Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
BL-MLE: Block-level message-locked encryption for secure large file deduplication
Deduplication is a popular technique widely used to save storage spaces in the cloud. To
achieve secure deduplication of encrypted files, Bellare et al. formalized a new …
achieve secure deduplication of encrypted files, Bellare et al. formalized a new …
A cloud data deduplication scheme based on certificateless proxy re-encryption
Cloud data deduplication removes redundant data blocks or files and keeps only one copy
in the cloud storage server. In order to improve on security, we need to encrypt data files and …
in the cloud storage server. In order to improve on security, we need to encrypt data files and …
CPDA: A confidentiality-preserving deduplication cloud storage with public cloud auditing
J Wu, Y Li, T Wang, Y Ding - IEEE Access, 2019 - ieeexplore.ieee.org
With growing popularity of cloud storage, the number of users of outsourcing data to cloud
servers has increased dramatically. On the one hand, the rapidly increasing volume of data …
servers has increased dramatically. On the one hand, the rapidly increasing volume of data …
An efficient confidentiality-preserving proof of ownership for deduplication
Data storage in the cloud is becoming widespread. Deduplication is a key mechanism to
decrease the operating costs cloud providers face, due to the reduction of replicated data …
decrease the operating costs cloud providers face, due to the reduction of replicated data …
Updatable block-level message-locked encryption
Deduplication is a widely used technique for reducing storage space of cloud service
providers. Yet, it is unclear how to support deduplication of encrypted data securely until the …
providers. Yet, it is unclear how to support deduplication of encrypted data securely until the …
Secure encrypted data with authorized deduplication in cloud
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based
on convergent encryption and the role re-encryption algorithm to prevent the privacy data …
on convergent encryption and the role re-encryption algorithm to prevent the privacy data …
[PDF][PDF] Filter based data deduplication in cloud storage using dynamic perfect hash functions
BT Reddy, MVPCS Rao - International Journal of Simulation …, 2018 - researchgate.net
Cloud storage offers cost effective storage to the users dynamically. Corporate and private
users upload their sensitive data items to the cloud storage. But mostly the data stored in the …
users upload their sensitive data items to the cloud storage. But mostly the data stored in the …
[PDF][PDF] 云环境中数据安全去重研究进展
熊金波, 张媛媛, **凤华, **素萍, 任君, 姚志** - 通信学报, 2016 - infocomm-journal.com
为了提高云存储效率和节约网络通信带宽, 需要对云端同一数据的多个副本执行重复性检测与去
重操作, 而云环境下的密文数据阻碍了数据安全去重的实施, 这一问题迅速引起学术界和产业界 …
重操作, 而云环境下的密文数据阻碍了数据安全去重的实施, 这一问题迅速引起学术界和产业界 …
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities
C Yang, M Zhang, Q Jiang, J Zhang, D Li, J Ma… - Pervasive and Mobile …, 2017 - Elsevier
As typical applications in the field of the cloud computing, cloud storage services are popular
in the development of smart cities for their low costs and huge storage capacity. Proofs-of …
in the development of smart cities for their low costs and huge storage capacity. Proofs-of …
Big data storage security
The demand for data storage and processing is increasing at a rapid speed in the big data
era. The management of such tremendous volume of data is a critical challenge to the data …
era. The management of such tremendous volume of data is a critical challenge to the data …