2021
DOI: 10.3906/elk-2010-133
|View full text |Cite
|
Sign up to set email alerts
|

Zero knowledge based data deduplication using in-line Block Matching protocol for secure cloud storage

Abstract: In the area of cloud computing, data deduplication enables the cloud server to store a single copy of data by eliminating redundant files to improve storage and network efficiency. Proof-of-Ownership (PoW) is a cryptographic function that verifies the user who really owns the data. Most of the existing schemes have tried to solve the deduplication problem by providing the same encryption key for identical data. However, these schemes suffer from dynamic changes in ownership management. In this paper, we propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Based on the calculation results, a number of data chunks are then selected using the van der Mond matrix set and the neuron network is adjusted according to the security level requirements of the cloud storage security-aware approach until the step of data chunking and coding switching is completed [13]. After the operation of privacy data chunking encoding is completed, encryption measures need to be applied to each data chunk using the mainstream function secondary encryption to facilitate the smooth operation of the privacy data security-aware model [14][15]. Based on the above description, the steps for building a data chunking encoding model based on deep neural networks are completed.…”
Section: Building a Data Chunking Coding Model Based On Deep Neural N...mentioning
confidence: 99%
“…Based on the calculation results, a number of data chunks are then selected using the van der Mond matrix set and the neuron network is adjusted according to the security level requirements of the cloud storage security-aware approach until the step of data chunking and coding switching is completed [13]. After the operation of privacy data chunking encoding is completed, encryption measures need to be applied to each data chunk using the mainstream function secondary encryption to facilitate the smooth operation of the privacy data security-aware model [14][15]. Based on the above description, the steps for building a data chunking encoding model based on deep neural networks are completed.…”
Section: Building a Data Chunking Coding Model Based On Deep Neural N...mentioning
confidence: 99%
“…Authors of [27] propose an in-line block matching-based data deduplication scheme with dynamic user management. Users encrypt their data using convergent encryption.…”
Section: Secure Image Deduplicationmentioning
confidence: 99%