Results 211 to 220 of about 372,243 (241)
Some of the next articles are maybe not open access.
Deduplication in cloud storage on the basis of proof of ownership
2016 International Conference on Computing Communication Control and automation (ICCUBEA), 2016Nowadays, more and more corporate and private users outsource their data to cloud service provider. It is provide lots of services to the users. Due to the large amount of data stored by multiple users on cloud one critical problem must be faced by users. In this large amount of data there are so many copies of repeated data.
Rupali Bhimrao Sirsat, Nitin R. Talhar
openaire +1 more source
Zero-Knowledge Watermark Detection and Proof of Ownership
2001The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any information which the verifier can use to remove the watermark. Existing proposals do not achieve this goal in terms of definition (not formally zero-knowledge), security (unproven)
André Adelsbach, Ahmad-Reza Sadeghi
openaire +1 more source
Nis-PoW: Non-interactive secure Proof of Ownership for cloud storage
Journal of Systems ArchitectureWenlong Tian, Ruixuan Li, Xuming Ye
exaly +2 more sources
Proof of ownership in deduplicated cloud storage with mobile device efficiency
IEEE Network, 2015Cloud storage such as Dropbox and Bitcasa is one of the most popular cloud services. Currently, with the prevalence of mobile cloud computing, users can even collaboratively edit the newest version of documents and synchronize the newest files on their smart mobile devices. A remarkable feature of current cloud storage is its virtually infinite storage.
Chia-Mu Yu +2 more
openaire +1 more source
A tunable proof of ownership scheme for deduplication using Bloom filters
2014 IEEE Conference on Communications and Network Security, 2014Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resources—being especially effective for consumer-grade storage services (e.g. Dropbox). Deduplication has been shown to suffer from several security weaknesses, the most severe ones enabling a malicious user to obtain possession of a file it is not
Jorge Blasco Alís +3 more
openaire +1 more source
Proofs of Ownership on Encrypted Cloud Data via Intel SGX
2020To deal with surging volume of outsourced data, cloud storage providers (CSPs) today prefer to use deduplication, in which if multiple copies of a file across cloud users are found, only one unique copy will be stored. A broadly used deduplication technique is client-side deduplication, in which the client will first check with the cloud server whether
Weijing You, Bo Chen
openaire +1 more source
Proof of cryptoasset ownership in England and Wales
SSRN Electronic JournalThe legal status of cryptoassets as property has been widely accepted, but it remains unclear who owns a cryptoasset. This article explores the determination of the owner of a cryptoasset. It argues that under the doctrine of deemed ownership, a person in possession of a thing is deemed or presumed to be its owner unless there is evidence to the ...
openaire +1 more source
Arbitrated Verifier Signature with Message Recovery for Proof of Ownership
2005There are some problems in existing digital copyright mechanism as the rightful ownership cannot be resolved by using current knowledge based intelligent technology alone. Specially, some one can provide counterfeited watermark which can be performed on a watermarked image to allow multiple claims of rightful ownerships.
openaire +1 more source
Secure Proof of Ownership for Deduplicated Cloud Storage System
International Journal of Information and Computer Security, 2022Jay Dave, Meghna Bhatt, Deep Pancholi
openaire +1 more source
Proof of Shared Ownerships and Construct A Collaborative Cloud Application
2019Distributed storage stages guarantee advantageous applications to clients for sharing records and cooperate with coordinated efforts. The main challenge in a shared cloud-based application is the security and privacy of sensitive information stored by a particular user.
S. Ganesh Velu +3 more
openaire +1 more source

