Secure and efficient proof of ownership for deduplicated cloud storage
暂无分享,去创建一个
Vijay Laxmi | Manoj Singh Gaur | Jay Dave | Parvez Faruki | Bezawada Bruhadeshwar | Parvez Faruki | V. Laxmi | M. Gaur | Bruhadeshwar Bezawada | Jay Dave
[1] Hong Jiang,et al. A Comprehensive Study of the Past, Present, and Future of Data Deduplication , 2016, Proceedings of the IEEE.
[2] Virginia Vassilevska Williams. Multiplying matrices in O(n 2:373 ) time , 2014 .
[3] Jing Chen,et al. Proofs of Ownership and Retrievability in Cloud Storage , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Roberto Di Pietro,et al. Boosting efficiency and security in proof of ownership for deduplication , 2012, ASIACCS '12.
[5] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[6] Jay Dave,et al. Securing SQL with Access Control for Database as a Service Model , 2016, ICTCS.
[7] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[8] Vijay Laxmi,et al. Behavioural detection with API call-grams to identify malicious PE files , 2012, SecurIT '12.
[9] Won So,et al. Lamassu: Storage-Efficient Host-Side Encryption , 2015, USENIX Annual Technical Conference.
[10] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[11] Vijay Laxmi,et al. DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[12] Vijay Laxmi,et al. DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[13] Roberto Di Pietro,et al. Proof of ownership for deduplication systems: A secure, scalable, and efficient solution , 2016, Comput. Commun..
[14] Kyungtae Kang,et al. Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage , 2016, IEEE Transactions on Knowledge and Data Engineering.
[15] Ronald L. Rivest,et al. Introduction to Algorithms, third edition , 2009 .
[16] Ghassan O. Karame,et al. Transparent Data Deduplication in the Cloud , 2015, CCS.
[17] Chao Yang,et al. Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.
[18] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[19] Mingqiang Li,et al. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal , 2015, IEEE Internet Computing.
[20] Junbeom Hur,et al. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems , 2017, ACM Comput. Surv..
[21] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[22] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[23] Refik Molva,et al. PerfectDedup: Secure Data Deduplication , 2015, DPM/QASA@ESORICS.
[24] Jia Xu,et al. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.
[25] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[26] João Paulo,et al. A Survey and Classification of Storage Deduplication Systems , 2014, ACM Comput. Surv..
[27] Vijay Laxmi,et al. FlowMine: Android app analysis via data flow , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[28] Refik Molva,et al. ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[29] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[30] Nesrine Kaaniche,et al. A Secure Client Side Deduplication Scheme in Cloud Storage Environments , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[31] Vijay Kumar,et al. Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps , 2014, SecureComm.
[32] J. Kumar. SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .
[33] Fuchun Guo,et al. BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication , 2015, IEEE Transactions on Information Forensics and Security.