Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Hash-Indexing Block-Based Deduplication Algorithm for Reducing Storage in the Cloud

    D. Viji*, S. Revathy

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 27-42, 2023, DOI:10.32604/csse.2023.030259

    Abstract Cloud storage is essential for managing user data to store and retrieve from the distributed data centre. The storage service is distributed as pay a service for accessing the size to collect the data. Due to the massive amount of data stored in the data centre containing similar information and file structures remaining in multi-copy, duplication leads to increase storage space. The potential deduplication system doesn’t make efficient data reduction because of inaccuracy in finding similar data analysis. It creates a complex nature to increase the storage consumption under cost. To resolve this problem, this paper proposes an efficient storage… More >

  • Open Access

    ARTICLE

    Health Data Availability Protection: Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems

    Yifei Xiao, Shijie Zhou*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 169-185, 2023, DOI:10.32604/cmes.2022.021795

    Abstract To achieve the high availability of health data in erasure-coded cloud storage systems, the data update performance in erasure coding should be continuously optimized. However, the data update performance is often bottlenecked by the constrained cross-rack bandwidth. Various techniques have been proposed in the literature to improve network bandwidth efficiency, including delta transmission, relay, and batch update. These techniques were largely proposed individually previously, and in this work, we seek to use them jointly. To mitigate the cross-rack update traffic, we propose DXR-DU which builds on four valuable techniques: (i) delta transmission, (ii) XOR-based data update, (iii) relay, and (iv)… More >

  • Open Access

    ARTICLE

    A Virtual Cloud Storage Architecture for Enhanced Data Security

    M. Antony Joans Kumar1,*, C. Christopher Columbus2, E. Ben George3, T. Ajith Bosco Raj4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1735-1747, 2023, DOI:10.32604/csse.2023.025906

    Abstract The sensitive data stored in the public cloud by privileged users, such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers. The proposed Virtual Cloud Storage Architecture is primarily concerned with data integrity and confidentiality, as well as availability. To provide confidentiality and availability, the file to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct chunks. Hashing the encoded chunks ensured the file integrity, and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk storage. The… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation function. Two stages are… More >

  • Open Access

    ARTICLE

    Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography

    N. Niyaz Ahamed*, N. Duraipandian

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071

    Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's… More >

  • Open Access

    ARTICLE

    Towards Privacy-Preserving Cloud Storage: A Blockchain Approach

    Jia-Shun Zhang1, Gang Xu2,*, Xiu-Bo Chen1, Haseeb Ahmad3, Xin Liu4, Wen Liu5,6,7

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2903-2916, 2021, DOI:10.32604/cmc.2021.017227

    Abstract With the rapid development of cloud computing technology, cloud services have now become a new business model for information services. The cloud server provides the IT resources required by customers in a self-service manner through the network, realizing business expansion and rapid innovation. However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing. To address the problem, we propose BC-PECK, a data protection scheme based on blockchain and public key searchable encryption. Firstly, all the data is protected by the encryption algorithm. The privacy data is encrypted and… More >

  • Open Access

    ARTICLE

    Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT

    Prakhar Sahu1,*, S. K. Singh1, Arun Kumar Singh2

    Journal of Cyber Security, Vol.3, No.2, pp. 107-115, 2021, DOI:10.32604/jcs.2021.020831

    Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an… More >

  • Open Access

    ARTICLE

    Exploration on the Load Balancing Technique for Platform of Internet of Things

    Donglei Lu1, Dongjie Zhu2,*, Yundong Sun3, Haiwen Du3, Xiaofang Li4, Rongning Qu4, Yansong Wang3, Ning Cao1, Helen Min Zhou5

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 339-350, 2021, DOI:10.32604/csse.2021.016683

    Abstract In recent years, the Internet of Things technology has developed rapidly, and smart Internet of Things devices have also been widely popularized. A large amount of data is generated every moment. Now we are in the era of big data in the Internet of Things. The rapid growth of massive data has brought great challenges to storage technology, which cannot be well coped with by traditional storage technology. The demand for massive data storage has given birth to cloud storage technology. Load balancing technology plays an important role in improving the performance and resource utilization of cloud storage systems. Therefore,… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

  • Open Access

    ARTICLE

    Code-Based Preservation Mechanism of Electronic Record in Electronic Record Center of Cloud Storage

    Yan Leng1,2, Yongjun Ren1,2,*, Chengshan Qian3, Jinyue Xia4

    Journal on Big Data, Vol.1, No.1, pp. 39-45, 2019, DOI:10.32604/jbd.2019.05870

    Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more likely to be tampered with… More >

Displaying 1-10 on page 1 of 16. Per Page  

Share Link