搜索结果: 1-11 共查到“军事学 deduplication”相关记录11条 . 查询时间(0.038 秒)
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
public-key cryptography applications pseudo-random functions
2019/5/5
Ensuring secure deduplication of encrypted data is a very active topic of research because deduplication is effective at reducing storage costs. Schemes supporting deduplication of encrypted data that...
Security notions for cloud storage and deduplication
storage systems generic cryptographic components
2017/12/19
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, but it is not obvious what precise sec...
Secure Deduplication of Encrypted Data: Refined Model and New Constructions
SDoE realistic datasets
2017/11/13
Cloud providers tend to save storage via cross-user deduplication, while users who care about privacy tend to encrypt their files on client-side. Secure deduplication of encrypted data (SDoE) is an ac...
Secure Storage with Replication and Transparent Deduplication
replication storage integrity deduplication
2017/8/2
We seek to answer the following question: To what extent can we deduplicate replicated storage? To answer this question, we design ReDup, a secure storage system that provides users with strong integr...
Side channels in deduplication: trade-offs between leakage and efficiency
cryptographic protocols Deduplication, storage
2016/12/8
Deduplication removes redundant copies of files or data blocks stored on the cloud. Client-side deduplication, where the client only uploads the file upon the request of the server, provides major sto...
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Secure Client-Side Deduplication Public auditing Privacy
2016/7/14
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten th...
Interactive Message-Locked Encryption and Secure Deduplication
deduplication cloud storage message-locked encryption
2016/1/4
This paper considers the problem of secure storage of outsourced data in a way that permits
deduplication. We are for the first time able to provide privacy for messages that are both correlated
and...
Secure Deduplication of Encrypted Data without Additional Independent Servers
cloud storage realistic datasets
2015/12/30
Encrypting data on client-side before uploading it to a cloud
storage is essential for protecting users’ privacy. However
client-side encryption is at odds with the standard practice
of deduplicati...
Large-scale storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2)...
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Secure Cloud Storage Public Auditing Secure Storage Deduplication Constant Cost
2013/3/15
Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud stor...
Secure and Efficient Proof of Storage with Deduplication
cryptographic protocols / cloud storage outsourced storage proof of storage deduplication integrity checking proof of ownership proof of data possession proof of retrievability
2011/9/29
Both security and efficiency are crucial to the success of cloud storage. So far, security and efficiency of cloud storage have been separately investigated as follows: On one hand, security notions s...