Enhancing Efficiency and Security in Joint Cloud Storage through Data Deduplication
Keywords:
Computational complexity, Trustworthy key server, brute-force, Cloud storageAbstract
Data deduplication is an effective tool for reducing user bandwidth requirements and removing data redundancies in cloud storage. A trustworthy key server (KS) has been the backbone of many earlier methods, but they have their limitations and vulnerabilities, such as information leakage,attack resistance, computational complexity, etc.
Downloads
References
P. Christen, ―A survey of indexing techniques for scalable record linkage and deduplication,‖ IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 9, pp. 1537–1555, 2012.
G. Jia, G. Han, J. J. P. C. Rodrigues, J. Lloret, andW. Li, ―Coordinate memory deduplication and partition for improving performance in cloud computing,‖ IEEE Transactions on Cloud Computing, vol. 7, no. 2, pp. 357–368, 2019.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.