A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
2018
Security and Communication Networks
However, existing data deduplication technologies still suffer security and efficiency drawbacks. ...
The first scheme is based on deterministic tags and the other one adopts random tags. ...
Generally, the random tag based deduplication system is more secure and the deterministic tag based scheme is more efficient. ...
doi:10.1155/2018/9081814
fatcat:duj7j6xyynegplepxloetmvsyq
Survey on Dynamic Ownership Management for Secure Data De-duplication
2017
IJARCCE
In this paper, we review several deduplication techniques over encrypted data to achieve secure and efficient cloud storage service. ...
secure and efficient cloud storage service in the environment where ownership changes dynamically. ...
Dekey which is efficient and reliable for secure deduplication. ...
doi:10.17148/ijarcce.2017.6171
fatcat:ltp7bqdmxjhotk7erfhfbxkqry
Revocation and Security Based Ownership Deduplication of Convergent Key Creating in Cloud
english
2014
International Journal of Innovative Research in Science Engineering and Technology
english
Each of the data copy is associated with a tag for the duplicate check. All data copies and tags will be stored in the CSP-S. V. ...
S2: The CSP-S initializes two types of storage systems: a rapid storage system for store the tags for efficient duplicate checks, and a file storage system for storing both encrypted data copies and convergent ...
One challenge is that randomization conflicts with deduplication, since the random pieces cannot be deduplicated with each other. ...
doi:10.15680/ijirset.2014.0310017
fatcat:ajitgbiv2veqlbixfqspqs7ibu
Towards Efficient Fully Randomized Message-Locked Encryption
[chapter]
2016
Lecture Notes in Computer Science
Motivated by secure data deduplication, Abadi et al. extended the work Message-Locked Encryption (MLE) and introduced the primitive of MLE2 with nice security properties. ...
Motivated by secure data deduplication, Abadi et al. extended the work Message-Locked Encryption (MLE) and introduced the primitive of MLE2 with nice security properties. ...
[13] considered the hybrid cloud architecture consisting of a public cloud and a private cloud and efficiently solved the problem of deduplication with differential privileges. Yuan et al. ...
doi:10.1007/978-3-319-40253-6_22
fatcat:so4wjiqq4ra57oumirvdkftgoy
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage
2020
Computer Communications
Deduplication is a widely used technology to reduce the storage and communication cost for cloud storage services. For any cloud infrastructure, data confidentiality is one of the primary concerns. ...
Existing state-of-the-art solutions in security of deduplication are vulnerable to dictionary attacks and tag inconsistency anomaly. ...
Secure deduplication with efficient and reliable ✓ ✓ - convergent key management [9] Deduplication on encrypted big data in cloud [22] ✗ ✓ Assumption: third party consisting all encryption keys is fully ...
doi:10.1016/j.comcom.2020.02.037
fatcat:la52oasd7bh3xm73ahdstzrw5u
Verifiable Message-Locked Encryption
2016
Zenodo
s MLE, we instantiate those proofs, so that we obtain a more efficient scheme, secure in the random oracle model. ...
One of today's main challenge related to cloud storage is to maintain the functionalities and the efficiency of customers' and service providers' usual environments while protecting the confidentiality ...
This method, called deduplication, is widely used by cloud providers. However, some of the cloud storage users may want to encrypt their data, distrusting an honest-but-curious cloud provider. ...
doi:10.5281/zenodo.58898
fatcat:f2u33bpgebhwdeszyovenhyxmm
A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication
2019
International Journal of Network Security
Moreover, during data deduplication, Bloom filter is utilized to efficiently check ownership of the data that a user claims to have. ...
Compared to existing schemes with similar features, our scheme achieves higher security and better functionality through function evaluation and security analysis. ...
This work is supported by the National Key R&D Program of China under Grant No. 2017YFB0802000, the National Natural Science Foundation of China under Grants No.61472470 and 61572390, and the Scientific ...
dblp:journals/ijnsec/LiL19
fatcat:grd2rqolefhgbilffcdqraw6ii
A Comprehensive review of Security Challenges for Data Deduplication and Integrity Auditing
2019
International Journal of Emerging Trends in Engineering Research
On cloud storage servicers, Cross client data deduplication has become very popular. Data deduplication checking is carried out securely by the MLE scheme. ...
This paper presents a review of the different works related to providing security to data deduplication and integrity privacy. ...
