Results 261 to 270 of about 386,205 (300)
Some of the next articles are maybe not open access.

Proofs of Ownership on Encrypted Cloud Data via Intel SGX

2020
To deal with surging volume of outsourced data, cloud storage providers (CSPs) today prefer to use deduplication, in which if multiple copies of a file across cloud users are found, only one unique copy will be stored. A broadly used deduplication technique is client-side deduplication, in which the client will first check with the cloud server whether
Weijing You, Bo Chen
openaire   +1 more source

Proof of ownership in deduplicated cloud storage with mobile device efficiency

IEEE Network, 2015
Cloud storage such as Dropbox and Bitcasa is one of the most popular cloud services. Currently, with the prevalence of mobile cloud computing, users can even collaboratively edit the newest version of documents and synchronize the newest files on their smart mobile devices. A remarkable feature of current cloud storage is its virtually infinite storage.
Chia-mu Yu   +2 more
openaire   +1 more source

Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression

2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014
In this paper, novel proof of retrieval (POR) and proof of ownership (POW) protocols for images based on the use of the SPIHT compression algorithm are proposed. The POR protocol can be run by the users to ensure that their images are stored securely in the cloud, and the POW protocol can be run by the cloud storage provider (CSP) to authenticate the ...
Fatema Rashid, Ali Miri, Isaac Woungang
openaire   +1 more source

A tunable proof of ownership scheme for deduplication using Bloom filters

2014 IEEE Conference on Communications and Network Security, 2014
Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resources—being especially effective for consumer-grade storage services (e.g. Dropbox). Deduplication has been shown to suffer from several security weaknesses, the most severe ones enabling a malicious user to obtain possession of a file it is not
Jorge Blasco   +3 more
openaire   +1 more source

Proof of cryptoasset ownership in England and Wales

SSRN Electronic Journal
The legal status of cryptoassets as property has been widely accepted, but it remains unclear who owns a cryptoasset. This article explores the determination of the owner of a cryptoasset. It argues that under the doctrine of deemed ownership, a person in possession of a thing is deemed or presumed to be its owner unless there is evidence to the ...
openaire   +1 more source

Juridical Analysis of Electronic Certificates as Proof of Land Ownership

International Journal of Social Science and Human Research
In the current modern era, the government is showing the establishment of electronic certificate regulations to create services that make it easier for the community. Electronic certificates offer a more secure and efficient system, allowing landowners to access ownership information digitally.
Ni Gusti Agung Tri Meilany Adhyaksa Atmaja,   +2 more
openaire   +1 more source

Anonymous deduplication of encrypted data with proof of ownership in cloud storage

2013 IEEE/CIC International Conference on Communications in China (ICCC), 2013
Cloud computing is viewed as the next generation architecture of IT companies. As promising as it is, cloud computing also brings forth many new security issues when users outsource sensitive data to cloud servers. To keep sensitive users' data confidential against untrusted servers, existing solutions usually apply cryptographic methods.
Xuexue Jin   +4 more
openaire   +1 more source

Ownership Proofs of Digital Works Based on Secure Multiparty Computation

Journal of Software, 2006
Ownership proofs of digital works allow to justify the copyright claim to the buyers without revealing any secret information and prevent the owner from deceiving without the assumption of the trusted individual. This paper proposes an ownership proofs scheme for digital works based on proactive verifiable secret sharing and secure multiparty ...
openaire   +1 more source

Secure Proof of Ownership for Deduplicated Cloud Storage System

International Journal of Information and Computer Security, 2022
Jay Dave, Meghna Bhatt, Deep Pancholi
openaire   +1 more source

Proof of Shared Ownerships and Construct A Collaborative Cloud Application

2019
Distributed storage stages guarantee advantageous applications to clients for sharing records and cooperate with coordinated efforts. The main challenge in a shared cloud-based application is the security and privacy of sensitive information stored by a particular user.
S. Ganesh Velu   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy