Results 21 to 30 of about 4,787 (231)
A survey and classification of storage deduplication systems [PDF]
The automatic elimination of duplicate data in a storage system commonly known as deduplication is increasingly accepted as an effective technique to reduce storage costs.
Anand Ashok +40 more
core +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Secure Image Deduplication in Cloud Storage [PDF]
With the great development of cloud computing in recent years, the explosive increasing of image data, the mass of information storage, and the application demands for high availability of data, network backup is facing an unprecedented challenge. Image deduplication technology is proposed to reduce the storage space and costs.
Gang, Han, Yan, Hongyang, Xu, Lingling
openaire +2 more sources
Data reduction has gained growing emphasis due to the rapidly unsystematic increase in digital data and has become a sensible approach to big data systems.
Saja Taha Ahmed, Loay E. George
doaj +1 more source
PerfectDedup: Secure Data Deduplication
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges.
Puzio, Pasquale +3 more
openaire +2 more sources
Security Notions for Cloud Storage and Deduplication [PDF]
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required for such encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency ...
Boyd, Colin Alexander +4 more
openaire +2 more sources
Revealing the unseen: how to expose cloud usage while protecting user privacy [PDF]
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use.
Kellaris, Georgios, Turk, Ata, Varia, M.
core +2 more sources
Research progress on secure data deduplication in cloud
In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed.
Jin-bo XIONG +5 more
doaj +2 more sources
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj +1 more source
Cloud data secure deduplication scheme via role-based symmetric encryption
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as ...
Jinbo XIONG +5 more
doaj +2 more sources

