Results 11 to 20 of about 4,787 (231)

Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage [PDF]

open access: yes, 2015
The cloud storage services bring forth infinite storage capacity and flexible access capability to store and share large-scale content. The convenience brought forth has attracted both individual and enterprise users to outsource data service to a cloud
Aung, Khin Mi Mi   +3 more
core   +1 more source

An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized auditing deduplication Model in Cloud Storage System [PDF]

open access: yes, 2017
As the cloud computing technology develops during the recent days, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management.
Mamatha, K. (K)   +2 more
core   +1 more source

A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain

open access: yesConnection Science, 2022
Data deduplication can solve the problem of resource wastage caused by duplicated data. However, due to the limited resources of Internet of Things (IoT) devices, applying data deduplication to IoT scenarios is challenging.
Zeng Wu   +3 more
doaj   +1 more source

Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

open access: yesInternational Journal of Intelligent Networks, 2023
Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of cloud storage due to its ability to effectively reduce ...
Nagappan Mageshkumar   +5 more
doaj   +1 more source

Secure data deduplication

open access: yesProceedings of the 4th ACM international workshop on Storage security and survivability, 2008
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W   +3 more
openaire   +3 more sources

Data popularity-based encrypted deduplication scheme without third-party servers

open access: yesTongxin xuebao, 2022
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording ...
Guanxiong HA   +3 more
doaj   +2 more sources

CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing

open access: yesIEEE Access, 2019
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu   +3 more
doaj   +1 more source

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation [PDF]

open access: yes, 2017
Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results.
A Beimel   +57 more
core   +2 more sources

Secure Deduplication Techniques: A Study

open access: yesInternational Journal of Computer Applications, 2016
Currently usage of cloud storage is increasing and to overcome increasing data issue, Data deduplication techniques are used. Moreover the Cloud storage service is provided by third party cloud providers thus security of data is needed. Data Deduplication techniques cannot be applied directly with security mechanisms.
Dheeraj Kumar, Vruti Satish
openaire   +1 more source

Home - About - Disclaimer - Privacy