Showing 1129–1140 of 1348 results

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    4,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Secure Deduplication with Efficient and Reliable Convergent Key Management. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    5,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Abstract Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has…

  • Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    4,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Secure Distributed Deduplication Systems with Improved Reliability. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each ?le stored in cloud even if…

  • Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

    0 out of 5
    4,500

    Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs Abstract? Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=”…

  • Secure file transfer System

    0 out of 5
    4,500

    Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…

  • Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

    0 out of 5
    4,500

    Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Abstract-The k-nearest neighbors ( k-NN) query is a fundamental primitive in spatial and multimedia databases. It has extensive applications in location-based services, classification & clustering and so on. With the promise of confidentiality and privacy, massive data are increasingly outsourced to cloud in the encrypted…

  • Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments Abstract?Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest…

  • Secure Logging As a Service?Delegating Log Management to the Cloud

    0 out of 5
    4,500

    Secure Logging As a Service?Delegating Log Management to the CloudLog files helps cyber forensic process in inquiring and seizing computer, obtaining electronic evidence for criminal investigations and maintaining computer records for the federal rules of evidence. So it can be said that logging is closely related to Forensic Computing. To make the logs permissible for…

  • Secure Online/Offline Data Sharing for Industrial Internet of Things

    0 out of 5
    4,500

    Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things Abstract-Ciphertext-policy attribute-based keyword search (CP-ABKS) schemes facilitate the fine-grained keyword search over encrypted data, such as those sensed/collected from Industrial Internet of Things (IIoT) devices and stored in the cloud. However, existing CP-ABKS schemes generally have significant computation and storage requirements, which are beyond…

  • Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation

    0 out of 5
    4,500

    Secure Overlay Cloud Storage with Access Control and Assured Deletion document preparation Abstract? We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a…

  • Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT

    0 out of 5
    4,500

    Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT Abstract-Phrase search allows retrieval of documents containing an exact phrase, which plays an important role in many machine learning applications for cloud-based IoT, such as intelligent medical data analytics. In order to protect sensitive information from being leaked by service providers, documents (e.g.,…

  • Secure Sensitive Data Sharing on a Big Data Platform

    0 out of 5
    4,500

    Secure Sensitive Data Sharing on a Big Data Platform Abstract? Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. This paper proposes a framework for secure…

End of content

End of content