Data popularity-based encrypted deduplication scheme without third-party servers
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording data popularity, while the third party is prone...
Saved in:
| Main Authors: | Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2022-08-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2022151 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication
by: Chuang Gan, et al.
Published: (2025-01-01) -
Cloud data secure deduplication scheme via role-based symmetric encryption
by: Jinbo XIONG, et al.
Published: (2018-05-01) -
Data access control policy of encrypted deduplication system
by: Chunfu JIA, et al.
Published: (2020-05-01) -
Data access control policy of encrypted deduplication system
by: Chunfu JIA, et al.
Published: (2020-05-01) -
Key-customizable encrypted deduplication with access control for cloud storage
by: GU Bolun, et al.
Published: (2024-08-01)