Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation [PDF]
Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results.
A Beimel +57 more
core +2 more sources
Data deduplication can solve the problem of resource wastage caused by duplicated data. However, due to the limited resources of Internet of Things (IoT) devices, applying data deduplication to IoT scenarios is challenging.
Zeng Wu +3 more
doaj +1 more source
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce ...
Nagappan Mageshkumar +5 more
doaj +1 more source
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W +3 more
openaire +3 more sources
Design and Implementation of a State-Wide Network for Near Real-Time Public Health Surveillance and Research: The Minnesota Electronic Health Record Consortium Experience. [PDF]
ABSTRACT Objective The Minnesota Electronic Health Record Consortium (MNEHRC) was established during the early days of the COVID‐19 pandemic to provide data for public health surveillance from the eleven largest health care systems in Minnesota. Methods This is a descriptive study of the Consortium, which is a federated network that implements best ...
Johnson SG +12 more
europepmc +2 more sources
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi +3 more
core +1 more source
Data popularity-based encrypted deduplication scheme without third-party servers
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording ...
Guanxiong HA +3 more
doaj +2 more sources
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source
CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu +3 more
doaj +1 more source

