Results 31 to 40 of about 4,787 (231)
Secure Data Deduplication in Cloud Environments [PDF]
With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage ...
openaire +1 more source
Maintaining the security of data stored in the public or private cloud is a more tedious task. The cloud is the only arrangement for storing enormous amounts of data, but there is a possibility of storing the same data more than once. The traditional security system generates different unreadable data for the same readable content of a file. Therefore,
K. Balaji, S. S. Manikandasaran
openaire +1 more source
Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System
Today more and more enterprises and individuals are outsourcing their data to cloud storage system. Data deduplication is one of the important technologies to reduce the storage cost of cloud storage system.
Shangping Wang +2 more
doaj +1 more source
Osteosarcoma stemness is driven by the ITGB2‐COPS3‐SOX2 signaling axis. This study reveals that nuclear COPS3 stabilizes SOX2, which in turn undergoes liquid‐liquid phase separation to promote stemness. Based on this mechanism, a novel COPS3 inhibitor, Z‐5891, was developed, effectively suppressing tumor growth and stemness in vivo, offering a ...
Lei Guo +7 more
wiley +1 more source
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent ...
Xiao-yong GUO +3 more
doaj +2 more sources
Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [PDF]
With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images ...
ZHOU Yiteng, TANG Xin, JIN Luchao
doaj +1 more source
Large amount of data are being produce by Internet-of-things sensor networks and applications. Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications.
Yuan Gao, Hequn Xian, Aimin Yu
doaj +1 more source
A secure data deduplication system for integrated cloud-edge networks
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G. +5 more
doaj +1 more source
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li +3 more
doaj +1 more source
Security challenges of small cell as a service in virtualized mobile edge computing environments [PDF]
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are ...
A Fragkiadakis +31 more
core +5 more sources

