Results 21 to 30 of about 4,787 (231)

A survey and classification of storage deduplication systems [PDF]

open access: yes, 2014
The automatic elimination of duplicate data in a storage system commonly known as deduplication is increasingly accepted as an effective technique to reduce storage costs.
Anand Ashok   +40 more
core   +2 more sources

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Secure Image Deduplication in Cloud Storage [PDF]

open access: yes, 2015
With the great development of cloud computing in recent years, the explosive increasing of image data, the mass of information storage, and the application demands for high availability of data, network backup is facing an unprecedented challenge. Image deduplication technology is proposed to reduce the storage space and costs.
Gang, Han, Yan, Hongyang, Xu, Lingling
openaire   +2 more sources

Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Data reduction has gained growing emphasis due to the rapidly unsystematic increase in digital data and has become a sensible approach to big data systems.
Saja Taha Ahmed, Loay E. George
doaj   +1 more source

PerfectDedup: Secure Data Deduplication

open access: yes, 2016
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges.
Puzio, Pasquale   +3 more
openaire   +2 more sources

Security Notions for Cloud Storage and Deduplication [PDF]

open access: yes, 2018
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required for such encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency ...
Boyd, Colin Alexander   +4 more
openaire   +2 more sources

Revealing the unseen: how to expose cloud usage while protecting user privacy [PDF]

open access: yes, 2017
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use.
Kellaris, Georgios, Turk, Ata, Varia, M.
core   +2 more sources

Research progress on secure data deduplication in cloud

open access: yesTongxin xuebao, 2016
In order to improve the efficiency of cloud storage and save the communication bandwidth, a deduplication mechanism for multi-duplicate of the same data in cloud environment was needed.
Jin-bo XIONG   +5 more
doaj   +2 more sources

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

open access: yesInformation, 2021
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj   +1 more source

Cloud data secure deduplication scheme via role-based symmetric encryption

open access: yesTongxin xuebao, 2018
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as ...
Jinbo XIONG   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy