Academic literature on the topic 'Client-side storage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Client-side storage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Client-side storage"

1

Kim, Cheiyol, Sangmin Lee, Youngkyun Kim, and Daewha Seo. "Adaptation of Distributed File System to VDI Storage by Client-Side CacheAdaptation of Distributed File System to VDI Storage by Client-Side Cache." Journal of Computers 11, no. 1 (January 2016): 10–17. http://dx.doi.org/10.17706/jcp.11.1.10-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hatzieleftheriou, Andromachi, and Stergios V. Anastasiadis. "Client-Side Journaling for Durable Shared Storage." ACM Transactions on Storage 13, no. 4 (December 15, 2017): 1–34. http://dx.doi.org/10.1145/3149372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Gyuwon, Suhyun Kim, and Dongmahn Seo. "Saveme: client-side aggregation of cloud storage." IEEE Transactions on Consumer Electronics 61, no. 3 (August 2015): 302–10. http://dx.doi.org/10.1109/tce.2015.7298089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Janik, Arkadiusz, and Szymon Kiebzak. "Client-side Storage. Offline Availability of Data." Journal of Automation, Mobile Robotics and Intelligent Systems 8, no. 4 (December 20, 2014): 3–10. http://dx.doi.org/10.14313/jamris_4-2014/30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hariyadi, Dedy, Imam Puji Santoso, and Ramadhana Saputra. "IMPLEMENTASI PROTEKSI CLIENT-SIDE PADA PRIVATE CLOUD STORAGE NEXTCLOUD." Jurnal Manajemen Informatika dan Sistem Informasi 2, no. 1 (January 31, 2019): 16. http://dx.doi.org/10.36595/misi.v2i1.65.

Full text
Abstract:
Saat ini hampir setiap perangkat terhubung dengan teknologi komputasi awan. Teknologi komputasi awan yang menawarkan layanan menarik adalah Cloud Storage seperti Google Drive, Dropbox, One Drive, Mega, dan lain-lain. Teknologi Cloud Storage semacam itu dapat diterapkan di lingkungan private atau on-premise. Peranti lunak Cloud Storage yang dapat diinstall di lingkungan private diantaranya, OwnCloud, Nextcloud, SeaFile, dan lain-lain. Implementasi Cloud Storage perlu diwaspadai karena memiliki celah keamanan saat transmisi data dari client ke server atau sebaliknya dan tidak terproteksinya berkas yang tersimpan pada Cloud Storage server. Pada penelitian ini menunjukkan hasil pengujian kerentanan menyimpan berkas dan direktori di penyedia Cloud Storage berserta memberikan solusi mengatasi keamanan tersebut.
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Kyungsu, Ji Eun Eom, Jeongsu Park, and Dong Hoon Lee. "Secure and Efficient Client-side Deduplication for Cloud Storage." Journal of the Korea Institute of Information Security and Cryptology 25, no. 1 (February 28, 2015): 83–94. http://dx.doi.org/10.13089/jkiisc.2015.25.1.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Youn, Taek-Young, Nam-Su Jho, Kyung Hyune Rhee, and Sang Uk Shin. "Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage." Wireless Communications and Mobile Computing 2019 (May 15, 2019): 1–11. http://dx.doi.org/10.1155/2019/7840917.

Full text
Abstract:
Since deduplication inevitably implies data sharing, control over access permissions in an encrypted deduplication storage is more important than a traditional encrypted storage. Therefore, in terms of flexibility, data deduplication should be combined with data access control techniques. In this paper, we propose an authorized deduplication scheme using CP-ABE to solve this problem. The proposed scheme provides client-side deduplication while providing confidentiality through client-side encryption to prevent exposure of users’ sensitive data on untrusted cloud servers. Also, unlike existing convergent encryption schemes, it provides authorized convergent encryption by using CP-ABE to allow only authorized users to access critical data. The proposed authorized deduplication scheme provides an adequate trade-off between storage space efficiency and security in cloud environment and is very suitable for the hybrid cloud model considering both the data security and the storage efficiency in a business environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Seo, Dongmahn, Suhyun Kim, and Gyuwon Song. "Mutual exclusion method in client-side aggregation of cloud storage." IEEE Transactions on Consumer Electronics 63, no. 2 (May 2017): 185–90. http://dx.doi.org/10.1109/tce.2017.014838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shin, Youngjoo, and Kwangjo Kim. "Differentially private client-side data deduplication protocol for cloud storage services." Security and Communication Networks 8, no. 12 (October 30, 2014): 2114–23. http://dx.doi.org/10.1002/sec.1159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Braeken, An. "Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak." Sensors 20, no. 8 (April 11, 2020): 2160. http://dx.doi.org/10.3390/s20082160.

