Data De-duplication Scheme for File Checksum in Cloud
暂无分享,去创建一个
Jayashree Agarkhed | Apurva Deshpande | Ankita Saraf | Jayashree Agarkhed | Ankita Saraf | A. Deshpande
[1] Yonggang Wen,et al. Private data deduplication protocols in cloud storage , 2012, SAC '12.
[2] Ethan L. Miller,et al. The effectiveness of deduplication on virtual machine disk images , 2009, SYSTOR '09.
[3] Tao Jiang,et al. Secure and Efficient Cloud Data Deduplication With Randomized Tag , 2017, IEEE Transactions on Information Forensics and Security.
[4] Le Zhang,et al. Fast and Secure Laptop Backups with Encrypted De-duplication , 2010, LISA.
[5] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[6] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Jayashree Agarkhed,et al. Data storage security algorithms for multi cloud environment , 2016, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).
[8] Hong Jiang,et al. SAM: A Semantic-Aware Multi-tiered Source De-duplication Framework for Cloud Backup , 2010, 2010 39th International Conference on Parallel Processing.
[9] Stéphane Ducasse,et al. A language independent approach for detecting duplicated code , 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). 'Software Maintenance for Business Change' (Cat. No.99CB36360).
[10] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[11] Jianbing Ni,et al. Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing , 2020, IEEE Transactions on Dependable and Secure Computing.
[12] Jayashree Agarkhed,et al. A privacy preservation scheme in cloud environment , 2017, 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).
[13] Ahmad-Reza Sadeghi,et al. Twin Clouds: An Architecture for Secure Cloud Computing , 2011 .
[14] Roberto Di Pietro,et al. Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.
[15] Yen-Jen Oyang,et al. Relevant term suggestion in interactive web search based on contextual information in query session logs , 2003, J. Assoc. Inf. Sci. Technol..
[16] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[17] Kyung-Hyune Rhee,et al. Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage , 2018, IEEE Access.
[18] Patrick P. C. Lee,et al. RevDedup: a reverse deduplication storage system optimized for reads to latest backups , 2013, APSys.