Analytics, challenges and applications in big data environment: a survey

MR Bendre, VR Thool - Journal of Management Analytics, 2016 - Taylor & Francis
Big data refer to the massive amounts and varieties of information in the structured and
unstructured form, generated by social networking sites, biomedical equipment, financial …

[HTML][HTML] A secure and lightweight container migration technique in cloud computing

G Singh, P Singh, A Motii, M Hedabou - Journal of King Saud University …, 2024 - Elsevier
The present research has found that container virtualization systems are more effective and
more straightforward to handle in contrast to traditional virtualization systems. The live …

Recent developments in cloud based systems: state of art

M Alam, KA Shakil - arXiv preprint arXiv:1501.01323, 2015 - arxiv.org
Cloud computing is the new buzzword in the head of the techies round the clock these days.
The importance and the different applications of cloud computing are overwhelming and …

Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC

DVK Vengala, D Kavitha, APS Kumar - Cluster Computing, 2020 - Springer
The cloud computing (CC) model is diverse as well as has broad phenomena because of
which it is being preferred widely. Due to security challenges, the user cannot utilize CC to …

Inde: An inline data deduplication approach via adaptive detection of valid container utilization

L Lin, Y Deng, Y Zhou, Y Zhu - ACM Transactions on Storage, 2023 - dl.acm.org
Inline deduplication removes redundant data in real-time as data is being sent to the storage
system. However, it causes data fragmentation: logically consecutive chunks are physically …

[HTML][HTML] Lightweight hash-based de-duplication system using the self detection of most repeated patterns as chunks divisors

ST Ahmed, LE George - Journal of King Saud University-Computer and …, 2022 - Elsevier
Data reduction has gained growing emphasis due to the rapidly unsystematic increase in
digital data and has become a sensible approach to big data systems. Data deduplication is …

Research on data routing strategy of deduplication in cloud environment

Q He, F Zhang, G Bian, W Zhang, D Duan, Z Li… - IEEE …, 2021 - ieeexplore.ieee.org
The application of data deduplication technology reduces the demand for data storage and
improves resource utilization. Compared with limited storage capacity and computing …

Secure deduplication for big data with efficient dynamic ownership updates

LJ Xu, R Hao, J Yu, P Vijayakumar - Computers & Electrical Engineering, 2021 - Elsevier
With the explosive growth of data on the internet, the trend is for users to store these large
amounts of data on the cloud. To protect the privacy of data, users need to encrypt their data …

SEEDDUP: a three-tier SEcurE data DedUPlication architecture-based storage and retrieval for cross-domains over cloud

B Rasina Begum, P Chitra - IETE Journal of Research, 2023 - Taylor & Francis
Data deduplication has become a promising technique that significantly reduces space
utilization of cloud storage servers and optimizes the network bandwidth. A variety of …

网络空间威胁情报感知, 共享与分析技术综述

李建华 - 网络与信息安全学报, 2016 - infocomm-journal.com
在大数据, 云计算, 物联网等新型信息技术飞速发展的背景下, 网络空间威胁也朝泛化和复杂化的
趋势在发展, 各类网络攻击也更加具有持续性和隐蔽性. 基于威胁情报进行网络安全防御能够 …