Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








559 Hits in 2.8 sec

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing

Yinghui Zhang, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, Qinglan Zhao
2018 Security and Communication Networks  
However, existing data deduplication technologies still suffer security and efficiency drawbacks.  ...  The first scheme is based on deterministic tags and the other one adopts random tags.  ...  Generally, the random tag based deduplication system is more secure and the deterministic tag based scheme is more efficient.  ... 
doi:10.1155/2018/9081814 fatcat:duj7j6xyynegplepxloetmvsyq

Survey on Dynamic Ownership Management for Secure Data De-duplication

Bhagyashri B. Nikam, Dr. Emmanuel M
2017 IJARCCE  
In this paper, we review several deduplication techniques over encrypted data to achieve secure and efficient cloud storage service.  ...  secure and efficient cloud storage service in the environment where ownership changes dynamically.  ...  Dekey which is efficient and reliable for secure deduplication.  ... 
doi:10.17148/ijarcce.2017.6171 fatcat:ltp7bqdmxjhotk7erfhfbxkqry

Revocation and Security Based Ownership Deduplication of Convergent Key Creating in Cloud
english

P.GOKUL RAJ, K.KIRUTHIKA DEVI
2014 International Journal of Innovative Research in Science Engineering and Technology  
Each of the data copy is associated with a tag for the duplicate check. All data copies and tags will be stored in the CSP-S. V.  ...  S2: The CSP-S initializes two types of storage systems: a rapid storage system for store the tags for efficient duplicate checks, and a file storage system for storing both encrypted data copies and convergent  ...  One challenge is that randomization conflicts with deduplication, since the random pieces cannot be deduplicated with each other.  ... 
doi:10.15680/ijirset.2014.0310017 fatcat:ajitgbiv2veqlbixfqspqs7ibu

Towards Efficient Fully Randomized Message-Locked Encryption [chapter]

Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou
2016 Lecture Notes in Computer Science  
Motivated by secure data deduplication, Abadi et al. extended the work Message-Locked Encryption (MLE) and introduced the primitive of MLE2 with nice security properties.  ...  Motivated by secure data deduplication, Abadi et al. extended the work Message-Locked Encryption (MLE) and introduced the primitive of MLE2 with nice security properties.  ...  [13] considered the hybrid cloud architecture consisting of a public cloud and a private cloud and efficiently solved the problem of deduplication with differential privileges. Yuan et al.  ... 
doi:10.1007/978-3-319-40253-6_22 fatcat:so4wjiqq4ra57oumirvdkftgoy

SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage

Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Gaur, Mauro Conti
2020 Computer Communications  
Deduplication is a widely used technology to reduce the storage and communication cost for cloud storage services. For any cloud infrastructure, data confidentiality is one of the primary concerns.  ...  Existing state-of-the-art solutions in security of deduplication are vulnerable to dictionary attacks and tag inconsistency anomaly.  ...  Secure deduplication with efficient and reliable ✓ ✓ - convergent key management [9] Deduplication on encrypted big data in cloud [22] ✗ ✓ Assumption: third party consisting all encryption keys is fully  ... 
doi:10.1016/j.comcom.2020.02.037 fatcat:la52oasd7bh3xm73ahdstzrw5u

Verifiable Message-Locked Encryption

Sébastien Canard, Fabien Laguillaumie, Paindavoine
2016 Zenodo  
s MLE, we instantiate those proofs, so that we obtain a more efficient scheme, secure in the random oracle model.  ...  One of today's main challenge related to cloud storage is to maintain the functionalities and the efficiency of customers' and service providers' usual environments while protecting the confidentiality  ...  This method, called deduplication, is widely used by cloud providers. However, some of the cloud storage users may want to encrypt their data, distrusting an honest-but-curious cloud provider.  ... 
doi:10.5281/zenodo.58898 fatcat:f2u33bpgebhwdeszyovenhyxmm

A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication

Chen Li, Zhenhua Liu
2019 International Journal of Network Security  
Moreover, during data deduplication, Bloom filter is utilized to efficiently check ownership of the data that a user claims to have.  ...  Compared to existing schemes with similar features, our scheme achieves higher security and better functionality through function evaluation and security analysis.  ...  This work is supported by the National Key R&D Program of China under Grant No. 2017YFB0802000, the National Natural Science Foundation of China under Grants No.61472470 and 61572390, and the Scientific  ... 
dblp:journals/ijnsec/LiL19 fatcat:grd2rqolefhgbilffcdqraw6ii

A Comprehensive review of Security Challenges for Data Deduplication and Integrity Auditing

