Results 21 to 30 of about 4,735 (235)

Secure Deduplication Techniques: A Study

open access: yesInternational Journal of Computer Applications, 2016
Currently usage of cloud storage is increasing and to overcome increasing data issue, Data deduplication techniques are used. Moreover the Cloud storage service is provided by third party cloud providers thus security of data is needed. Data Deduplication techniques cannot be applied directly with security mechanisms.
Dheeraj Kumar, Vruti Satish
openaire   +1 more source

A survey and classification of storage deduplication systems [PDF]

open access: yes, 2014
The automatic elimination of duplicate data in a storage system commonly known as deduplication is increasingly accepted as an effective technique to reduce storage costs.
Anand Ashok   +40 more
core   +2 more sources

Secure Image Deduplication in Cloud Storage [PDF]

open access: yes, 2015
With the great development of cloud computing in recent years, the explosive increasing of image data, the mass of information storage, and the application demands for high availability of data, network backup is facing an unprecedented challenge. Image deduplication technology is proposed to reduce the storage space and costs.
Gang, Han, Yan, Hongyang, Xu, Lingling
openaire   +2 more sources

Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Data reduction has gained growing emphasis due to the rapidly unsystematic increase in digital data and has become a sensible approach to big data systems.
Saja Taha Ahmed, Loay E. George
doaj   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

PerfectDedup: Secure Data Deduplication

open access: yes, 2016
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges.
Puzio, Pasquale   +3 more
openaire   +2 more sources

Security Notions for Cloud Storage and Deduplication [PDF]

open access: yes, 2018
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required for such encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency ...
Boyd, Colin Alexander   +4 more
openaire   +2 more sources

Accelerating Catalyst Materials Discovery With Large Artificial Intelligence Models

open access: yesAngewandte Chemie, EarlyView.
AI‐empowered catalysis research via integrated database platform, universal machine learning interatomic potentials (MLIPs), and large language models (LLMs). ABSTRACT The integration of artificial intelligence (AI) into catalysis is fundamentally reshaping the research paradigm of catalyst discovery.
Di Zhang   +7 more
wiley   +2 more sources

Research progress on secure data deduplication in cloud

open access: yesTongxin xuebao, 2016
In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed.
Jin-bo XIONG   +5 more
doaj   +2 more sources

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

open access: yesInformation, 2021
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy