Redirigiendo al acceso original de articulo en 23 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 24 (2023)  /  Artículo
ARTÍCULO
TITULO

Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management

Mira Lee and Minhye Seo    

Resumen

Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This technology has the potential to save up to 90% of space by eliminating redundant data in cloud storage. The secure data sharing in cloud (SeDaSC) protocol is an efficient data-sharing solution supporting secure deduplication. In the SeDaSC protocol, a cryptographic server (CS) encrypts clients? data on behalf of clients to reduce their computational overhead, but this essentially requires complete trust in the CS. Moreover, the SeDaSC protocol does not consider data deduplication. To address these issues, we propose a secure deduplication protocol based on the SeDaSC protocol that minimizes the computational cost of clients while leveraging trust in the CS. Our protocol enhances data privacy and ensures computational efficiency for clients. Moreover, it dynamically manages client ownership, satisfying forward and backward secrecy.

 Artículos similares

       
 
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia    
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance... ver más
Revista: Applied Sciences

 
Abdullah As Sami, Saadman Sakib, Kaushik Deb and Iqbal H. Sarker    
Deep learning has enabled a straightforward, convenient method of road pavement infrastructure management that facilitates a secure, cost-effective, and efficient transportation network. Manual road pavement inspection is time-consuming and dangerous, ma... ver más
Revista: Algorithms

 
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information

 
Guo Li, Yida Teng and Huimin Zhou    
Aero engine compressor disks are typically life-limited parts and it is necessary to secure them through the implementation of an engineering plan and a manufacturing plan. Specifically, the engineering plan recommends the quantification of the safety of... ver más
Revista: Aerospace

 
L. Thanga Mariappan, J. Arun Pandian, V. Dhilip Kumar, Oana Geman, Iuliana Chiuchisan and Carmen Nastase    
Cryptocurrency has emerged as a well-known significant component with both economic and financial potential in recent years. Unfortunately, Bitcoin acquisition is not simple, due to uneven business and significant rate fluctuations. Traditional approache... ver más
Revista: Applied Sciences