Results 31 to 40 of about 4,787 (231)

Secure Data Deduplication in Cloud Environments [PDF]

open access: yes, 2021
With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage ...
openaire   +1 more source

Data Security and Deduplication Framework for Securing and Deduplicating Users’ Data in Public and Private Cloud Environment

open access: yesJournal of Scientific Research, 2022
Maintaining the security of data stored in the public or private cloud is a more tedious task. The cloud is the only arrangement for storing enormous amounts of data, but there is a possibility of storing the same data more than once. The traditional security system generates different unreadable data for the same readable content of a file. Therefore,
K. Balaji, S. S. Manikandasaran
openaire   +1 more source

Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System

open access: yesIEEE Access, 2019
Today more and more enterprises and individuals are outsourcing their data to cloud storage system. Data deduplication is one of the important technologies to reduce the storage cost of cloud storage system.
Shangping Wang   +2 more
doaj   +1 more source

The ITGB2‐COPS3‐SOX2 Axis and SOX2 Liquid‐Liquid Phase Separation: Dual Mechanisms Governing Osteosarcoma Stemness

open access: yesAdvanced Science, EarlyView.
Osteosarcoma stemness is driven by the ITGB2‐COPS3‐SOX2 signaling axis. This study reveals that nuclear COPS3 stabilizes SOX2, which in turn undergoes liquid‐liquid phase separation to promote stemness. Based on this mechanism, a novel COPS3 inhibitor, Z‐5891, was developed, effectively suppressing tumor growth and stemness in vivo, offering a ...
Lei Guo   +7 more
wiley   +1 more source

Secure deduplication and integrity audit system based on convergent encryption for cloud storage

open access: yesTongxin xuebao, 2017
Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent ...
Xiao-yong GUO   +3 more
doaj   +2 more sources

Adaptive MSB Reversible Data Hiding Based Security Deduplication for Encrypted Images in Cloud Storage [PDF]

open access: yesJisuanji kexue
With the rapid development of information technologies,more and more multimedia data represented by images are repeatedly uploaded to the cloud for storage,resulting in a great waste of communication and storage overhead.In addition,the plaintext images ...
ZHOU Yiteng, TANG Xin, JIN Luchao
doaj   +1 more source

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Large amount of data are being produce by Internet-of-things sensor networks and applications. Secure and efficient deduplication of Internet-of-things data in the cloud is vital to the prevalence of Internet-of-things applications.
Yuan Gao, Hequn Xian, Aimin Yu
doaj   +1 more source

A secure data deduplication system for integrated cloud-edge networks

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2020
Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for example, the backup and archive systems, are ...
Shynu P. G.   +5 more
doaj   +1 more source

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search

open access: yesIEEE Access, 2023
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li   +3 more
doaj   +1 more source

Security challenges of small cell as a service in virtualized mobile edge computing environments [PDF]

open access: yes, 2016
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are ...
A Fragkiadakis   +31 more
core   +5 more sources

Home - About - Disclaimer - Privacy