6 Hits in 5.6 sec

A tunable proof of ownership scheme for deduplication using Bloom filters

Jorge Blasco, Roberto Di Pietro, Agustin Orfila, Alessandro Sorniotti
2014 2014 IEEE Conference on Communications and Network Security  
Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resources-being especially effective for consumer-grade storage services (e.g. Dropbox).  ...  In this paper, we introduce a novel solution based on Bloom filters that provides a flexible, scalable, and provably secure solution to the weaknesses of deduplication, and that overcomes the deficiencies  ...  Bloom filters have been successfully used in other domains of computer security [10] . However, to the best of our knowledge, they have never been applied to proof of ownership schemes.  ... 
doi:10.1109/cns.2014.6997518 dblp:conf/cns/AlisPOS14 fatcat:74smy5ztxjfado5pzijssb6t3u

Revocable attribute-based encryption scheme with efficient deduplication for eHealth systems

Hua Ma, Ying Xie, Jianfeng Wang, Guohua Tian, Zhenhua Liu
2019 IEEE Access  
In this paper, we propose a variant of the attribute-based encryption scheme that supports efficient deduplication and attributes revocation for eHealth systems.  ...  However, the excessive computation costs of existing schemes lead to inefficient deduplication.  ...  [30] put forward a clever idea, named bloom filter proof of ownership (BF-PoW), to give a flexible, scalable, and provably secure method.  ... 
doi:10.1109/access.2019.2926627 fatcat:ii7ib7jtxvbhthne7wj6dbkdai

‏An Enhanced Approach to Improve the Security and Performance for Deduplication

Nourah Almrezeq Et al.
2021 Turkish Journal of Computer and Mathematics Education  
That is what drives us to suggest a method for removing duplicate data that is both performance and security effective.  ...  Via the use of the AES-CBC algorithm and hashing functions, we have proposed an enhancement to improves the performance and protection of data de-duplication for users.  ...  Acknowledgements The authors would like to thank the Deanship of Graduate Studies at Jouf University for funding and supporting this research through the initiative of DGS, Graduate Students Research Support  ... 
doi:10.17762/turcomat.v12i6.5797 fatcat:xws7cqf6pbfaphteqleisz2yoe

Cloud Computing Security: Foundations and Research Directions

Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang
2022 Foundations and Trends® in Privacy and Security  
The benefits of outsourcing data and computation come with security and privacy concerns.  ...  This monograph explores the advances in cloud security research across both industry and academia, with a special focus on secure infrastructure, services and storage.  ...  Subsequently, presented an ORAM with more efficient search by storing per-level encrypted bloom filters.  ... 
doi:10.1561/3300000028 fatcat:iaeir4qepngq3mmrm4jnrl4afe

Multicloud Resource Allocation:Cooperation, Optimization and Sharing

Hao Zhuang
Instead, we design BFSMinHash, a Bloom-filter sketching scheme for Minhash, which uses a single hash function.  ...  The Bloom filter is a space efficient data structure which can be used to test whether an element is in a set. However, when we adopt Bloom filter, we have to tolerate its effect of false positives.  ...  model; Data summarization task for social media data from Twitter.  ... 
doi:10.5075/epfl-thesis-7483 fatcat:2krfwigd3fdclcqekuhu5c6qt4

Dagstuhl Reports, Volume 7, Issue 10, October 2017, Complete Issue [article]

We thank Schloss Dagstuhl for hosting us.  ...  Towards Performance Modeling and Performance Prediction across IR/RecSys/NLP We conclude by discussing how these explanatory models might be turned into predictive ones by using features describing these  ...  sensor is needed, together with optical filters mounted on a filter wheel or liquid crystal tunable filters.  ... 
doi:10.4230/dagrep.7.10 fatcat:l6tpayrw6veapbnmuxaxcrcxye