Full text
Abstract:
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Client-side storage"

1

Regin, Måns, and Gunnarsson Emil. "Refactoring Existing Database Layers for Improved Performance, Readability and Simplicity." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105277.

Full text
Abstract:
Since the late 90s, support and services at SAAB have produced and maintained a product called ELDIS. ELDIS is an application used by Swedish armed forces at air bases in Sweden and flight technicians at air bases. It displays electrical information, wire diagrams, and detailed information for cables, electrical equipment, and other electrical devices. The main problem for ELDIS is that when drawing wire diagrams in the application, it takes too long of a time when the stored procedures are retrieving information from the database. There are two significant areas in this project, analyzing and optimizing stored procedures and implementing a client-side solution. This project aims to guide SAAB to choose the right approach for solving the performance issue of the application and display some of the problems that can exist with slow stored procedures for companies in general. This project has optimized the most used stored procedure at SAAB and compared it to a client-side solution and the original application. The result of this project is that both the optimized stored procedure implementation and the client-side implementation is a faster option than the original implementation. It also highlights that when trying to optimize the stored procedures, indexing on the database should be considered for increasing the performance of a stored procedure.
APA, Harvard, Vancouver, ISO, and other styles
2

Henziger, Eric. "The Cost of Confidentiality in Cloud Storage." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148907.

Full text
Abstract:
Cloud storage services allow users to store and access data in a secure and flexible manner. In recent years, cloud storage services have seen rapid growth in popularity as well as in technological progress and hundreds of millions of users use these services to store thousands of petabytes of data. Additionally, the synchronization of data that is essential for these types of services stands for a significant amount of the total internet traffic. In this thesis, seven cloud storage applications were tested under controlled experiments during the synchronization process to determine feature support and measure performance metrics. Special focus was put on comparing applications that perform client side encryption of user data to applicationsthat do not. The results show a great variation in feature support and performance between the different applications and that client side encryption introduces some limitations to other features but that it does not necessarily impact performance negatively. The results provide insights and enhances the understanding of the advantages and disadvantages that come with certain design choices of cloud storage applications. These insights will help future technological development of cloud storage services.
APA, Harvard, Vancouver, ISO, and other styles
3

Qin, Dai. "Reliable Writeback for Client-side Flash Caches." Thesis, 2014. http://hdl.handle.net/1807/65598.

Full text
Abstract:
Modern data centers are increasingly using shared storage solutions for ease of management. Data is cached on the client side on inexpensive and high-capacity flash devices, helping improve performance and reduce contention on the storage side. Currently, write-through caching is used because it ensures consistency and durability under client failures, but it offers poor performance for write-heavy workloads. In this work, we propose two write-back based caching policies, called write-back flush and write-back persist, that provide strong reliability guarantees, under two different client failure models. These policies rely on storage applications such as file systems and databases issuing write barriers to persist their data, because these barriers are the only reliable method for storing data durably on storage media. Our evaluation shows that these policies achieve performance close to write-back caching, while providing stronger guarantees than vanilla write-though caching.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Client-side storage"

1

Riché, Stéphanie, Gavin Brebner, and Mickey Gittler. "Client—Side Profile Storage." In Lecture Notes in Computer Science, 127–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45745-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zakas, Nicholas C. "Offline Applications and Client-Side Storage." In Professional Javascript® for Web Developers, 765–800. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781118722176.ch23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

da Rocha, Marciano, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgonio, Rodrigo Tomaz Pagno, and Newton Carlos Will. "Trusted Client-Side Encryption for Cloud Storage." In Communications in Computer and Information Science, 1–24. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72369-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Apers, Chris, and Daniel Paterson. "A Better Handling of Client-Side Data Storage." In Beginning iPhone and iPad Web Apps, 431–66. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3046-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Price, Geraint. "Client v. Server Side Protocols, Interfaces and Storage." In Security Protocols, 63–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Price, Geraint. "Client v. Server Side Protocols, Interfaces and Storage." In Security Protocols, 74–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11542322_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tachikawa, Akihiro, and Akira Kanaoka. "Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions." In HCI for Cybersecurity, Privacy and Trust, 652–70. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ranjani, R. Siva, D. Lalitha Bhaskari, and P. S. Avadhani. "Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 473–80. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mishra, Shivansh, and Surjit Singh. "Secure Data Deduplication on Cloud Storage." In Advances in Wireless Technologies and Telecommunication, 23–40. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch002.

