Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage.
Jingkai ZhouGuohua TianJianghong WeiPublished in: Int. J. Comput. Sci. Eng. (2023)
Keyphrases
- data cleaning
- key exchange protocol
- authentication protocol
- authentication mechanism
- security measures
- block cipher
- data storage
- data integration
- information leakage
- countermeasures
- remote user authentication scheme
- record linkage
- cloud storage
- conflict resolution
- security requirements
- data encryption
- storage requirements
- key exchange
- ddos attacks
- user authentication
- storage systems
- autonomous agents
- text classification
- authentication scheme
- security management
- security vulnerabilities
- security protocols
- key management
- security issues
- lightweight
- key agreement