The consistency of the tag and integrity is provided with security. (Jawale, 2018) [23] Discusses the implementation of deduplication. It shows data security in the environment of the cloud. ...
doi:10.30534/ijeter/2019/527112019
fatcat:qv4u5tkunfh6jbn3gct2mufzau
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments
2020
Security and Communication Networks
Security and performance analyses prove the efficiency and effectiveness of SEED for mobile cloud storage services. ...
However, recently proposed solutions for encrypted deduplication lack the desired level of security and efficiency. ...
and tags indistinguishable from random data, which implies that A has a negligible advantage in winning the security game. ...
doi:10.1155/2020/3046595
fatcat:ga2gm2bvmvbdbk6maw5rcgwiiy
Efficient and Secure Storage for Outsourced Data: A Survey
2016
Data Science and Engineering
This paper focuses on the techniques of verifiable data storage and secure data deduplication. We firstly summarize and classify the state-of-the-art research on cloud data storage mechanism. ...
With the growing popularity of cloud computing, more and more enterprises and individuals tend to store their sensitive data on the cloud in order to reduce the cost of data management. ...
Deduplication Efficiency Recent approaches to secure deduplication have focused on security enhancements and efficiency. [2, 13, 25, 28-32, 51, 53, 60, 61] . ...
doi:10.1007/s41019-016-0018-9
fatcat:acae34sgnvb73leh52qdxaddhu
Lightweight Cloud Storage Auditing with Deduplication Supporting Strong Privacy Protection
2020
IEEE Access
The security proof and the performance evaluation demonstrate that the proposed scheme achieves desirable security and efficiency. ...
INDEX TERMS Cloud storage auditing, deduplication, strong privacy protection, data security, cloud storage. ...
[14] considered the problem of files' security levels according to data popularity in cloud storage auditing with deduplication, and proposed a cloud storage auditing scheme with deduplication supporting ...
doi:10.1109/access.2020.2977721
fatcat:jkw4pmosbvdelcotpxjiti2z6y
DeyPoS: Using Revocable Storage Identity-Based Encryption
2017
International Journal for Research in Applied Science and Engineering Technology
A practical multi-user cloud storage system needs the secure client-side cross-user deduplication technique, which allows a user to skip the uploading process and obtain the ownership of the files immediately ...
The performance comparisons indicate that the proposed RS-IBE scheme has advantages in terms of functionality and efficiency, and thus is feasible for a practical and cost-effective data-sharing system ...
Sunil Ingole, colleagues from Computer Engineering and Indira College of Engineering and Management, Pune Dist. Pune Maharashtra, India, for their support, counsels and inspiration. ...
doi:10.22214/ijraset.2017.3070
fatcat:lo4jtnevarf4vjy7rbwmdvphja
Secure and constant cost public cloud storage auditing with deduplication
2013
2013 IEEE Conference on Communications and Network Security (CNS)
It calls for a new solution to support efficient and secure data integrity auditing with storage deduplication for cloud storage. ...
Data integrity and storage efficiency are two important requirements for cloud storage. ...
Therefore, it still calls for a new solution to support efficient and secure data integrity auditing with storage deduplication for cloud storage. Our Contribution. ...
doi:10.1109/cns.2013.6682702
dblp:conf/cns/YuanY13
fatcat:42ofmrjqxbbebnboorfqrp54hi
Secure and efficient proof of storage with deduplication
2012
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12
Both security and efficiency are crucial to the success of cloud storage. ...
So far, security and efficiency of cloud storage have been separately investigated as follows: On one hand, security notions such as Proof of Data Possession (PDP) and Proof of Retrievability (POR) have ...
This work was supported in part by an AFOSR MURI grant and a NSF grant. ...
doi:10.1145/2133601.2133603
dblp:conf/codaspy/ZhengX12
fatcat:6urvtismo5dp3fteztmceuvvzm
Secure Distributed Deduplication Systems with Improved Reliability
2015
IEEE transactions on computers
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. ...
We propose new distributed deduplication systems with higher reliability in which the data chunks are distributed across multiple cloud servers. ...
. • Four new secure deduplication systems are proposed to provide efficient deduplication with high reliability for file-level and block-level deduplication, respectively. ...
doi:10.1109/tc.2015.2401017
fatcat:f4wl4euugzfrhfylnkm26hjf2m
« Previous
Showing results 1 — 15 out of 559 results