Full text
Abstract:
Deduplication is the process of removing duplicate data by storing only one copy of the original data and replacing the others simply as a reference to the original. When data is stored on cloud storage, client-side deduplication helps in reducing storage and communications overheads both from the client as well as the server perspective. Secure deduplication is the practice by which the data stored on the cloud is secured from external influences such that the clients maintain the privacy of their data, and the server also gets to take advantage of deduplication. This is done by encrypting the data using different schemes into ciphertext, which makes sense only to the original client. The schemes created for secure deduplication on cloud storage provide a solution to the problem of duplication detection in encrypted ciphertext. This chapter provides a brief overview of secure deduplication used on cloud storage along with the issues encountered during its implementation. The chapter also includes a literature review and comparison of some deduplication techniques.
APA, Harvard, Vancouver, ISO, and other styles
10

Herbster, R., Hyggo Almeida, Angelo Perkusich, and Marcos Morais. "Enabling Multimedia Applications in Memory-Limited Mobile Devices." In Multimedia Technologies, 472–77. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-953-3.ch034.

Full text
Abstract:
In this article we propose a layered architecture that makes possible the visualization of large videos, and even other multimedia documents, in memory/processing limited devices. Storage of videos is performed at the server side, and the client plays the video without worrying about storage space in the device. Data available in the server is divided into small pieces of readable data for mobile devices, generally JPEG files. For example, when the client requests videos from the server, the videos are sent as JPEG files and shown at an ideal rate for users. The video frames are sent through a wireless connection.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Client-side storage"

1

Kaaniche, Nesrine, and Maryline Laurent. "A Secure Client Side Deduplication Scheme in Cloud Storage Environments." In 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2014. http://dx.doi.org/10.1109/ntms.2014.6814002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

G, Kranthi Kiran G., and V. Naresh Kumar. "Managing Deduplicate Data at Client Side in Public Cloud Storage Environment." In National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics. AI Publications, 2016. http://dx.doi.org/10.22161/ijaers/si.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jemel, Mayssa, and Ahmed Serhrouchni. "Toward user's devices collaboration to distribute securely the client side storage." In 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS). IEEE, 2015. http://dx.doi.org/10.1109/notere.2015.7293479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Henziger, Eric, and Niklas Carlsson. "Delta Encoding Overhead Analysis of Cloud Storage Systems Using Client-Side Encryption." In 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2019. http://dx.doi.org/10.1109/cloudcom.2019.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Jia, Ee-Chien Chang, and Jianying Zhou. "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage." In the 8th ACM SIGSAC symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484313.2484340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

da Rocha, Marciano, Dalton Valadares, Angelo Perkusich, Kyller Gorgonio, Rodrigo Pagno, and Newton Will. "Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment." In 10th International Conference on Cloud Computing and Services Science. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009130600310043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Henziger, Eric, and Niklas Carlsson. "The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems." In UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3344341.3368808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Islam, Tariqul, Hassan Mistareehi, and D. Manivannan. "SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-Side Data Deduplication." In GLOBECOM 2019 - 2019 IEEE Global Communications Conference. IEEE, 2019. http://dx.doi.org/10.1109/globecom38437.2019.9013469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yanong He, Rulong Chen, and Yuelong Zhao. "Research on the client-side cache technology of the intelligent network disk storage system." In 2011 Second International Conference on Mechanic Automation and Control Engineering (MACE). IEEE, 2011. http://dx.doi.org/10.1109/mace.2011.5987969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Djoko, Judicael B., Jack Lange, and Adam J. Lee. "NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX." In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2019. http://dx.doi.org/10.1109/dsn.2019.00049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography