Achieving Secure Deduplication by Using Private Cloud and Public Cloud
暂无分享,去创建一个
Guljar P. Shaikh | Snehal Chaudhary | Priyanka Paygude | Debnath Bhattacharyya | P. Paygude | Snehal Chaudhary | D. Bhattacharyya
[1] Dheeraj Kumar Singh,et al. Secure Deduplication Techniques: A Study , 2016 .
[2] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[3] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[4] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[5] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.