R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
暂无分享,去创建一个
[1] Chuan Qin,et al. The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System , 2017, ACM Trans. Storage.
[2] Martín Abadi,et al. Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..
[3] Pin Zhou,et al. Demystifying data deduplication , 2008, Companion '08.
[4] Kai Li,et al. Avoiding the Disk Bottleneck in the Data Domain Deduplication File System , 2008, FAST.
[5] Shmuel Tomi Klein,et al. The design of a similarity based deduplication system , 2009, SYSTOR '09.
[6] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[7] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[8] Yitao Duan,et al. Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy , 2014, CCSW.
[9] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[10] Lukas Kencl,et al. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage , 2018, IEEE Transactions on Dependable and Secure Computing.
[11] Jianbing Ni,et al. Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing , 2020, IEEE Transactions on Dependable and Secure Computing.
[12] Chin-Chen Chang,et al. Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[13] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[14] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[15] Tao Jiang,et al. DedupDUM: Secure and scalable data deduplication with dynamic user management , 2018, Inf. Sci..
[16] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[17] Jianfeng Ma,et al. Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing , 2019, IEEE Transactions on Services Computing.
[18] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[19] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[20] Li Duan,et al. Secure Deduplication of Encrypted Data: Refined Model and New Constructions , 2017, IACR Cryptol. ePrint Arch..
[21] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[22] Ran Canetti,et al. Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.
[23] Mihir Bellare,et al. Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.
[24] Robert H. Deng,et al. Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.
[25] Pierre Sens,et al. Proceedings of Hotos Ix: the 9th Workshop on Hot Topics in Operating Systems Hotos Ix: the 9th Workshop on Hot Topics in Operating Systems Post: a Secure, Resilient, Cooperative Messaging System * , 2022 .
[26] Le Zhang,et al. Fast and Secure Laptop Backups with Encrypted De-duplication , 2010, LISA.