Blockchain-based deduplication and integrity auditing over encrypted cloud storage
Cloud computing promises great advantages in handling the exponential data growth.
Secure deduplication can greatly improve cloud storage efficiency while protecting data …
Secure deduplication can greatly improve cloud storage efficiency while protecting data …
A key-sharing based secure deduplication scheme in cloud storage
L Wang, B Wang, W Song, Z Zhang - Information Sciences, 2019 - Elsevier
The data deduplication technique can efficiently eliminate redundant data by kee** only
one copy of the duplicate data. Convergent encryption (CE) has been widely used in secure …
one copy of the duplicate data. Convergent encryption (CE) has been widely used in secure …
An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
Cloud computing is a platform to share the data and resources used among various
organizations, but the survey shows that there is always a security threat. Security is an …
organizations, but the survey shows that there is always a security threat. Security is an …
Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption
VK Veerabathiran, D Mani, S Kuppusamy… - Soft Computing, 2020 - Springer
Cloud computing environment (CCE) can empower an association to re-appropriate
computing resources to increase monetary benefits. For both developers and the cloud …
computing resources to increase monetary benefits. For both developers and the cloud …
BDKM: A blockchain-based secure deduplication scheme with reliable key management
Secure deduplication aims to efficiently eliminate redundant data in cloud storage system,
where convergent encryption (CE) is widely-used to provide the data confidentiality. As the …
where convergent encryption (CE) is widely-used to provide the data confidentiality. As the …
Blockchain-Based Secure and Verifiable Deduplication Scheme for Cloud-Assisted Internet of Things
G Zhang, P Chen, Y Liao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the rapid proliferation of Internet of Things (IoT) infrastructure and edge computing,
more and more IoT data is outsourced to cloud storage service provider (CSP). To achieve …
more and more IoT data is outsourced to cloud storage service provider (CSP). To achieve …
Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack
X Tang, L Zhou, B Hu, H Wu - Security and Communication …, 2021 - Wiley Online Library
Tag deduplication is an emerging technique to eliminate redundancy in cloud storage,
which works by signing integrity tags with a content‐associated key instead of user …
which works by signing integrity tags with a content‐associated key instead of user …
Fuzzy-Dedup: A secure deduplication model using cosine based Fuzzy interference system in cloud application
K Rajkumar, V Dhanakoti - Journal of Intelligent & Fuzzy …, 2022 - content.iospress.com
Storage consumption is increasing significantly these days, with consumers trying to find an
effective approach to safe storage space. In these situations, a deduplication in cloud …
effective approach to safe storage space. In these situations, a deduplication in cloud …
Secure deduplication with reliable and revocable key management in fog computing
A secure deduplication technique removes duplicate data and stores only single copy to
efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a …
efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a …
Efficient cross-user deduplication of encrypted data through re-encryption
X Tang, L Zhou, Y Huang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Cross-user deduplication is an emerging technique to ease the burden of cloud storage in
big data era by storing only one copy of duplicate data. Efficiency reflects the feasibility and …
big data era by storing only one copy of duplicate data. Efficiency reflects the feasibility and …