Cloud data secure deduplication scheme via role-based symmetric encryption
The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring...
Saved in:
Main Authors: | Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018077/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research progress on secure data deduplication in cloud
by: Jin-bo XIONG, et al.
Published: (2016-11-01) -
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
by: Chunfu JIA, et al.
Published: (2021-10-01) -
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
by: Wen-bin YAO, et al.
Published: (2015-08-01) -
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
by: Xin TANG, et al.
Published: (2020-06-01) -
New method for file deduplication in cloud storage
by: Chao YANG, et al.
Published: (2017-03-01)