Sreelatha K, KLEF, INDIA,
2019 International Journal of Emerging Trends in Engineering Research  
On cloud storage servicers, Cross client data deduplication has become very popular. Data deduplication checking is carried out securely by the MLE scheme.  ...  This paper presents a review of the different works related to providing security to data deduplication and integrity privacy.  ...  The consistency of the tag and integrity is provided with security. (Jawale, 2018) [23] Discusses the implementation of deduplication. It shows data security in the environment of the cloud.  ... 
doi:10.30534/ijeter/2019/527112019 fatcat:qv4u5tkunfh6jbn3gct2mufzau

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

Youngjoo Shin, Junbeom Hur, Dongyoung Koo, Joobeom Yun
2020 Security and Communication Networks  
Security and performance analyses prove the efficiency and effectiveness of SEED for mobile cloud storage services.  ...  However, recently proposed solutions for encrypted deduplication lack the desired level of security and efficiency.  ...  and tags indistinguishable from random data, which implies that A has a negligible advantage in winning the security game.  ... 
doi:10.1155/2020/3046595 fatcat:ga2gm2bvmvbdbk6maw5rcgwiiy

Efficient and Secure Storage for Outsourced Data: A Survey

Jianfeng Wang, Xiaofeng Chen
2016 Data Science and Engineering  
This paper focuses on the techniques of verifiable data storage and secure data deduplication. We firstly summarize and classify the state-of-the-art research on cloud data storage mechanism.  ...  With the growing popularity of cloud computing, more and more enterprises and individuals tend to store their sensitive data on the cloud in order to reduce the cost of data management.  ...  Deduplication Efficiency Recent approaches to secure deduplication have focused on security enhancements and efficiency. [2, 13, 25, 28-32, 51, 53, 60, 61] .  ... 
doi:10.1007/s41019-016-0018-9 fatcat:acae34sgnvb73leh52qdxaddhu

Lightweight Cloud Storage Auditing with Deduplication Supporting Strong Privacy Protection

Wenting Shen, Ye Su, Rong Hao
2020 IEEE Access  
The security proof and the performance evaluation demonstrate that the proposed scheme achieves desirable security and efficiency.  ...  INDEX TERMS Cloud storage auditing, deduplication, strong privacy protection, data security, cloud storage.  ...  [14] considered the problem of files' security levels according to data popularity in cloud storage auditing with deduplication, and proposed a cloud storage auditing scheme with deduplication supporting  ... 
doi:10.1109/access.2020.2977721 fatcat:jkw4pmosbvdelcotpxjiti2z6y

DeyPoS: Using Revocable Storage Identity-Based Encryption

Ashwini S Afre
2017 International Journal for Research in Applied Science and Engineering Technology  
A practical multi-user cloud storage system needs the secure client-side cross-user deduplication technique, which allows a user to skip the uploading process and obtain the ownership of the files immediately  ...  The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system  ...  Sunil Ingole, colleagues from Computer Engineering and Indira College of Engineering and Management, Pune Dist. Pune Maharashtra, India, for their support, counsels and inspiration.  ... 
doi:10.22214/ijraset.2017.3070 fatcat:lo4jtnevarf4vjy7rbwmdvphja

Secure and constant cost public cloud storage auditing with deduplication

Jiawei Yuan, Shucheng Yu
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
It calls for a new solution to support efficient and secure data integrity auditing with storage deduplication for cloud storage.  ...  Data integrity and storage efficiency are two important requirements for cloud storage.  ...  Therefore, it still calls for a new solution to support efficient and secure data integrity auditing with storage deduplication for cloud storage. Our Contribution.  ... 
doi:10.1109/cns.2013.6682702 dblp:conf/cns/YuanY13 fatcat:42ofmrjqxbbebnboorfqrp54hi

Secure and efficient proof of storage with deduplication

Qingji Zheng, Shouhuai Xu
2012 Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12  
Both security and efficiency are crucial to the success of cloud storage.  ...  So far, security and efficiency of cloud storage have been separately investigated as follows: On one hand, security notions such as Proof of Data Possession (PDP) and Proof of Retrievability (POR) have  ...  This work was supported in part by an AFOSR MURI grant and a NSF grant.  ... 
doi:10.1145/2133601.2133603 dblp:conf/codaspy/ZhengX12 fatcat:6urvtismo5dp3fteztmceuvvzm

Secure Distributed Deduplication Systems with Improved Reliability

Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi
2015 IEEE transactions on computers  
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth.  ...  We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers.  ...  . • Four new secure deduplication systems are proposed to provide efficient deduplication with high reliability for file-level and block-level deduplication, respectively.  ... 
doi:10.1109/tc.2015.2401017 fatcat:f4wl4euugzfrhfylnkm26hjf2m
« Previous Showing results 1 — 15 out of 559 results