Cloud Storage: A Review on Secure Deduplication and Issues
暂无分享,去创建一个
[1] Ugo Vaccaro,et al. Compression and Complexity of SEQUENCES 1997 , 1997 .
[2] Nesrine Kaaniche,et al. A Secure Client Side Deduplication Scheme in Cloud Storage Environments , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).
[3] Robert H. Deng,et al. Deduplication on Encrypted Big Data in Cloud , 2016, IEEE Transactions on Big Data.
[4] Yonggang Wen,et al. Private data deduplication protocols in cloud storage , 2012, SAC '12.
[5] Shouhuai Xu,et al. Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.
[6] Min Dai,et al. Detecting Cache-Based Side Channel Attacks in the Cloud: An Approach with Cascade Detection Mode , 2014 .
[7] Frederik Armknecht,et al. Side Channels in Deduplication: Trade-offs between Leakage and Efficiency , 2016, AsiaCCS.
[8] Alessandro Sorniotti,et al. A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.
[9] João Paulo,et al. A Survey and Classification of Storage Deduplication Systems , 2014, ACM Comput. Surv..
[10] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[11] Christoph Neumann,et al. Improving the Resistance to Side-Channel Attacks on Cloud Storage Services , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[12] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[13] Junbeom Hur,et al. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems , 2017, ACM Comput. Surv..
[14] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Pin Zhou,et al. Demystifying data deduplication , 2008, Companion '08.
[16] Ugo Vaccaro,et al. Sequences II: Methods in Communication, Security, and Computer Science , 2011 .
[17] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[18] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[19] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[20] Chao Yang,et al. Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.
[21] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[22] Kwangjo Kim,et al. Differentially private client-side data deduplication protocol for cloud storage services , 2015, Secur. Commun. Networks.
[23] Yiwei Thomas Hou,et al. Modeling the side-channel attacks in data deduplication with game theory , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[24] Dooho Choi,et al. Privacy-preserving cross-user source-based data deduplication in cloud storage , 2012, 2012 International Conference on ICT Convergence (ICTC).
[25] Han-Chieh Chao,et al. Proof of ownership in deduplicated cloud storage with mobile device efficiency , 2015, IEEE Network.
[26] Tsuyoshi Murata,et al. {m , 1934, ACML.
[27] P. L. Amitha,et al. ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING , 2017 .
[28] Darrell D. E. Long,et al. Secure data deduplication , 2008, StorageSS '08.
[29] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[30] Chao Yang,et al. Provable Ownership of Encrypted Files in De-duplication Cloud Storage , 2015, Ad Hoc Sens. Wirel. Networks.
[31] Tian Luo,et al. CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of Flash Memory based Solid State Drives , 2011, FAST.
[32] Mauro Conti,et al. RARE: Defeating side channels based on data-deduplication in cloud storage , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[33] Chuanyi Liu,et al. DR-Cloud: Multi-cloud based disaster recovery service , 2014 .
[34] Mihir Bellare,et al. Interactive Message-Locked Encryption and Secure Deduplication , 2015, Public Key Cryptography.