2016
DOI: 10.1109/tbdata.2016.2587659
|View full text |Cite
|
Sign up to set email alerts
|

Deduplication on Encrypted Big Data in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
59
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 135 publications
(62 citation statements)
references
References 31 publications
3
59
0
Order By: Relevance
“… Data Owner Management: In case that a real data owner uploads the data later than the data holder, the CSP can manage to save the data encrypted by the real data owner at the cloud with the owner generated and later on, AP supports re-encryption of at CSP for eligible data holders. Figure.2 is referred from [1] which illustrates the procedure of data deduplication at CSP with the support of private server based on the proposed scheme. We suppose that user saves its sensitive data at CSP with protection using , while user is a data holder who tries to save the same data at CSP.…”
Section: Key Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“… Data Owner Management: In case that a real data owner uploads the data later than the data holder, the CSP can manage to save the data encrypted by the real data owner at the cloud with the owner generated and later on, AP supports re-encryption of at CSP for eligible data holders. Figure.2 is referred from [1] which illustrates the procedure of data deduplication at CSP with the support of private server based on the proposed scheme. We suppose that user saves its sensitive data at CSP with protection using , while user is a data holder who tries to save the same data at CSP.…”
Section: Key Operationsmentioning
confidence: 99%
“…As illustrated in Figure.4 which is referred from [1], 1 wants to update encrypted data stored at CSP with new symmetric key `1. User 1 sends an update request: { 1, `1, `1, 1}.…”
mentioning
confidence: 99%
“…Moreover, in CAONT-RS, a cryptographic hash generated from the initial data is used instead of the random key of the AONT transform. Furthermore, the authors in [28] have introduced a technique of data ownership challenge and proxy re-encryption (PRE) to manage encrypted data storage with de-duplication.…”
Section: Previous Workmentioning
confidence: 99%
“…Zheng Yan et al [16] proposed a practical scheme to manage the encrypted big data in cloud with deduplication based on ownership challenge and proxy reencryption and evaluate its performance based on extensive analysis and computer simulations Fatema Rashid [3] proposed a secure video deduplication scheme through video compression in cloud storage environments. Its design consists of embedding a partial convergent encryption along with a unique signature generation scheme into a H.264 video compression scheme 4.…”
Section: Introductionmentioning
confidence: 99%