Results 71 to 80 of about 3,779 (135)

Towards Exascale Scientific Metadata Management

open access: yes, 2015
Advances in technology and computing hardware are enabling scientists from all areas of science to produce massive amounts of data using large-scale simulations or observational facilities.
Blanas, Spyros, Byna, Surendra
core  

Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication

open access: yesScientific Reports
Cloud computing enables data storage and application deployment over the internet, offering benefits such as mobility, resource pooling, and scalability. However, it also presents major challenges, particularly in managing shared resources, ensuring data
J. K. Periasamy   +3 more
doaj   +1 more source

Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership

open access: yesTongxin xuebao, 2015
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and ...
Yue CHEN   +4 more
doaj   +2 more sources

Efficient and Secure Data Storage for Future Networks: Review and Future Opportunities

open access: yesIEEE Access
With the increase in the number of Internet of Things (IoT) applications, the reliance on robust networking, reliable communications, and efficient and secure data storage is increasing day by day.
Ahmed Saad Alsalim, Muhammad Awais Javed
doaj   +1 more source

Record-Linkage from a Technical Point of View [PDF]

open access: yes
TRecord linkage is used for preparing sampling frames, deduplication of lists and combining information on the same object from two different databases.
Rainer Schnell
core  

BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage.
M. Pavithra, M. Prakash, V. Vennila
doaj   +1 more source

A SURVEY ON SECURE DEDUPLICATION SCHEMES. [PDF]

open access: yesInternational Journal of Advanced Research, 2017
AnitaA Kundgir   +2 more
openaire   +1 more source

Secure and efficient ownership verification for deduplicated cloud computing systems

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Cloud storage services offer a scalable platform to store a large amount of data at a low cost. It attracts a large number of customers to outsource their data to the cloud.
Jay Dave   +5 more
doaj   +1 more source

Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack

open access: yesTongxin xuebao, 2020
For security and efficiency problems in threshold based deduplication for cloud data,a novel method based on threshold re-encryption was proposed to deal with side channel attacks.A lightweight threshold re-encryption mechanism was presented to transfer ...
Xin TANG   +3 more
doaj  

Privacy Aware Data Deduplication for Side Channel in Cloud Storage [PDF]

open access: yes, 2018
Conti, Mauro   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy