Results 251 to 260 of about 386,205 (300)
Some of the next articles are maybe not open access.
Proofs of Ownership and Retrievability in Cloud Storage
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014With the development and maturity of cloud computing technology, the demand for cloud storage is growing. Deduplication is a basic requirement for cloud storage to save storage space of cloud servers. And as clients are untrusted from the perspective of the server, the notion of Proofs of Ownership (PoWs) has been proposed in client-side deduplication.
Ruiying Du +4 more
openaire +1 more source
A proof of copyright ownership using moment-preserving
Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000, 2002A technique for proving copyright ownership of images is proposed. We use the moment-preserving to represent the characteristics of images. The secret key for copyright detection is generated from the image's feature and the owner's watermark/trademark. This strategy for a watermarking system is wholly different from traditional work.
null Chin-Chen Chang +2 more
openaire +1 more source
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage
Automatic Control and Computer Sciences, 2020In cloud services, deduplication is a widely used data reduction technique to minimize storage and communication overhead. Nonetheless, deduplication introduces a serious security risk: a malicious client can obtain access to a file on storage by learning just a piece of information about the file. Proof of ownership schemes provides protection against
null Jay Dave +4 more
openaire +1 more source
Towards Proofs of Ownership Beyond Bounded Leakage
2016Cloud servers save their storage cost by applying deduplication. Duplicated copies of the same file uploaded by the cloud service clients can be reduced to a single copy by maintaining a list of clients who own the same file. Nowadays it is a common practice to rely on the message digest of the file for showing its possession.
Yongjun Zhao, Sherman S. M. Chow
openaire +1 more source
Secure and efficient proof of ownership for deduplicated cloud storage
Proceedings of the 10th International Conference on Security of Information and Networks, 2017The rapid increment in volume of outsourced data has raised an issue of data management for Cloud Storage Server. To solve this issue, Deduplication, a data compression technique was introduced which avoids duplicate data storage. However, Deduplication is vulnerable to malicious access to genuine Cloud Clients' files.
Jay Dave +4 more
openaire +1 more source
Zero-Knowledge Watermark Detection and Proof of Ownership
2001The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any information which the verifier can use to remove the watermark. Existing proposals do not achieve this goal in terms of definition (not formally zero-knowledge), security (unproven)
André Adelsbach, Ahmad-Reza Sadeghi
openaire +1 more source
Anticounterfeiting in Pharmaceutical Supply Chain by establishing Proof of Ownership
TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), 2019Drug counterfeiting is a serious and increasing critical issue worldwide, which puts the health of consumers and the general population at risk. WHO estimates that the world's counterfeit drug market make billions of dollars annually. It is due to the inadequate supply chain in the developing countries that one in the drug is counterfeit. People buying
Rohit Raj, Nandini Rai, Sonali Agarwal
openaire +1 more source
Deduplication in cloud storage on the basis of proof of ownership
2016 International Conference on Computing Communication Control and automation (ICCUBEA), 2016Nowadays, more and more corporate and private users outsource their data to cloud service provider. It is provide lots of services to the users. Due to the large amount of data stored by multiple users on cloud one critical problem must be faced by users. In this large amount of data there are so many copies of repeated data.
Rupali Bhimrao Sirsat, Nitin R. Talhar
openaire +1 more source

