Results 51 to 60 of about 4,735 (235)
Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A +2 more
core
Secure Storage with Replication and Transparent Deduplication [PDF]
We seek to answer the following question: To what extent can we deduplicate replicated storage? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability, and transparency guarantees about data that is outsourced at cloud storage providers.
Iraklis Leontiadis, Reza Curtmola
openaire +1 more source
Regulators use expedited approval pathways to speed market approval and patient access to promising new drugs. However, there is uncertainty about whether these pathways are successful in approving drugs with significant therapeutic advantages. This systematic review aims to examine the safety, effectiveness and cost‐effectiveness of drugs approved via
Ashleigh Hooimeyer +4 more
wiley +1 more source
Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Chuang Gan +7 more
doaj +1 more source
Sigmoid(x): secure distributed network storage [PDF]
Secure data storage is a serious problem for computer users today, particularly in enterprise environments. As data requirements grow, traditional approaches of secured silos are showing their limitations. They represent a single – or at least, limited –
Goo, Swee Keow +2 more
core
This systematic review identified 112 population pharmacokinetic models of vancomycin in neonates and children. To support rational model selection for model‐informed precision, we developed and applied expert‐driven, transparent criteria that integrate both methodological rigour and clinical relevance.
Zoë Vander Elst +8 more
wiley +1 more source
A Running Time Improvement for Two Thresholds Two Divisors Algorithm [PDF]
Chunking algorithms play an important role in data de-duplication systems. The Basic Sliding Window (BSW) algorithm is the first prototype of the content-based chunking algorithm which can handle most types of data. The Two Thresholds Two Divisors (TTTD)
Chang, BingChun
core +1 more source
Abstract Many nations experience recurring shortages of teachers in particular subjects, prompting concerns that pupils' education is suffering as a result. Researchers have responded by generating a sizable literature on the reasons for which people enter and exit the teaching profession.
Sam Sims +2 more
wiley +1 more source
PoSW:novel secure deduplication scheme for collaborative cloud applications
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme ...
Jin-bo XIONG +5 more
doaj +2 more sources
Secure deduplication storage systems supporting keyword search [PDF]
Data deduplication is an attractive technology to reduce storage space for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication,
Li, Jin +3 more
openaire +3 more sources

