메뉴 건너뛰기




Volumn 35, Issue 3, 2015, Pages 379-386

Payment-based incentive mechanism for secure cloud deduplication

Author keywords

Cloud storage; Convergent encryption; Incentive mechanism; Secure data deduplication

Indexed keywords

CRYPTOGRAPHY; DIGITAL STORAGE; DISTRIBUTED DATABASE SYSTEMS;

EID: 84939982695     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2014.12.006     Document Type: Article
Times cited : (12)

References (47)
  • 3
    • 84874458079 scopus 로고    scopus 로고
    • Fast and secure laptop backups with encrypted de-duplication
    • DC, USA
    • P. Anderson, and L. Zhang Fast and secure laptop backups with encrypted de-duplication Proc. USENIX LISA DC, USA 2010 1 8
    • (2010) Proc. USENIX LISA , pp. 1-8
    • Anderson, P.1    Zhang, L.2
  • 4
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard - An economic perspective
    • New Orleans, Louisiana, USA
    • R. Anderson Why information security is hard - An economic perspective 17th Annual Computer Security Applications Conference New Orleans, Louisiana, USA 2001 358 365
    • (2001) 17th Annual Computer Security Applications Conference , pp. 358-365
    • Anderson, R.1
  • 9
    • 51849127804 scopus 로고    scopus 로고
    • Deterministic encryption: Definitional equivalences and constructions without random oracles
    • CA, USA
    • M. Bellare, M. Fischlin, A. O'Neill, and T. Ristenpart Deterministic encryption: Definitional equivalences and constructions without random oracles Advances in cryptology - CRYPTO CA, USA 2008 360 378
    • (2008) Advances in cryptology - CRYPTO , pp. 360-378
    • Bellare, M.1    Fischlin, M.2    O'Neill, A.3    Ristenpart, T.4
  • 10
    • 85052022812 scopus 로고    scopus 로고
    • DupLESS: Server-aided encryption for deduplicated storage
    • DC, USA
    • M. Bellare, S. Keelveedhi, and T. Ristenpart DupLESS: Server-aided encryption for deduplicated storage USENIX security DC, USA 2013 179 194
    • (2013) USENIX security , pp. 179-194
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3
  • 14
    • 51849114183 scopus 로고    scopus 로고
    • On notions of security for deterministic encryption, and efficient constructions without random oracles
    • CA, USA
    • A. Boldyreva, S. Fehr, and A. O'Neill On notions of security for deterministic encryption, and efficient constructions without random oracles Advances in cryptology - CRYPTO CA, USA 2008 335 359
    • (2008) Advances in cryptology - CRYPTO , pp. 335-359
    • Boldyreva, A.1    Fehr, S.2    O'Neill, A.3
  • 16
  • 17
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • CA, USA
    • Y. Dodis, S. Vadhan, and D. Wichs Proofs of retrievability via hardness amplification Proc. of TCC CA, USA 2009 109 127
    • (2009) Proc. of TCC , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 23
    • 84939960896 scopus 로고    scopus 로고
    • GoogleDriven
    • GoogleDriven, http://drive.google.com/.
  • 26
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: Deduplication in cloud storage
    • CA, USA
    • D. Harnik, B. Pinkas, and A.S. Peleg Side channels in cloud services: Deduplication in cloud storage Proc. of IEEE security & privacy CA, USA 2010 40 47
    • (2010) Proc. of IEEE security & privacy , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Peleg, A.S.3
  • 27
    • 74049103479 scopus 로고    scopus 로고
    • PORS: Proofs of retrievability for large files
    • VA, USA
    • A. Juels, and B.S. Kaliski PORS: Proofs of retrievability for large files Proc. of ACM CCS VA, USA 2007 584 597
    • (2007) Proc. of ACM CCS , pp. 584-597
    • Juels, A.1    Kaliski, B.S.2
  • 29
    • 84901032811 scopus 로고    scopus 로고
    • A study of practical deduplication, secure deduplication with efficient and reliable convergent key management
    • J. Li, X. Chen, M. Li, J. Li, P.P.C. Lee, and W. Lou A study of practical deduplication, secure deduplication with efficient and reliable convergent key management IEEE Transactions on Parallel and Distributed Systems 25 6 2013 1615 1625
    • (2013) IEEE Transactions on Parallel and Distributed Systems , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.P.C.5    Lou, W.6
  • 36
    • 78650028086 scopus 로고    scopus 로고
    • Will outsourcing IT security lead to a higher social level of security?
    • Pittsburgh, PA, USA
    • B. Rowe Will outsourcing IT security lead to a higher social level of security? 6th Annual Workshop on the Economics of Information Security Pittsburgh, PA, USA 2007
    • (2007) 6th Annual Workshop on the Economics of Information Security
    • Rowe, B.1
  • 38
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Communications of the ACM 22 11 1979 612 613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 40
    • 84888986259 scopus 로고    scopus 로고
    • Practical dynamic proofs of retrievability
    • Berlin, Germany
    • E. Shi, E. Stefanov, and C. Papamanthou Practical dynamic proofs of retrievability Proc. of ACM CCS Berlin, Germany 2013 325 336
    • (2013) Proc. of ACM CCS , pp. 325-336
    • Shi, E.1    Stefanov, E.2    Papamanthou, C.3
  • 42
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • H. Varian System reliability and free riding Economics of Information Security 12 1 2004 1 15
    • (2004) Economics of Information Security , vol.12 , Issue.1 , pp. 1-15
    • Varian, H.1
  • 43
    • 70350389843 scopus 로고    scopus 로고
    • Dynamic provable data possession enabling public verifiability and data dynamics for storage security in cloud computing
    • Saint Malo, France
    • Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou Dynamic provable data possession enabling public verifiability and data dynamics for storage security in cloud computing Proc. of ESORICS'09 Saint Malo, France 2009 355 370
    • (2009) Proc. of ESORICS'09 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 46
    • 84893549172 scopus 로고    scopus 로고
    • Secure and constant cost public cloud storage auditing with deduplication
    • DC, USA
    • J. Yuan, and S. Yu Secure and constant cost public cloud storage auditing with deduplication IEEE conference on communications and network security DC, USA 2013 145 153
    • (2013) IEEE conference on communications and network security , pp. 145-153
    • Yuan, J.1    Yu, S.2
  • 47
    • 84870958312 scopus 로고    scopus 로고
    • Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling
    • Arizona, USA
    • X. Zhao, L. Xue, and A. Whinston, Managing interdependent information security risks: A study of cyberinsurance, managed security service and risk pooling Proceedings of ICIS Arizona, USA 2009 15 18
    • (2009) Proceedings of ICIS , pp. 15-18
    • Zhao, X.1    Xue, L.2    Whinston, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.