Results 31 to 40 of about 4,735 (235)

Revealing the unseen: how to expose cloud usage while protecting user privacy [PDF]

open access: yes, 2017
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use.
Kellaris, Georgios, Turk, Ata, Varia, M.
core   +2 more sources

Cloud data secure deduplication scheme via role-based symmetric encryption

open access: yesTongxin xuebao, 2018
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as ...
Jinbo XIONG   +5 more
doaj   +2 more sources

Secure Data Deduplication in Cloud Environments [PDF]

open access: yes, 2021
With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage ...
openaire   +1 more source

Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment

open access: yesJournal of Scientific Research, 2022
Maintaining the security of data stored in the public or private cloud is a more tedious task. The cloud is the only arrangement for storing enormous amounts of data, but there is a possibility of storing the same data more than once. The traditional security system generates different unreadable data for the same readable content of a file. Therefore,
K. Balaji, S. S. Manikandasaran
openaire   +1 more source

Secure deduplication and integrity audit system based on convergent encryption for cloud storage

open access: yesTongxin xuebao, 2017
Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent ...
Xiao-yong GUO   +3 more
doaj   +2 more sources

Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System

open access: yesIEEE Access, 2019
Today more and more enterprises and individuals are outsourcing their data to cloud storage system. Data deduplication is one of the important technologies to reduce the storage cost of cloud storage system.
Shangping Wang   +2 more
doaj   +1 more source

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Large amount of data are being produce by Internet-of-things sensor networks and applications. Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications.
Yuan Gao, Hequn Xian, Aimin Yu
doaj   +1 more source

Diabetes Mellitus Facilitates Gallstone Formation Through CXCR2‐NETs–Mediated Liver‐Bile Barrier Damage

open access: yesAdvanced Science, EarlyView.
Diabetes is an independent risk factor for gallstones. It upregulates CXCR2 expression in hepatic neutrophils, stimulating the formation of NETs that disrupt hepatocellular tight junctions and the liver‐bile barrier. NETs enter bile to accelerate gallstone development, while sarcosine inhibits CXCR2 and NETs production, effectively reducing diabetes ...
Chao Shi   +10 more
wiley   +1 more source

Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [PDF]

open access: yesJisuanji kexue
With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images ...
ZHOU Yiteng, TANG Xin, JIN Luchao
doaj   +1 more source

A secure data deduplication system for integrated cloud-edge networks

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G.   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy