Results 51 to 60 of about 4,787 (231)
Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications [PDF]
As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication.
Archana, A +2 more
core
Secure Storage with Replication and Transparent Deduplication [PDF]
We seek to answer the following question: To what extent can we deduplicate replicated storage? To answer this question, we design ReDup, a secure storage system that provides users with strong integrity, reliability, and transparency guarantees about data that is outsourced at cloud storage providers.
Iraklis Leontiadis, Reza Curtmola
openaire +1 more source
Landscape of Research on Accounting Scope 3 Emissions: A Review of Methodologies and Data
ABSTRACT Scope 3 emissions have been proposed as a critical metric for evaluating corporate carbon footprint, identifying emission sources, and developing mitigation solutions. Yet, widespread corporate reporting of Scope 3 emissions remains limited, highlighting a critical gap in both research and practice.
Zeyu Wang +3 more
wiley +1 more source
Fast and secure laptop backups with encrypted de-duplication [PDF]
Many people now store large quantities of personal and corporate data on laptops or home computers. These often have poor or intermittent connectivity, and are vulnerable to theft or hardware failure.
Anderson, Paul, Zhang, Le
core +1 more source
ABSTRACT Using online job advertisement data improves the timeliness and granularity depth of analysis in the labor market in domains not covered by official data. Specifically, its variation over time may be used as an anticipator of official employment variations.
Pietro Giorgio Lovaglio +1 more
wiley +1 more source
Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication
Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality.
Chuang Gan +7 more
doaj +1 more source
Perinatal mortality in eastern Africa: A systematic review and meta‐analysis
Abstract Background Every day, over 5000 stillbirths and more than 6000 newborn deaths are estimated to occur worldwide, the majority in sub‐Saharan Africa and South Asia. Estimates, however, rely on data that might underestimate these deaths. Further, outside major categories such as preterm birth, infection, and complications at delivery, little is ...
Yohanis Alemeshet Asefa +5 more
wiley +1 more source
Abstract Evidence regarding the prognosis of thyroid carcinoma is heterogeneous, ranging from age effects and nodal burden metrics, such as lymph node ratio (LNR) and log odds of positive nodes (LODDS), to preoperative imaging models comprising ultrasound, CEUS, and radiomics.
Mennatallah Sherif +2 more
wiley +1 more source
PoSW:novel secure deduplication scheme for collaborative cloud applications
In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme ...
Jin-bo XIONG +5 more
doaj +2 more sources
Secure deduplication storage systems supporting keyword search [PDF]
Data deduplication is an attractive technology to reduce storage space for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication,
Li, Jin +3 more
openaire +3 more sources

