PFDup: Practical Fuzzy Deduplication for Encrypted Multimedia Data

S Cheng, Z Tang, S Zeng, X Cui, T Li - Journal of Industrial Information …, 2024 - Elsevier
Redundant data wastes cloud storage space, especially the multimedia data which
comprises a large number of similar files and accounts for the majority of cloud storage. To …

FogDedupe: A Fog‐Centric Deduplication Approach Using Multi‐Key Homomorphic Encryption Technique

MS Yoosuf, C Muralidharan, S Shitharth… - Journal of …, 2022 - Wiley Online Library
The advancements in communication technologies and a rapid increase in the usage of IoT
devices have resulted in an increased data generation rate. Storing, managing, and …

[PDF][PDF] Secure and reliable data access control mechanism in multi-cloud environment with inter-server communication security

NS Havanje, KRA Kumar, SN Shenoy… - Suranaree Journal of …, 2022 - researchgate.net
Cloud system are dynamic and offer lucrative services to its users but often these systems
are doubted for its honest but curious property. Data confidentiality, user privacy and …

Cloud attacks and defence mechanism for SaaS: a survey

AH Shaikh, BB Meshram - … Computing and Networking: Proceedings of IC …, 2022 - Springer
Cloud computing systems are the de-facto deployments for any user data and processing
requirements. Due to a wide variety of cloud systems available today, increase in the …

Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment

J Prakash J, RK, SK, L Prabha G - International Journal of …, 2023 - Wiley Online Library
The cloud environment is inherently dynamic as users are added immensely in a short
duration. It is indeed difficult to manage such user profiles and associated data. Meanwhile …

[HTML][HTML] Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

N Mageshkumar, J Swapna, A Pandiaraj… - International Journal of …, 2023 - Elsevier
Data deduplication is a crucial technique in the field of data compression that aims to
eliminate redundant copies of recurring data. This technique has gained significant …

A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication

H Qi, P Li, C Wang, J Du, X Di - Mobile Networks and Applications, 2023 - Springer
Convergent encryption has been widely used in secure deduplication technology, but
because the data itself is predictable, directly using the hash value of the data as a key is …

Privacy enforcement on subscribers data in cloud computing

SA Akinboro, UJ Asanga, MO Abass - Nigerian Journal of Technology, 2021 - ajol.info
Data stored in the cloud are susceptible to an array of threats from hackers. This is because
threats, hackers and unauthorized access are not supported by the cloud service providers …

[PDF][PDF] A Comparison of Data De-Duplication Methodologies

N Raykar, P Kumbharkar, DH Jayatilal - 2023 - researchgate.net
Abstract Using the Cloud Storage Service, customers may store vast amounts of data and
synchronize it across computers, phones, and tablets from anywhere in the world. Managing …

Secure Data Deduplication And Sharing Method Based On UMLE And CP-ABE

C Wang, P Li, A Zhang, H Qi, L Cong… - … and Computer Science …, 2021 - ieeexplore.ieee.org
In the era of big data, more and more users store data in the cloud. Massive amounts of data
have brought huge storage costs to cloud storage providers, and data deduplication …