Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access


    Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud

    G. Neelamegam*, P. Marikkannu

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1079-1093, 2023, DOI:10.32604/iasc.2023.031283

    Abstract Due to the development of technology in medicine, millions of health-related data such as scanning the images are generated. It is a great challenge to store the data and handle a massive volume of data. Healthcare data is stored in the cloud-fog storage environments. This cloud-Fog based health model allows the users to get health-related data from different sources, and duplicated information is also available in the background. Therefore, it requires an additional storage area, increase in data acquisition time, and insecure data replication in the environment. This paper is proposed to eliminate the de-duplication data using a window size… More >

  • Open Access


    Consensus Mechanism of Blockchain Based on PoR with Data Deduplication

    Wei Zhou1, Hao Wang2, Ghulam Mohiuddin3, Dan Chen4,*, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1473-1488, 2022, DOI:10.32604/iasc.2022.029657

    Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount of redundant data, which inevitably… More >

  • Open Access


    Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications

    Jinsu Kim1, Sungwook Ryu2, Namje Park1,3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4169-4184, 2022, DOI:10.32604/cmc.2022.019277

    Abstract A significant number of cloud storage environments are already implementing deduplication technology. Due to the nature of the cloud environment, a storage server capable of accommodating large-capacity storage is required. As storage capacity increases, additional storage solutions are required. By leveraging deduplication, you can fundamentally solve the cost problem. However, deduplication poses privacy concerns due to the structure itself. In this paper, we point out the privacy infringement problem and propose a new deduplication technique to solve it. In the proposed technique, since the user’s map structure and files are not stored on the server, the file uploader list cannot… More >

  • Open Access


    A Resource-constrained Edge IoT Device Data-deduplication Method with Dynamic Asymmetric Maximum

    Ye Yang1, Xiaofang Li2, Dongjie Zhu3,*, Hao Hu3, Haiwen Du4, Yundong Sun4, Weiguo Tian3, Yansong Wang3, Ning Cao1, Gregory M.P. O’Hare5

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 481-494, 2021, DOI:10.32604/iasc.2021.019201

    Abstract Smart vehicles use sophisticated sensors to capture real-time data. Due to the weak communication capabilities of wireless sensors, these data need to upload to the cloud for processing. Sensor clouds can resolve these drawbacks. However, there is a large amount of redundant data in the sensor cloud, occupying a large amount of storage space and network bandwidth. Deduplication can yield cost savings by storing one data copy. Chunking is essential because it can determine the performance of deduplication. Content-Defined Chunking (CDC) can effectively solve the problem of chunk boundaries shifted, but it occupies a lot of computing resources and has… More >

Displaying 1-10 on page 1 of 4. Per Page