Secure Image Deduplication in Cloud Storage
暂无分享,去创建一个
[1] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[2] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[3] Cezary Dubnicki,et al. HydraFS: A High-Throughput File System for the HYDRAstor Content-Addressable Storage System , 2010, FAST.
[4] João Pedro Sousa,et al. Authentication, authorisation and auditing for ubiquitous computing: a survey and vision , 2011, Int. J. Space Based Situated Comput..
[5] Xuan Li,et al. A secure cloud storage system supporting privacy-preserving fuzzy deduplication , 2016, Soft Comput..
[6] John Gantz,et al. The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .
[7] Val Henson,et al. An Analysis of Compare-by-hash , 2003, HotOS.
[8] William J. Bolosky,et al. Single instance storage in Windows® 2000 , 2000 .
[9] Dan Feng,et al. DAM: A DataOwnership-Aware Multi-layered De-duplication Scheme , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.
[10] Fang Liu,et al. AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment , 2011, 2011 IEEE International Conference on Cluster Computing.
[11] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Ian Pratt,et al. Proceedings of the General Track: 2004 USENIX Annual Technical Conference , 2004 .
[13] Christopher Chute,et al. The Diverse and Exploding Digital Universe , 2011 .
[14] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[15] Alfredo De Santis,et al. Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[16] William J. Bolosky,et al. Single Instance Storage in Windows , 2000 .
[17] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[18] Madoka Yuriyama,et al. Integrated cloud computing environment with IT resources and sensor devices , 2011, Int. J. Space Based Situated Comput..
[19] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[20] Irfan Ahmad,et al. Decentralized Deduplication in SAN Cluster File Systems , 2009, USENIX Annual Technical Conference.
[21] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[22] Bruno Carpentieri,et al. A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[23] Mahadev Satyanarayanan,et al. Using content addressable techniques to optimize client-server systems , 2007 .