2015
DOI: 10.1007/s00500-015-1596-6
|View full text |Cite
|
Sign up to set email alerts
|

A secure cloud storage system supporting privacy-preserving fuzzy deduplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…There are many evaluation methods for cloud service: service transactions [5], cloud storage [6,7], cloud application [8], and cloud security [9,10]. A trust mining model for identifying trusted cloud services when negotiating a Service-Level Agreement (SLA) is proposed [11].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many evaluation methods for cloud service: service transactions [5], cloud storage [6,7], cloud application [8], and cloud security [9,10]. A trust mining model for identifying trusted cloud services when negotiating a Service-Level Agreement (SLA) is proposed [11].…”
Section: Related Workmentioning
confidence: 99%
“…vmId. E(q)); (6) if(ST > );(7) double =Cloudletlist.getById(cloudletId.vmId).getcloudlet Penalty (); (8) this. IncrementalDirectValue(cloudlet.…”
mentioning
confidence: 99%
“…We highlight detailed differences between our proposed learning model and the existing works. Encryption methods can be employed to address the security and privacy concerns in machine learning 16,17 .…”
Section: Related Workmentioning
confidence: 99%
“…So image deduplication is becoming more important. Researchers have pay attention to this field like [20]. We have to handle the images before uploading them to server, a general way is watermarking [21] [22].…”
Section: Related Workmentioning
confidence: 99%