Y Shin, D Koo, J Hur - ACM computing surveys (CSUR), 2017 - dl.acm.org
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce storage costs. Even though the general deduplication approach has been increasingly …
Most current approaches for protecting privacy in machine learning (ML) assume that models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …
In this chapter we provide an overview of the concept of blockchain technology and its potential to disrupt the world of banking through facilitating global money remittance, smart …
Y Xu, C Zhang, G Wang, Z Qin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Since network storage services achieve widespread adoption, security and performance issues are becoming primary concerns, affecting the scalability of storage systems …
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication to save space by only storing one copy of each file uploaded. Should clients conventionally …
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and decryption are performed is itself derived from …
K Ren, C Wang, Q Wang - IEEE Internet computing, 2012 - ieeexplore.ieee.org
Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide …
Data deduplication, an efficient approach to data reduction, has gained increasing attention and popularity in large-scale storage systems due to the explosive growth of digital data. It …