A Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing
暂无分享,去创建一个
Junbeom Hur | Dongyoung Koo | Joobeom Yun | Young-joo Shin | J. Yun | Junbeom Hur | Young-joo Shin | Dongyoung Koo
[1] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[2] Refik Molva,et al. ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[3] João Pedro Barreto,et al. Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication , 2012, Inf. Process. Lett..
[4] Ivan Stojmenovic,et al. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[5] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[6] Benny Pinkas,et al. Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.
[7] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[8] Mi Wen,et al. Big Data Storage Security , 2016 .
[9] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[10] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[11] Mario Nemirovsky,et al. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[12] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[13] Ciprian Dobre,et al. Big Data and Internet of Things: A Roadmap for Smart Environments , 2014, Big Data and Internet of Things.
[14] Alessandro Sorniotti,et al. A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.
[15] Jiang Zhu,et al. Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.
[16] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[17] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[18] Shui Yu,et al. Big Data Concepts, Theories, and Applications , 2016, Springer International Publishing.
[19] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[20] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..