Jove
Visualize
Contact Us
JoVE
x logofacebook logolinkedin logoyoutube logo
ABOUT JoVE
OverviewLeadershipBlogJoVE Help Center
AUTHORS
Publishing ProcessEditorial BoardScope & PoliciesPeer ReviewFAQSubmit
LIBRARIANS
TestimonialsSubscriptionsAccessResourcesLibrary Advisory BoardFAQ
RESEARCH
JoVE JournalMethods CollectionsJoVE Encyclopedia of ExperimentsArchive
EDUCATION
JoVE CoreJoVE BusinessJoVE Science EducationJoVE Lab ManualFaculty Resource CenterFaculty Site
Terms & Conditions of Use
Privacy Policy
Policies

Related Concept Videos

Legal Guidelines for Documentation01:06

Legal Guidelines for Documentation

1.4K
The legal guidelines for nursing documentation are essential for ensuring accurate, professional, and ethical recording of patient care. The guidelines are discussed here:
1.4K
Ethical Standards I01:25

Ethical Standards I

965
The American Nurses Association (ANA) created and implemented the first nationally accepted Code of Ethics for Nurses with Interpretive Statements. The Code of Ethics is a living document regularly updated by the ANA and establishes an ethical standard that is non-negotiable for nurses in all roles and settings.
The Code of Ethics provisions outline the nurse's duty to the patient, the healthcare team, the profession, and society. The Code's fundamental principles include advocacy,...
965
Guidelines and Strategies for Safe Computer Charting01:18

Guidelines and Strategies for Safe Computer Charting

876
The guidelines and strategies provided by the American Nurses Association (ANA) and the Canadian Nurses Association (CNA) offer essential principles for ensuring safe and secure computer charting systems in healthcare settings. Let's break down each recommendation:
Maintain Confidentiality and Security:
876
Asymmetric Lipid Bilayer01:35

Asymmetric Lipid Bilayer

7.7K
Biological membranes show uneven distribution of different types of lipids in the inner and outer layers, resulting in transverse asymmetric membranes. The treatment of the erythrocyte membrane with the enzyme phospholipase confirmed the asymmetric nature of the lipid bilayer. The enzyme hydrolyzes lipids into fatty acids and hydrophilic groups. The phospholipase acts only on the outer layer of the membrane, while the inner layer remains intact. The phospholipase treatment resulted in 80%...
7.7K
  1. Home
  2. Research Domains
  3. Information And Computing Sciences
  4. Data Management And Data Science
  5. Query Processing And Optimisation
  6. Enhancing Cloud Security And Deduplication Efficiency With Saligp And Cryptographic Authentication.
  1. Home
  2. Research Domains
  3. Information And Computing Sciences
  4. Data Management And Data Science
  5. Query Processing And Optimisation
  6. Enhancing Cloud Security And Deduplication Efficiency With Saligp And Cryptographic Authentication.

Related Experiment Video

gP2S, an Information Management System for CryoEM Experiments
13:01

gP2S, an Information Management System for CryoEM Experiments

Published on: June 10, 2021

5.5K

Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication.

J K Periasamy1, S Prabhakar2, A Vanathi3

  • 1Department of Computer Science and Engineering, Sri Sai Ram Engineering College, Chennai, India. jkperiasamy.cse@sairam.edu.in.

Scientific Reports
|August 17, 2025

View abstract on PubMed

Summary
This summary is machine-generated.

This study introduces a post-quantum cloud security method that enhances data deduplication efficiency using Genetic Programming and blockchain. The SALIGP method with Cryptographic Deduplication Authentication Scheme (CDAS) improves cloud security and storage efficiency.

Keywords:
Bloom filterCloud computingCryptographic deduplication authentication schemeData deduplication

More Related Videos

Author Spotlight: Automated Deep Brain Stimulation for Parkinson's Disease - Exploring the Possibilities and Challenges of Home Monitoring
06:32

Author Spotlight: Automated Deep Brain Stimulation for Parkinson's Disease - Exploring the Possibilities and Challenges of Home Monitoring

Published on: July 14, 2023

1.4K
Quasi-light Storage for Optical Data Packets
07:45

Quasi-light Storage for Optical Data Packets

Published on: February 6, 2014

11.0K

Related Experiment Videos

gP2S, an Information Management System for CryoEM Experiments
13:01

gP2S, an Information Management System for CryoEM Experiments

Published on: June 10, 2021

5.5K
Author Spotlight: Automated Deep Brain Stimulation for Parkinson's Disease - Exploring the Possibilities and Challenges of Home Monitoring
06:32

Author Spotlight: Automated Deep Brain Stimulation for Parkinson's Disease - Exploring the Possibilities and Challenges of Home Monitoring

Published on: July 14, 2023

1.4K
Quasi-light Storage for Optical Data Packets
07:45

Quasi-light Storage for Optical Data Packets

Published on: February 6, 2014

11.0K

Area of Science:

  • Computer Science
  • Information Security
  • Cloud Computing

Background:

  • Cloud computing offers scalability and resource pooling but faces challenges in data security, resource management, and data duplication.
  • Data duplication in the cloud leads to inefficient storage, increased costs, and potential privacy risks.
  • Existing cloud security measures struggle with decentralized oversight and dynamic environments.

Purpose of the Study:

  • To propose a post-quantum mechanism for enhancing cloud security and data deduplication efficiency.
  • To address the challenges of data duplication and security in distributed cloud environments.
  • To introduce a novel method for secure and efficient data management in cloud computing.

Main Methods:

  • The SALIGP method, leveraging Genetic Programming and a Geometric Approach with Bloom Filters for deduplication detection.
Improved genetic programming
Life Cycle Assessment
Secure active learning
Security
  • Integration of the Cryptographic Deduplication Authentication Scheme (CDAS) using blockchain for secure file storage and retrieval.
  • Pre-encryption of user data before outsourcing to enhance privacy during deduplication.
  • Main Results:

    • Significant reduction in computation and communication times across network nodes, especially in key generation and group operations.
    • Enhanced privacy protection through pre-encryption of user data before cloud outsourcing.
    • Demonstrated improvements in cloud data security, reliability, and storage efficiency.

    Conclusions:

    • The proposed SALIGP method with CDAS offers a scalable and secure framework for modern cloud computing.
    • The dual-layered approach effectively resolves redundant data issues in dynamic, distributed cloud environments.
    • The system provides substantial improvements in cloud data security, reliability, and storage efficiency.