메뉴 건너뛰기




Volumn , Issue , 2013, Pages 224-229

Anonymous deduplication of encrypted data with proof of ownership in cloud storage

Author keywords

Cloud computing; Deduplication of encrypted data; Digital credential; Proof of Ownership; Proxy re encryption

Indexed keywords

CLOUD STORAGE SERVICES; CRYPTOGRAPHIC METHODS; DE DUPLICATIONS; DIGITAL CREDENTIALS; ENCRYPTED DATA; PROOF OF OWNERSHIP; PROXY RE ENCRYPTIONS; UNTRUSTED SERVER;

EID: 84893256200     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCChina.2013.6671119     Document Type: Conference Paper
Times cited : (20)

References (17)
  • 1
    • 84888414106 scopus 로고    scopus 로고
    • Net app deduplication for fas and v-series deployment and implementation guide
    • C. Alvarez, "Net app deduplication for fas and v-series deployment and implementation guide," Technical ReportTR, 3505, 2011.
    • (2011) Technical ReportTR , vol.3505
    • Alvarez, C.1
  • 5
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage," IEEE Security and Privacy, vol. 8, no. 6, pp. 40-47, 2010.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 8
    • 74049103479 scopus 로고    scopus 로고
    • Pors: Proofs of retrievability for large files
    • A. Juels, "Pors: proofs of retrievability for large files," in Proc. of CCS'07, 2007.
    • (2007) Proc. of CCS'07
    • Juels, A.1
  • 11
    • 79960900327 scopus 로고    scopus 로고
    • A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
    • Sept.
    • Z. Hao, S. Zhong, and N. Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability," IEEE Transactions on Knowledge and Data Engineering, vol. 23, pp. 1432-1437, Sept. 2011.
    • (2011) IEEE Transactions on Knowledge and Data Engineering , vol.23 , pp. 1432-1437
    • Hao, Z.1    Zhong, S.2    Yu, N.3
  • 12
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for nontransferable anonymous credentials with optional anonymity revocation
    • Springer, May
    • J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation," in EUROCRYPT'01, pp. 93-118, Springer, May 2001.
    • (2001) EUROCRYPT'01 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. of EUROCRYPT'98, pp. 127-144, 1998.
    • (1998) Proc. of EUROCRYPT'98 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 15
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Feb.
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inf. Syst. Secur., vol. 9, pp. 1-30, Feb. 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 16
  • 17
    • 84969346266 scopus 로고
    • A certified digital signature
    • R. C. Merkle, "A certified digital signature," in Proc. of CRYPTO'89, pp. 218-238, 1990.
    • (1990) Proc. of CRYPTO'89 , pp. 218-238
    • Merkle, R.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.