A CAE model-based secure deduplication method [PDF]
Cloud storage services are widely used due to their convenience and flexibility. However, the presence of a large amount of duplicate data in the cloud imposes a significant storage burden and increases the risk of privacy breaches. Random Message Locked
Chunbo Wang +3 more
doaj +2 more sources
Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication [PDF]
Cloud computing enables data storage and application deployment over the internet, offering benefits such as mobility, resource pooling, and scalability. However, it also presents major challenges, particularly in managing shared resources, ensuring data
J. K. Periasamy +3 more
doaj +2 more sources
A Review on Secure Data Deduplication: Cloud Storage Security Issue
Cloud storage service providers caters to the need of organizations and individuals by allowing them to store, transfer and backup their ever-increasing amount of data at low cost along with providing access to the other resources of cloud. For providing
Priteshkumar Prajapati, Parth Shah
doaj +2 more sources
Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This
Mira Lee, Minhye Seo
doaj +1 more source
Secure biometric authentication with de-duplication on distributed cloud storage [PDF]
Cloud computing is one of the evolving fields of technology, which allows storage, access of data, programs, and their execution over the internet with offering a variety of information related services.
Vinoth Kumar M +4 more
doaj +2 more sources
SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating
Deduplication eliminates duplicated data copies and reduces storage costs of cloud service providers. However, deduplication of encrypted data is difficult.
Shuguang Zhang +3 more
doaj +1 more source
Data Integrity Verification Method with Secure Deduplication in Cloud Storage [PDF]
For the secure issues of outsourced data in cloud storage,a new method of data integrity verification is proposed,which can support secure deduplication and public verification.The method combines the advantages of Proofs of Ownership(POW) and Proofs of ...
ZHANG Lihong,CHEN Jing,DU Ruiying,HE Kun,CHEN Jiong
doaj +1 more source
Secure EMR Classification and Deduplication Using MapReduce
Healthcare providers generate huge amount of data every day through registration, lab results, prescriptions, and others. This is stored in the form of Electronic Medical Records (EMR) in a central repository.
A. V. Usharani, Girija Attigeri
doaj +1 more source
A Secure Two-Phase Data Deduplication Scheme [PDF]
—Data grows at the impressive rate of 50% per year, and 75% of the digital world is a copy 1 ! Although keeping multiple copies of data is necessary to guarantee their availability and long term durability, in many situations the amount of data redundancy is immoderate.
Meye, Pierre +3 more
openaire +2 more sources
An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized auditing deduplication Model in Cloud Storage System [PDF]
As the cloud computing technology develops during the recent days, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management.
Mamatha, K. (K) +2 more
core +1 more source

