Learn More
Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage. Although convergent encryption has been extensively adopted for secure deduplication, a critical(More)
Hadoop distributed file system (HDFS) becomes a representative cloud storage platform, benefiting from its reliable, scalable and low-cost storage capability. HDFS has been utilized in BlueSky, one of the most prevalent e-Learning resource sharing systems in China, to store and share courseware majorly in the form of PowerPoint (PPT) files and video clips.(More)
With the development of real time localization and mobile computing technology, it becomes increasingly popular for sharing individual locations in mobile online social network (mOSN), which inevitably raises significant concerns on the privacy of users' locations. Recently, Wei et al. provided the MobiShare mechanism to enable flexible location sharing(More)
As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security and privacy. Attribute-based encryption (ABE) is a promising cryptographic primitive, which has been widely applied to design fine-grained access control system recently. However,(More)
CDStore is a unified, multicloud storage solution for users to outsource backup data with reliability, security, and cost-efficiency guarantees. CDStore builds on an augmented secret-sharing scheme called convergent dispersal, which supports deduplication by using deterministic, content-derived hashes as input to secret sharing. CDStore's design is(More)
—With the penetration of broadband wireless access network and devices, interactive multimedia streaming to handhelds has become a reality. However, it is still challenging to offer such services to a large number of users in a cost-effective manner. With the increase of battery lifetime, memory capacity and processing capability, and the fact that many(More)
—Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied(More)
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing and decryption are getting prohibitively high. Despite that the existing Outsourced ABE solutions are able to(More)