메뉴 건너뛰기




Volumn 8437, Issue , 2014, Pages 99-118

A secure data deduplication scheme for cloud storage

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; CRYPTOGRAPHY; DIGITAL STORAGE; SEMANTICS;

EID: 84916638740     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-45472-5_8     Document Type: Conference Paper
Times cited : (132)

References (24)
  • 1
    • 84916622798 scopus 로고    scopus 로고
    • Open Security Foundation: DataLossDB
    • Open Security Foundation: DataLossDB. http://datalossdb.org/
  • 2
    • 78249279921 scopus 로고    scopus 로고
    • Multi-level comparison of data deduplication in a backup scenario
    • ACM, New York
    • Meister, D., Brinkmann, A.: Multi-level comparison of data deduplication in a backup scenario. In: SYSTOR ’09, pp. 8:1–8:12. ACM, New York (2009)
    • (2009) SYSTOR ’09 , pp. 8:1-8:12
    • Meister, D.1    Brinkmann, A.2
  • 5
    • 84916622797 scopus 로고    scopus 로고
    • Understanding data de-duplication ratios. SNIA forum
    • Dutch, M., Freeman, L.: Understanding data de-duplication ratios. SNIA forum (2008). http://www.snia.org/sites/default/files/Understanding DataDeduplication Ratios-20080718.pdf
    • (2008)
    • Dutch, M.1    Freeman, L.2
  • 7
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Security Privacy 8(6), 40–47 (2010)
    • (2010) IEEE Security Privacy , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 8
    • 80755168326 scopus 로고    scopus 로고
    • Proofs of ownership in remote storage systems
    • ACM, New York
    • Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: CCS ’11, pp. 491–500. ACM, New York (2011)
    • (2011) CCS ’11 , pp. 491-500
    • Halevi, S.1    Harnik, D.2    Pinkas, B.3    Shulman-Peleg, A.4
  • 9
    • 84871949666 scopus 로고    scopus 로고
    • Boosting efficiency and security in proof of ownership for deduplication
    • ACM, New York
    • Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS ’12, pp. 81–82. ACM, New York (2012)
    • (2012) ASIACCS ’12 , pp. 81-82
    • Di Pietro, R.1    Sorniotti, A.2
  • 10
    • 0036373715 scopus 로고    scopus 로고
    • Reclaiming space from duplicate files in a serverless distributed file system
    • IEEE Computer Society, Washington, DC
    • Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS ’02, pp. 617–632. IEEE Computer Society, Washington, DC (2002)
    • (2002) ICDCS ’02 , pp. 617-632
    • Douceur, J.R.1    Adya, A.2    Bolosky, W.J.3    Simon, D.4    Theimer, M.5
  • 12
    • 84883391608 scopus 로고    scopus 로고
    • Message-locked encryption and secure deduplication
    • In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
    • Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013)
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 296-312
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3
  • 13
    • 84877968673 scopus 로고    scopus 로고
    • .: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
    • Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: 8th ACM SIGSAC Symposium, pp. 195–206
    • 8th ACM SIGSAC Symposium , pp. 195-206
    • Xu, J.1    Chang, E.C.2    Zhou, J.3
  • 15
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.), Springer, Heidelberg
    • Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
    • (2002) IPTPS 2002. LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 17
    • 84868107467 scopus 로고    scopus 로고
    • Confidentiality as a service-usable security for the cloud
    • Fahl, S., Harbach, M., Muders, T., Smith, M.: Confidentiality as a service-usable security for the cloud. In: TrustCom 2012, pp. 153–162 (2012)
    • (2012) TrustCom 2012 , pp. 153-162
    • Fahl, S.1    Harbach, M.2    Muders, T.3    Smith, M.4
  • 18
    • 84865031605 scopus 로고    scopus 로고
    • Helping johnny 2.0 to encrypt his facebook conversations
    • Fahl, S., Harbach, M., Muders, T., Smith, M., Sander, U.: Helping johnny 2.0 to encrypt his facebook conversations. In: SOUPS 2012, pp. 11–28 (2012)
    • (2012) SOUPS 2012 , pp. 11-28
    • Fahl, S.1    Harbach, M.2    Muders, T.3    Smith, M.4    Sander, U.5
  • 19
    • 84873963079 scopus 로고    scopus 로고
    • Secret handshakes with dynamic and fuzzy matching
    • Ateniese, G., Blanton, M., Kirsch, J.: Secret handshakes with dynamic and fuzzy matching. In: NDSS ’07 (2007)
    • (2007) NDSS ’07
    • Ateniese, G.1    Blanton, M.2    Kirsch, J.3
  • 20
    • 0018545449 scopus 로고
    • How to share a secret. Commun
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
    • (1979) ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for finegrained access control of encrypted data
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: ACM CCS ’06, pp. 89–98 (2006)
    • (2006) ACM CCS ’06 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 22
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable twoparty and multi-party secure computation
    • Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable twoparty and multi-party secure computation. In: STOC ’02 (2002)
    • (2002) STOC ’02
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 23
    • 33750024803 scopus 로고    scopus 로고
    • Balancing accountability and privacy using e-cash (extended abstract)
    • In: De Prisco, R., Yung, M. (eds.), Springer, Heidelberg
    • Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Balancing accountability and privacy using e-cash (extended abstract). In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 141–155. Springer, Heidelberg (2006)
    • (2006) SCN 2006. LNCS , vol.4116 , pp. 141-155
    • Camenisch, J.L.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 24
    • 67651053584 scopus 로고    scopus 로고
    • Pseudonym systems (extended abstract)
    • In: Heys, H.M., Adams, C.M. (eds.), Springer, Heidelberg
    • Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (extended abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)
    • (2000) SAC 1999. LNCS , vol.1758 , pp. 184-199
    • Lysyanskaya, A.1    Rivest, R.L.2    Sahai, A.3    Wolf, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.