2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) 2020
DOI: 10.1109/icoei48184.2020.9143055
|View full text |Cite
|
Sign up to set email alerts
|

Block Level Data-Deduplication and Security Using Convergent Encryption to Offer Proof of Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…We can ensure the confidentiality of data in the cloud by traditional encryption, but it is incompatible with the de-duplication of data. On the other hand, different cipher texts would duplicate data copies to different users, making de-duplication difficult [13] [14].To maintain security, data owners encrypt their data before transferring this data to the cloud [15]. But how does a cloud service decide if the same text is the product of multiple encrypted texts [16].…”
Section: Introductionmentioning
confidence: 99%
“…We can ensure the confidentiality of data in the cloud by traditional encryption, but it is incompatible with the de-duplication of data. On the other hand, different cipher texts would duplicate data copies to different users, making de-duplication difficult [13] [14].To maintain security, data owners encrypt their data before transferring this data to the cloud [15]. But how does a cloud service decide if the same text is the product of multiple encrypted texts [16].…”
Section: Introductionmentioning
confidence: 99%