Simulating secure cloud storage schemes
暂无分享,去创建一个
[1] Refik Molva,et al. PerfectDedup: Secure Data Deduplication , 2015, DPM/QASA@ESORICS.
[2] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[4] Refik Molva,et al. Block-level De-duplication with Encrypted Data , 2014, Open J. Cloud Comput..
[5] João Paulo,et al. A Survey and Classification of Storage Deduplication Systems , 2014, ACM Comput. Surv..
[6] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[7] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[8] Darrell D. E. Long,et al. Secure data deduplication , 2008, StorageSS '08.
[9] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[10] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[11] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[12] Raju Rangaswami,et al. I/O Deduplication: Utilizing content similarity to improve I/O performance , 2010, TOS.
[13] Ghassan O. Karame,et al. Transparent Data Deduplication in the Cloud , 2015, CCS.
[14] Kave Eshghi,et al. A Framework for Analyzing and Improving Content-Based Chunking Algorithms , 2005 .
[15] Chengwei Zhang,et al. Leap-based Content Defined Chunking — Theory and Implementation , 2015, 2015 31st Symposium on Mass Storage Systems and Technologies (MSST).
[16] Hubert Ritzdorf,et al. On Information Leakage in Deduplicated Storage Systems , 2016, CCSW.