Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing
暂无分享,去创建一个
Linchao Zhang | Hua Ma | Guohua Tian | Guohua Tian | Linchao Zhang | Hua Ma
[1] Jitendra Singh,et al. Cyber-Attacks in Cloud Computing: A Case Study , 2014 .
[2] Sherman S. M. Chow,et al. Updatable Block-Level Message-Locked Encryption , 2017, IEEE Transactions on Dependable and Secure Computing.
[3] Refik Molva,et al. ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[4] Tao Jiang,et al. Secure and Efficient Cloud Data Deduplication with Ownership Management , 2020, IEEE Transactions on Services Computing.
[5] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[6] Wang Zhenyu,et al. A Policy-based De-duplication Mechanism for Securing Cloud Storage , 2015 .
[7] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[8] Yang Chao,et al. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion , 2015 .
[9] Junbeom Hur,et al. A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[10] Jianfeng Wang,et al. TrDup: enhancing secure data deduplication with user traceability in cloud computing , 2017, Int. J. Web Grid Serv..
[11] Ku-Young Chang,et al. Client‐Side Deduplication to Enhance Security and Reduce Communication Costs , 2017 .
[12] W. Marsden. I and J , 2012 .
[13] Junbeom Hur,et al. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..
[14] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[15] Kyungtae Kang,et al. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage , 2016, IEEE Transactions on Knowledge and Data Engineering.
[16] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[17] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[18] Yu Cheng,et al. Distributed resource sharing in fog-assisted big data streaming , 2017, 2017 IEEE International Conference on Communications (ICC).
[19] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[20] Dooho Choi,et al. Privacy-preserving cross-user source-based data deduplication in cloud storage , 2012, 2012 International Conference on ICT Convergence (ICTC).
[21] J. Kumar. SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .
[22] Fuchun Guo,et al. BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.
[23] Jia Xu,et al. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.
[24] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.