Results 191 to 200 of about 4,735 (235)
Some of the next articles are maybe not open access.
Secure Deduplication for Images using Blockchain
2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2020Lot of efforts and struggle has been done by the storage administrators to handle the spiraling data like images, audios and videos. Among different data present, images are the stringent data which has to be taken care regarding storage. Most of cloud storage servers demand high cost for storage and also burden backup efficiency.
R. Aparna +2 more
openaire +1 more source
Secure Data Deduplication System using Hadoop
2020{"references": ["Ms. Rupali Bhimrao Sirsat, Prof. Nitin. R. Talhar (12\u201313 August, 2016), \"Deduplication in cloud storage on the basis of proof of ownership\", International Conference on Computing Communication Control and automation (ICCUBEA), Pune, India", "Shivansh Mishra, Surjit Singh, Syed Tqid Ali (10\u201312 July, 2018), \"MPoWS: Merged ...
Prathamesh Shekhar Joshi +4 more
openaire +1 more source
Secure image deduplication through image compression
Journal of Information Security and Applications, 2016Abstract Cloud technology has empowered its users with remarkable expediency in terms of unlimited storage, accessibility, and availability of data. It has also contributed to the tremendous growth of digital data. To encounter this frenziedly growth, data deduplication has become a central approach for Cloud Storage Providers (CSPs) since it allows ...
Fatema Rashid, Ali Miri, Isaac Woungang
openaire +1 more source
Secure image deduplication using SPIHT compression
2017 International Conference on Communication and Signal Processing (ICCSP), 2017With the explosive growth of digital data at both individual and enterprise level, there is great need for efficiently store data and utilization of storage space. With data deduplication, it eliminates redundant data from their storage, thereby reducing the backup window, improves the efficiency of storage space and utilization of network bandwidth ...
S. Preetha Bini, S. Abirami
openaire +1 more source
Secure Deduplication Method Based on Autoencoder
2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2020Message lock encryption is the basis of current secure deduplication research. However, since the theoretical basis of randomized Message-locked encryption (R-MLE) is bilinear mapping, the computational overhead is large. Although this method has semantic security and supports data deduplication, it is not practical.
Hui Qi +3 more
openaire +1 more source
Secure Deduplication on Public Cloud Storage
Proceedings of the 2019 4th International Conference on Big Data and Computing - ICBDC 2019, 2019Public cloud storage is an important resource of modern computing. One important aspect is the potential to improve economic efficiency. It can be drastically increased by leveraging deduplication techniques. The authors of this paper aim to minimize the risk of data confidentiality violation while maximizing storage utilization.
Hendrik Graupner +3 more
openaire +1 more source
HEDup: Secure Deduplication with Homomorphic Encryption
2015 IEEE International Conference on Networking, Architecture and Storage (NAS), 2015Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers (CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest.
Rodel Miguel +2 more
openaire +1 more source
Secure Random Encryption for Deduplicated Storage
2017In Storage Services, Deduplication is used to reduce the data size by eliminating storage of duplicate data. Deduplication is an effective data reduction technique to minimize the storage cost as well as communication cost. However, Deduplication raises significant security issues. Malicious users and semi-trusted Storage Server tries to learn the data
Jay Dave +4 more
openaire +1 more source
Secure Auditing and Deduplicating Data in Cloud
IEEE Transactions on Computers, 2016As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data ...
Jingwei Li +3 more
openaire +1 more source
Secure Deduplication Storage Systems with Keyword Search
2014 IEEE 28th International Conference on Advanced Information Networking and Applications, 2014Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage.
Jin Li +3 more
openaire +1 more source

