2015
DOI: 10.1109/tc.2015.2401017
|View full text |Cite
|
Sign up to set email alerts
|

Secure Distributed Deduplication Systems with Improved Reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
46
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(46 citation statements)
references
References 13 publications
0
46
0
Order By: Relevance
“…LI [1] With a particular true objective to keep information security against inside cloud server and furthermore outside challengers, clients may require their data encoded. Be that as it may, customary encryption under various clients' keys makes cross-customer de-duplication incomprehensible, since the cloud server would constantly watch unmistakable ciphertexts, regardless of the possibility that the information are the same, paying little respect to whether the encryption calculation is deterministic.…”
Section: A Merged Encryption (Ce)mentioning
confidence: 99%
See 1 more Smart Citation
“…LI [1] With a particular true objective to keep information security against inside cloud server and furthermore outside challengers, clients may require their data encoded. Be that as it may, customary encryption under various clients' keys makes cross-customer de-duplication incomprehensible, since the cloud server would constantly watch unmistakable ciphertexts, regardless of the possibility that the information are the same, paying little respect to whether the encryption calculation is deterministic.…”
Section: A Merged Encryption (Ce)mentioning
confidence: 99%
“…The satisfactory execution of standard encryption might define be capable of as takes after: Consider clients An and B, scrambles the file M beneath their mystery keys SA and SB and stores their referring to ciphertext CA and CB. At that factor, additionally problems emerge: (1) by using what way can the cloud server experience that the vital record M is nearly identical, and (2) irrespective of the opportunity that it can distinguish this, how would possibly it empower each clients to recoup the information, in view in their exceptional mystery keys? One critical way out is to empower on every patron to encode the record with trendy key of the disbursed garage server.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the broadcast nature of wireless transmission, it is of vital importance to guarantee the transmission security from the application layer [15][16][17][18][19] to physical layer [20,21]. The authors in [22] provided the framework of wiretap channels, which gives a general way to analyze and design the secure physical-layer security.…”
Section: Introductionmentioning
confidence: 99%
“…Network virtualization allows multiple heterogeneous virtual networks (VNs) to share the same physical network in edge-of-things computing [12][13][14][15][16]. Due to the increasing popularity of edge-ofthings computing, a great deal of research has been conducted on network virtualization and virtual network mapping technology [17][18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%