Deduplication on encrypted big data in cloud
Cloud computing offers a new way of service provision by re-arranging various resources
over the Internet. The most important and popular cloud service is data storage. In order to …
over the Internet. The most important and popular cloud service is data storage. In order to …
Enhanced secure thresholded data deduplication scheme for cloud storage
As more corporate and private users outsource their data to cloud storage, recent data
breach incidents make end-to-end encryption increasingly desirable. Unfortunately …
breach incidents make end-to-end encryption increasingly desirable. Unfortunately …
A key-sharing based secure deduplication scheme in cloud storage
L Wang, B Wang, W Song, Z Zhang - Information Sciences, 2019 - Elsevier
The data deduplication technique can efficiently eliminate redundant data by kee** only
one copy of the duplicate data. Convergent encryption (CE) has been widely used in secure …
one copy of the duplicate data. Convergent encryption (CE) has been widely used in secure …
Veridedup: A verifiable cloud data deduplication scheme with integrity and duplication proof
Data deduplication is a technique to eliminate duplicate data in order to save storage space
and enlarge upload bandwidth, which has been applied by cloud storage systems …
and enlarge upload bandwidth, which has been applied by cloud storage systems …
A scheme to manage encrypted data storage with deduplication in cloud
Cloud computing offers a new way of service provision by re-arranging various resources
and IT structures over the Internet. Private user data are often stored in cloud in an encrypted …
and IT structures over the Internet. Private user data are often stored in cloud in an encrypted …
A study on data de-duplication schemes in cloud storage
Digital data is growing at immense rates day by day and finding efficient storage and
security mechanisms is a challenge. Cloud storage has already gained popularity because …
security mechanisms is a challenge. Cloud storage has already gained popularity because …
Pts-dep: A high-performance two-party secure deduplication for cloud storage
In cloud storage, the message-locked encryption method is widely used in security
deduplication. However, Brute force attack becomes a serious issue. Current research …
deduplication. However, Brute force attack becomes a serious issue. Current research …
Secure and Efficient Traffic Obfuscation Scheme for Deduplicated Cloud Storage
Due to the explosive growth of data on cloud storage, deduplication, a data reduction
technique, has been extensively accepted by cloud service providers. Deduplication …
technique, has been extensively accepted by cloud service providers. Deduplication …
Secure block-level data deduplication approach for cloud data centers
G Ali, MI Ahmad, A Rafi - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
The ongoing growth in information and technology sector has increased storage
requirement in cloud data centers with unprecedented pace. Global storage reached 2.8 …
requirement in cloud data centers with unprecedented pace. Global storage reached 2.8 …
Bloom filter based privacy preserving deduplication system
Deduplication is a data reduction technique which eliminates uploading and storing
redundant data. Therefore, it is widely adopted in cloud storage services to reduce …
redundant data. Therefore, it is widely adopted in cloud storage services to reduce …