Blockchain-based deduplication and integrity auditing over encrypted cloud storage

M Song, Z Hua, Y Zheng, H Huang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud computing promises great advantages in handling the exponential data growth.
Secure deduplication can greatly improve cloud storage efficiency while protecting data …

A key-sharing based secure deduplication scheme in cloud storage

L Wang, B Wang, W Song, Z Zhang - Information Sciences, 2019 - Elsevier
The data deduplication technique can efficiently eliminate redundant data by kee** only
one copy of the duplicate data. Convergent encryption (CE) has been widely used in secure …

An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment

KV Pradeep, V Vijayakumar… - Journal of Computer …, 2019 - Wiley Online Library
Cloud computing is a platform to share the data and resources used among various
organizations, but the survey shows that there is always a security threat. Security is an …

Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption

VK Veerabathiran, D Mani, S Kuppusamy… - Soft Computing, 2020 - Springer
Cloud computing environment (CCE) can empower an association to re-appropriate
computing resources to increase monetary benefits. For both developers and the cloud …

BDKM: A blockchain-based secure deduplication scheme with reliable key management

G Zhang, H **e, Z Yang, X Tao, W Liu - Neural Processing Letters, 2022 - Springer
Secure deduplication aims to efficiently eliminate redundant data in cloud storage system,
where convergent encryption (CE) is widely-used to provide the data confidentiality. As the …

Blockchain-Based Secure and Verifiable Deduplication Scheme for Cloud-Assisted Internet of Things

G Zhang, P Chen, Y Liao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the rapid proliferation of Internet of Things (IoT) infrastructure and edge computing,
more and more IoT data is outsourced to cloud storage service provider (CSP). To achieve …

Aggregation‐Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack

X Tang, L Zhou, B Hu, H Wu - Security and Communication …, 2021 - Wiley Online Library
Tag deduplication is an emerging technique to eliminate redundancy in cloud storage,
which works by signing integrity tags with a content‐associated key instead of user …

Fuzzy-Dedup: A secure deduplication model using cosine based Fuzzy interference system in cloud application

K Rajkumar, V Dhanakoti - Journal of Intelligent & Fuzzy …, 2022 - content.iospress.com
Storage consumption is increasing significantly these days, with consumers trying to find an
effective approach to safe storage space. In these situations, a deduplication in cloud …

Secure deduplication with reliable and revocable key management in fog computing

H Kwon, C Hahn, K Kang, J Hur - Peer-to-Peer Networking and …, 2019 - Springer
A secure deduplication technique removes duplicate data and stores only single copy to
efficiently utilize the storage while guaranteeing the privacy of the data. Thus, it is a …

Efficient cross-user deduplication of encrypted data through re-encryption

X Tang, L Zhou, Y Huang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Cross-user deduplication is an emerging technique to ease the burden of cloud storage in
big data era by storing only one copy of duplicate data. Efficiency reflects the feasibility and …