
Chin-Chen Chang 0001 +2 more
openaire +1 more source
Secure and efficient proof of ownership for deduplicated cloud storage
Proceedings of the 10th International Conference on Security of Information and Networks, 2017The rapid increment in volume of outsourced data has raised an issue of data management for Cloud Storage Server. To solve this issue, Deduplication, a data compression technique was introduced which avoids duplicate data storage. However, Deduplication is vulnerable to malicious access to genuine Cloud Clients' files.
Jay Dave +4 more
openaire +1 more source
Anticounterfeiting in Pharmaceutical Supply Chain by establishing Proof of Ownership
TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), 2019Drug counterfeiting is a serious and increasing critical issue worldwide, which puts the health of consumers and the general population at risk. WHO estimates that the world's counterfeit drug market make billions of dollars annually. It is due to the inadequate supply chain in the developing countries that one in the drug is counterfeit. People buying
Rohit Raj, Nandini Rai, Sonali Agarwal
openaire +1 more source
Towards Proofs of Ownership Beyond Bounded Leakage
2016Cloud servers save their storage cost by applying deduplication. Duplicated copies of the same file uploaded by the cloud service clients can be reduced to a single copy by maintaining a list of clients who own the same file. Nowadays it is a common practice to rely on the message digest of the file for showing its possession.
Yongjun Zhao 0001, Sherman S. M. Chow
openaire +1 more source

