메뉴 건너뛰기




Volumn 320, Issue , 2013, Pages 250-262

Policy-Based De-duplication in Secure Cloud Storage

Author keywords

Cloud Storage; Convergent Encryption; Data De duplication; Encryption; Proxy Re encryption

Indexed keywords

CRYPTOGRAPHY;

EID: 84880804902     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-35795-4_32     Document Type: Conference Paper
Times cited : (20)

References (20)
  • 1
    • 84858201794 scopus 로고    scopus 로고
    • Secure and efficient proof of storage with deduplication
    • Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. In: Proc. CODASPY 2012, pp. 1-12 (2012)
    • (2012) Proc. CODASPY 2012 , pp. 1-12
    • Zheng, Q.1    Xu, S.2
  • 2
    • 84880774036 scopus 로고    scopus 로고
    • Secure deduplication on mobile devices
    • Marques, L., Costa, C.J.: Secure deduplication on mobile devices. In: Proc. OSDOC 2011, pp. 16-29 (2011)
    • (2011) Proc. OSDOC 2011 , pp. 16-29
    • Marques, L.1    Costa, C.J.2
  • 4
    • 84900490028 scopus 로고    scopus 로고
    • Secure Cloud Storage with Encrypted Data using File-Based Authentication
    • Xu, J., Chang, E., Zhou, J.: Secure Cloud Storage with Encrypted Data using File-Based Authentication. In: IACR (2011), http://eprint.iacr.org/2011/538.pdf
    • (2011) IACR
    • Xu, J.1    Chang, E.2    Zhou, J.3
  • 5
    • 80155161434 scopus 로고    scopus 로고
    • A secure cloud backup system with assured deletion and version control
    • Rahumed, A., Chen, H.C.H., Tang, Y., Lee, P.P.C., Lui, J.C.S.: A secure cloud backup system with assured deletion and version control. In: Proc. ICPPW 2011, pp. 160-167 (2011)
    • (2011) Proc. ICPPW 2011 , pp. 160-167
    • Rahumed, A.1    Chen, H.C.H.2    Tang, Y.3    Lee, P.P.C.4    Lui, J.C.S.5
  • 6
    • 85094658894 scopus 로고    scopus 로고
    • Fast and Secure Laptop Backups with Encrypted De-duplication
    • Anderson, P., Zhang, L.: Fast and Secure Laptop Backups with Encrypted De-duplication. In: Proc. LISA 2010, pp. 29-40 (2010)
    • (2010) Proc. LISA 2010 , pp. 29-40
    • Anderson, P.1    Zhang, L.2
  • 7
    • 0036373715 scopus 로고    scopus 로고
    • Reclaiming space from duplicate files in a serverless distributed file system
    • Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proc. ICDCS 2002, pp. 617-624 (2002)
    • (2002) Proc. ICDCS 2002 , pp. 617-624
    • Douceur, J.R.1    Adya, A.2    Bolosky, W.J.3    Simon, D.4    Theimer, M.5
  • 8
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Security & Privacy 8(6), 40-47 (2010)
    • (2010) IEEE Security & Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 9
    • 85050160774 scopus 로고
    • Probabilistic encryption & how to play mental poker keeping secret all partial information
    • Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Annual ACM Symposium on Theory of Computing (1982)
    • (1982) Annual ACM Symposium on Theory of Computing
    • Goldwasser, S.1    Micali, S.2
  • 10
    • 34548110786 scopus 로고    scopus 로고
    • The Expanding Digital Universe: A Forecast of Worldwide Information Growth through 2010
    • In: March
    • Gantz, J.F., et al.: The Expanding Digital Universe: A Forecast of Worldwide Information Growth through 2010. In: IDC (March 2007)
    • (2007) IDC
    • Gantz, J.F.1
  • 13
    • 38049061546 scopus 로고    scopus 로고
    • Identity-Based Proxy Re-encryption
    • Springer, Heidelberg, In: Katz, J., Yung, M. (eds.)
    • Green, M., Ateniese, G.: Identity-Based Proxy Re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
    • (2007) ACNS 2007. LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 14
    • 84957718934 scopus 로고    scopus 로고
    • Divertible Protocols and Atomic Proxy Cryptography
    • Springer, Heidelberg, In: Nyberg, K. (ed.)
    • Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) EUROCRYPT 1998. LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.J.3
  • 17
    • 70450060162 scopus 로고    scopus 로고
    • R-ADMAD: High reliability provision for large-scale de-duplication archival storage systems
    • In: June
    • Liu, C., et al.: R-ADMAD: High reliability provision for large-scale de-duplication archival storage systems. In: Proceedings of the 23rd International Conference on Supercomputing, pp. 370-379 (June 2009)
    • (2009) Proceedings of the 23rd International Conference on Supercomputing , pp. 370-379
    • Liu, C.1
  • 18
    • 58549086614 scopus 로고    scopus 로고
    • Type-Based Proxy Re-encryption and Its Construction
    • Springer, Heidelberg, In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.)
    • Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Type-Based Proxy Re-encryption and Its Construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130-144. Springer, Heidelberg (2008)
    • (2008) INDOCRYPT 2008. LNCS , vol.5365 , pp. 130-144
    • Ibraimi, L.1    Tang, Q.2    Hartel, P.3    Jonker, W.4
  • 20
    • 63049083812 scopus 로고    scopus 로고
    • Secure sockets layer
    • Weaver, A.C.: Secure sockets layer. Computer 39(4), 88-90 (2006)
    • (2006) Computer , vol.39 , Issue.4 , pp. 88-90
    • Weaver, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.