Approach for securing distributed deduplication software
The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks ini...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
28.05.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!