Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by…
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Abstract? Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain…
Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing Abstract-With the fast development of Industrial Internet of Things (IIoT), a large amount of data is being generated continuously by different sources. Storing all the raw data in the IIoT devices locally is unwise considering that the end devices? energy…
Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Secure Deduplication with Efficient and Reliable Convergent Key Management. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure…
Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Abstract Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has…
Secure Distributed Deduplication Systems with Improved Reliability Abstract? Secure Distributed Deduplication Systems with Improved Reliability. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each ?le stored in cloud even if…
Secure Distributed Deduplication Systems with Improved Reliability Abstract? Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each file stored in cloud even if such a file is owned by a…
Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Abstract-The k-nearest neighbors ( k-NN) query is a fundamental primitive in spatial and multimedia databases. It has extensive applications in location-based services, classification & clustering and so on. With the promise of confidentiality and privacy, massive data are increasingly outsourced to cloud in the encrypted…
Secure kNN Query Processing in Untrusted Cloud Environments Abstract?Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest…
Secure kNN Query Processing in Untrusted Cloud Environments Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes,…