Deduplication on Encrypted Big Data in Cloud
暂无分享,去创建一个
Robert H. Deng | Zheng Yan | Wenxiu Ding | Xixun Yu | Haiqi Zhu | R. Deng | Zheng Yan | Wenxiu Ding | Haiqi Zhu | Xixun Yu
[1] Emmanuelle Anceaume,et al. A Secure Two-Phase Data Deduplication Scheme , 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS).
[2] Roberto Di Pietro,et al. Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.
[3] Naixue Xiong,et al. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.
[4] Min Xu,et al. Efficient Hybrid Inline and Out-of-Line Deduplication for Backup Storage , 2014, TOS.
[5] Yonggang Wen,et al. Private data deduplication protocols in cloud storage , 2012, SAC '12.
[6] Jeng-Shyang Pan,et al. Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes , 2014, IEEE Systems Journal.
[7] Chao Yang,et al. Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.
[8] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[9] Fred Douglis,et al. Characteristics of backup workloads in production systems , 2012, FAST.
[10] Dan Feng,et al. Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information , 2014, USENIX Annual Technical Conference.
[11] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[12] Mark Lillibridge,et al. Improving restore speed for backup systems that use inline chunk-based deduplication , 2013, FAST.
[13] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[14] Zhe Sun,et al. DeDu: Building a deduplication storage system over cloud computing , 2011, Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[15] Athanasios V. Vasilakos,et al. Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..
[16] Athanasios V. Vasilakos,et al. Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.
[17] Athanasios V. Vasilakos,et al. Big data analytics: a survey , 2015, Journal of Big Data.
[18] Raimo Kantola,et al. Controlling Cloud Data Access Based on Reputation , 2015, Mob. Networks Appl..
[19] Chun-I Fan,et al. Hybrid data deduplication in cloud environment , 2012, 2012 International Conference on Information Security and Intelligent Control.
[20] Harikesh Pandey,et al. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication , 2017 .
[21] Huajun Chen,et al. A Verifiable Data Deduplication Scheme in Cloud Computing , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[22] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[23] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[24] Athanasios V. Vasilakos,et al. SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.
[25] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[26] João Paulo,et al. A Survey and Classification of Storage Deduplication Systems , 2014, ACM Comput. Surv..
[27] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[28] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[29] Jinjun Chen,et al. External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..
[30] Refik Molva,et al. ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[31] Máire O'Neill,et al. Low-cost digital signature architecture suitable for radio frequency identification tags , 2010, IET Comput. Digit. Tech..
[32] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[33] Naixue Xiong,et al. A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization , 2014, IEEE Transactions on Services Computing.
[34] Michal Kaczmarczyk,et al. Reducing impact of data fragmentation caused by in-line deduplication , 2012, SYSTOR '12.
[35] Zheng Yan,et al. A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud , 2015, ICA3PP.
[36] Jinjun Chen,et al. Service Mining for Trusted Service Composition in Cross-Cloud Environment , 2017, IEEE Systems Journal.
[37] Nesrine Kaaniche,et al. A Secure Client Side Deduplication Scheme in Cloud Storage Environments , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).