-
1
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
D. Harnik, B. Pinkas and A. Shulman-Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage", IEEE Secur. Priv., vol. 8, no. 6, pp. 40-47, 2010.
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
2
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
New York, NY, USA
-
S. Halevi, D. Harnik, B. Pinkas and A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems", in Proceedings of the 18th ACM conference on Computer and communications security, New York, NY, USA, 2011, pp. 491-500.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
3
-
-
84857732276
-
A study of practical deduplication
-
D. T. Meyer and W. J. Bolosky, "A Study of Practical Deduplication", Trans Storage, vol. 7, no. 4, pp. 14: 1-14: 20, 2012.
-
(2012)
Trans Storage
, vol.7
, Issue.4
, pp. 141-1420
-
-
Meyer, D.T.1
Bolosky, W.J.2
-
4
-
-
33846663173
-
Improving duplicate elimination in storage systems
-
D. R. Bobbarjung, S. Jagannathan and C. Dubnicki, "Improving Duplicate Elimination in Storage Systems", Trans Storage, vol. 2, no. 4, pp. 424-448, 2006.
-
(2006)
Trans Storage
, vol.2
, Issue.4
, pp. 424-448
-
-
Bobbarjung, D.R.1
Jagannathan, S.2
Dubnicki, C.3
-
5
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
New York, NY, USA
-
R. Di Pietro and A. Sorniotti, "Boosting Efficiency and Security in Proof of Ownership for Deduplication", in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, 2012, pp. 81-82.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
, pp. 81-82
-
-
Di Pietro, R.1
Sorniotti, A.2
-
6
-
-
84921516429
-
Provable ownership of files in deduplication cloud storage
-
C. Yang, J. Ren and J. Ma, "Provable ownership of files in deduplication cloud storage", Secur. Commun. Netw., 2013.
-
(2013)
Secur. Commun. Netw
-
-
Yang, C.1
Ren, J.2
Ma, J.3
-
7
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
New York, NY, USA
-
J. Xu, E.-C. Chang and J. Zhou, "Weak Leakage-resilient Client-side Deduplication of Encrypted Data in Cloud Storage", in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, New York, NY, USA, 2013, pp. 195-206.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 195-206
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
-
8
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system", in 22nd International Conference on Distributed Computing Systems, 2002. Proceedings, 2002, pp. 617-624.
-
(2002)
22nd International Conference on Distributed Computing Systems, 2002. Proceedings
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, P.4
Theimer, M.5
-
9
-
-
84902475228
-
Remote integrity checking
-
S. Jajodia and L. Strous, Springer US
-
Y. Deswarte, J.-J. Quisquater and A. Saïdane, "Remote Integrity Checking", in Integrity and Internal Control in Information Systems VI, S. Jajodia and L. Strous, Springer US, 2004, pp. 1-11.
-
(2004)
Integrity and Internal Control in Information Systems VI
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.-J.2
Saïdane, A.3
-
10
-
-
74049102823
-
Provable data possession at untrusted stores
-
New York, NY, USA
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable Data Possession at Untrusted Stores", in Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, USA, 2007, pp. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
11
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
New York, NY, USA
-
A. Juels and B. S. Kaliski,Jr., "PORs: Proofs of Retrievability for Large Files", in Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, USA, 2007, pp. 584-597.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
12
-
-
58349118819
-
Compact proofs of retrievability
-
J. Pieprzyk, Springer Berlin Heidelberg
-
H. Shacham and B. Waters, "Compact Proofs of Retrievability", in Advances in Cryptology-ASIACRYPT 2008, J. Pieprzyk, Springer Berlin Heidelberg, 2008, pp. 90-107.
-
(2008)
Advances in Cryptology-ASIACRYPT 2008
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
13
-
-
57049134700
-
Remote integrity check with dishonest storage server
-
S. Jajodia and J. Lopez, Springer Berlin Heidelberg
-
E.-C. Chang and J. Xu, "Remote Integrity Check with Dishonest Storage Server", in Computer Security-ESORICS 2008, S. Jajodia and J. Lopez, Springer Berlin Heidelberg, 2008, pp. 223-237.
-
(2008)
Computer Security-ESORICS 2008
, pp. 223-237
-
-
Chang, E.-C.1
Xu, J.2
-
14
-
-
70249129465
-
Scalable and efficient provable data possession
-
New York, NY, USA
-
G. Ateniese, R. Di Pietro, L. V. Mancini and G. Tsudik, "Scalable and Efficient Provable Data Possession", in Proceedings of the 4th international conference on Security and privacy in communication netowrks, New York, NY, USA, 2008, pp. 9: 1-9: 10.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks
, pp. 91-910
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
15
-
-
51849117195
-
MR-pdp: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession", in The 28th International Conference on Distributed Computing Systems, 2008. ICDCS '08, 2008, pp. 411-420.
-
(2008)
The 28th International Conference on Distributed Computing Systems, 2008. ICDCS '08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
16
-
-
74049144464
-
HAIL: A high-Availability and integrity layer for cloud storage
-
New York, NY, USA
-
K. D. Bowers, A. Juels and A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage", in Proceedings of the 16th ACM conference on Computer and communications security, New York, NY, USA, 2009, pp. 187-198.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
17
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
Y. Zhu, H. Hu, G.-J. Ahn and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage", IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231-2244, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yu, M.4
-
18
-
-
74049121230
-
Dynamic provable data possession
-
New York, NY, USA
-
C. Erway, A. Küp\textbackslashccü, C. Papamanthou and R. Tamassia, "Dynamic Provable Data Possession", in Proceedings of the 16th ACM conference on Computer and communications security, New York, NY, USA, 2009, pp. 213-222.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küptextbackslashccü, A.2
Papamanthou, C.3
Tamassia, R.4
-
19
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
M. Backes and P. Ning, Springer Berlin Heidelberg
-
Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", in Computer Security-ESORICS 2009, M. Backes and P. Ning, Springer Berlin Heidelberg, 2009, pp. 355-370.
-
(2009)
Computer Security-ESORICS 2009
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
20
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
21
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing", in 2010 Proceedings IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
2010 Proceedings IEEE INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
22
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson and D. Song, "Remote Data Checking Using Provable Data Possession", ACM Trans Inf Syst Secur, vol. 14, no. 1, pp. 12: 1-12: 34, 2011.
-
(2011)
ACM Trans Inf Syst Secur
, vol.14
, Issue.1
, pp. 121-1234
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
23
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
New York, NY, USA
-
J. Yuan and S. Yu, "Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud", in Proceedings of the 2013 international workshop on Security in cloud computing, New York, NY, USA, 2013, pp. 19-26.
-
(2013)
Proceedings of the 2013 International Workshop on Security in Cloud Computing
, pp. 19-26
-
-
Yuan, J.1
Yu, S.2
-
24
-
-
84858201794
-
Secure and efficient proof of storage with deduplication
-
New York, NY, USA
-
Q. Zheng and S. Xu, "Secure and Efficient Proof of Storage with Deduplication", in Proceedings of the second ACM conference on Data and Application Security and Privacy, New York, NY, USA, 2012, pp. 1-12
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy
, pp. 1-12
-
-
Zheng, Q.1
Xu, S.2
|