Results 201 to 210 of about 4,825 (248)
Some of the next articles are maybe not open access.

HEDup: Secure Deduplication with Homomorphic Encryption

2015 IEEE International Conference on Networking, Architecture and Storage (NAS), 2015
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers (CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest.
Miguel Rodel Felipe   +2 more
openaire   +1 more source

Secure Enterprise Data Deduplication in the Cloud

2013 IEEE Sixth International Conference on Cloud Computing, 2013
With the advent of cloud computing as a new paradigm and technology, and the increased tendency of decision makers to envision a staged migration to cloud services, most enterprises are choosing to outsource their data to cloud storage providers, for better management of their IT resources, in terms of security, control, space and storage costs.
Fatema Rashid, Ali Miri, Isaac Woungang
openaire   +1 more source

An evaluation of recent secure deduplication proposals

Journal of Information Security and Applications, 2016
Deduplication is widely used by cloud storage providers to cut costs, by storing and uploading a single instance of identical files shared across multiple user accounts. However, cross-account deduplication introduces several new side-channel attacks on user privacy; see e.g., Harnik et?al.
Vladimir Rabotka, Mohammad Mannan
openaire   +1 more source

PerfectDedup: Secure Data Deduplication

2016
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges.
Pasquale Puzio   +3 more
openaire   +1 more source

Secure Auditing and Deduplicating Data in Cloud

IEEE Transactions on Computers, 2016
As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data ...
Jingwei Li 0001   +3 more
openaire   +1 more source

Secure Deduplication on Public Cloud Storage

Proceedings of the 2019 4th International Conference on Big Data and Computing - ICBDC 2019, 2019
Public cloud storage is an important resource of modern computing. One important aspect is the potential to improve economic efficiency. It can be drastically increased by leveraging deduplication techniques. The authors of this paper aim to minimize the risk of data confidentiality violation while maximizing storage utilization.
Hendrik Graupner   +3 more
openaire   +1 more source

Secure deduplication on mobile devices

Proceedings of the 2011 Workshop on Open Source and Design of Communication, 2011
An increased use of mobile devices such as smart phones, PDAs and tablet computers with capabilities of storing and processing is rapidly growing. It allows users to carry an increasing volume of data, the value of this information must be protected from loss, theft or any kind of accident which may occur with the devices, making the backup process a ...
Luis Marques, Carlos J. Costa
openaire   +1 more source

Secure Random Encryption for Deduplicated Storage

2017
In Storage Services, Deduplication is used to reduce the data size by eliminating storage of duplicate data. Deduplication is an effective data reduction technique to minimize the storage cost as well as communication cost. However, Deduplication raises significant security issues. Malicious users and semi-trusted Storage Server tries to learn the data
Jay Dave   +4 more
openaire   +1 more source

Deduplication with Blockchain for Secure Cloud Storage

2018
Secure deduplication techniques have been wildly used in cloud storage to save both disk space and network bandwidth. However, traditional schemes store only one copy in cloud which raises problems with data reliability. Meanwhile, the existence of any third party, which is adopted by many deduplication schemes, will bring the risk of being single ...
Jingyi Li   +3 more
openaire   +1 more source

Message-Locked Proofs of Retrievability with Secure Deduplication

Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
This paper addresses the problem of data retrievability in cloud computing systems performing deduplication to optimize their space savings: While there exist a number of proof of retrievability (PoR) solutions that guarantee storage correctness with cryptographic means, these solutions unfortunately come at odds with the deduplication technology.
Dimitrios Vasilopoulos   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy