SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage
暂无分享,去创建一个
Junbeom Hur | Dongyoung Koo | Joobeom Yun | Young-joo Shin | J. Yun | Junbeom Hur | Young-joo Shin | Dongyoung Koo
[1] Jian Weng,et al. Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control , 2016, AsiaCCS.
[2] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[3] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[4] Hui Li,et al. Secure multi-server-aided data deduplication in cloud computing , 2015, Pervasive Mob. Comput..
[5] Pin Zhou,et al. Demystifying data deduplication , 2008, Companion '08.
[6] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Yitao Duan,et al. Distributed Key Generation for Encrypted Deduplication: Achieving the Strongest Privacy , 2014, CCSW.
[9] Kim-Kwang Raymond Choo,et al. Google Drive: Forensic analysis of data remnants , 2014, J. Netw. Comput. Appl..
[10] Darrell D. E. Long,et al. Secure data deduplication , 2008, StorageSS '08.
[11] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[12] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[13] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[14] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[15] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.