A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

A survey of secure data deduplication schemes for cloud storage systems

Y Shin, D Koo, J Hur - ACM computing surveys (CSUR), 2017 - dl.acm.org
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce
storage costs. Even though the general deduplication approach has been increasingly …

Privacy side channels in machine learning systems

E Debenedetti, G Severi, N Carlini… - 33rd USENIX Security …, 2024 - usenix.org
Most current approaches for protecting privacy in machine learning (ML) assume that
models exist in a vacuum. Yet, in reality, these models are part of larger systems that include …

[图书][B] Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money

GW Peters, E Panayi - 2016 - Springer
In this chapter we provide an overview of the concept of blockchain technology and its
potential to disrupt the world of banking through facilitating global money remittance, smart …

A blockchain-enabled deduplicatable data auditing mechanism for network storage services

Y Xu, C Zhang, G Wang, Z Qin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Since network storage services achieve widespread adoption, security and performance
issues are becoming primary concerns, affecting the scalability of storage systems …

{DupLESS}:{Server-Aided} encryption for deduplicated storage

S Keelveedhi, M Bellare, T Ristenpart - 22nd USENIX security …, 2013 - usenix.org
Cloud storage service providers such as Dropbox, Mozy, and others perform deduplication
to save space by only storing one copy of each file uploaded. Should clients conventionally …

Secure deduplication with efficient and reliable convergent key management

J Li, X Chen, M Li, J Li, PPC Lee… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …

Message-locked encryption and secure deduplication

M Bellare, S Keelveedhi, T Ristenpart - … on the theory and applications of …, 2013 - Springer
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …

Security challenges for the public cloud

K Ren, C Wang, Q Wang - IEEE Internet computing, 2012 - ieeexplore.ieee.org
Cloud computing represents today's most exciting computing paradigm shift in information
technology. However, security and privacy are perceived as primary obstacles to its wide …

A comprehensive study of the past, present, and future of data deduplication

W Xia, H Jiang, D Feng, F Douglis… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …