• Nenhum resultado encontrado

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

N/A
N/A
Protected

Academic year: 2019

Share "Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space"

Copied!
13
0
0

Texto

Loading

Imagem

Fig. 1 proposed methodology determinations the security problems  in deduplication  method  by  using  both  iMLE  and  convergent  encryption  which  produce  the  best  result.
Table  I.  Different  file  execution time  and size
Figure 2. With DD  and without DD execution  time  Figure 3. iMLEwCE  with deduplication
Figure 4. With and without DD  storage space comparison  Figure 5.  Attacker’s ratio Analysis

Referências

Documentos relacionados

Marcado pelo primitivismo visual e coreográfico de Larionov e Massine, que trazem Sol da Noite a Lisboa, é na esteira das representações portuguesas da companhia de Diaghilev,

Temporal Attribute-based Access Control (TAAC) is proposed to provide the efficient data access control schemes in multi authority cloud storage systems on attribute level.. In

Encryption is the process of converting a plaintext message into cipher text which can be decoded back into the original message using the secret key. An encryption/

The cloud computing security based on fully Homomorphic encryption, is a new concept of security which enables providing results of calculations on encrypted

Operations such as decryption and encryption of client’s data are only associated to client admin, data recovery process is associated to cloud admin and

rapid HIV testing, the structural aspects of the service (physical space to carry out the tests, the storage space of the test kits,.. availability of test kits) and training

Along with yolk storage in the oocyte, follicular cells exhibit the development of RER cisternae and electron-dense granules be- gin to fill the perioocytic space, possibly giving

For decryption, it is necessary to know the following: random matrix encryption  , the encrypted message (the ciphertext) Y, and the base for sparsity  (in case