-
2
-
-
85077032135
-
A study of practical deduplication
-
San Jose, CA, USA: USENIX Association, February
-
D. Meyer and W. Bolosky, "A study of practical deduplication, " in Proceedings of the USENIX Conference on File and Storage Technologies. San Jose, CA, USA: USENIX Association, February 2011, pp. 229-241.
-
(2011)
Proceedings of the USENIX Conference on File and Storage Technologies
, pp. 229-241
-
-
Meyer, D.1
Bolosky, W.2
-
3
-
-
85077122692
-
Characteristics of backup workloads in production systems
-
San Jose, CA: USENIX Association, February
-
G. Wallace, F. Douglis, H. Qian, and et al, "Characteristics of backup workloads in production systems, " in Proceedings of the Tenth USENIX Conference on File and Storage Technologies (FAST'12). San Jose, CA: USENIX Association, February 2012, pp. 1-14.
-
(2012)
Proceedings of the Tenth USENIX Conference on File and Storage Technologies (FAST'12)
, pp. 1-14
-
-
Wallace, G.1
Douglis, F.2
Qian, H.3
-
4
-
-
84880721674
-
Primary data deduplication-large scale study and system design
-
Boston, MA, USA: USENIX Association, June
-
A. El-Shimi, R. Kalach, A. Kumar, and et al, "Primary data deduplication-large scale study and system design, " in Proceedings of the 2012 conference on USENIX Annual Technical Conference. Boston, MA, USA: USENIX Association, June 2012, pp. 1-12.
-
(2012)
Proceedings of the 2012 Conference on USENIX Annual Technical Conference
, pp. 1-12
-
-
El-Shimi, A.1
Kalach, R.2
Kumar, A.3
-
5
-
-
84952005535
-
-
"Dropbox, " http://www.dropbox.com/, 2015.
-
(2015)
Dropbox
-
-
-
6
-
-
84951972766
-
-
"Spideroak, " https://www.spideroak.com/, 2015.
-
(2015)
Spideroak
-
-
-
7
-
-
84951939846
-
-
"Mozy, " http://www.mozy.com/, 2015.
-
(2015)
Mozy
-
-
-
8
-
-
85084160673
-
Venti: A new approach to archival storage
-
CA, USA: USENIX Association, January
-
S. Quinlan and S. Dorward, "Venti: A new approach to archival storage." in Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02). erkeley, CA, USA: USENIX Association, January 2002, pp. 89-101.
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02). Erkeley
, pp. 89-101
-
-
Quinlan, S.1
Dorward, S.2
-
9
-
-
85052022812
-
Dupless: Serveraided encryption for deduplicated storage
-
Washington, DC, USA: USENIX Association, August
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Dupless: serveraided encryption for deduplicated storage, " in Proceedings of the 22nd USENIX Security Symposium. Washington, DC, USA: USENIX Association, August 2013, pp. 1-16.
-
(2013)
Proceedings of the 22nd USENIX Security Symposium
, pp. 1-16
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
10
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
Vienna, Austria: IEEE Computer Society Press, July
-
J. R. Douceur, A. Adya, W. J. Bolosky, and et al, "Reclaiming space from duplicate files in a serverless distributed file system, " in Proceedings of the 22nd International Conference on Distributed Computing Systems. Vienna, Austria: IEEE Computer Society Press, July 2002, pp. 617-624.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
-
11
-
-
4243054954
-
Number-theoretic constructions of efficient pseudo-random functions
-
M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions, " Journal of the ACM (JACM), vol. 51, no. 2, pp. 231-262, 2004.
-
(2004)
Journal of the ACM (JACM)
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
12
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
J. Li, X. Chen, M. Li, J. Li, P. P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management, " Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 6, pp. 1615-1625, 2014.
-
(2014)
Parallel and Distributed Systems IEEE Transactions on
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.5
Lou, W.6
-
13
-
-
84899741794
-
Cloudedup: Secure deduplication with encrypted data for cloud storage
-
Bristol, UK: IEEE Computer Society Press, December
-
P. Puzio, R. Molva, M. Onen, and S. Loureiro, "Cloudedup: secure deduplication with encrypted data for cloud storage, " in Proceedings of the 5th International Conference on Cloud Computing Technology and Science. Bristol, UK: IEEE Computer Society Press, December 2013, pp. 363-370.
-
(2013)
Proceedings of the 5th International Conference on Cloud Computing Technology and Science
, pp. 363-370
-
-
Puzio, P.1
Molva, R.2
Onen, M.3
Loureiro, S.4
-
15
-
-
0032666753
-
Multiple ramp schemes
-
July
-
A. De Santis and B. Masucci, "Multiple ramp schemes, " Information Theory, IEEE Transactions on, vol. 45, no. 5, pp. 1720-1728, July 1999.
-
(1999)
Information Theory IEEE Transactions on
, vol.45
, Issue.5
, pp. 1720-1728
-
-
De Santis, A.1
Masucci, B.2
-
16
-
-
84978437474
-
Pastiche: Making backup cheap and easy
-
L. P. Cox, C. D. Murray, and B. D. Noble, "Pastiche: Making backup cheap and easy, " ACM SIGOPS Operating Systems Review, vol. 36, no. SI, pp. 285-298, 2002.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 285-298
-
-
Cox, L.P.1
Murray, C.D.2
Noble, B.D.3
-
17
-
-
67650346359
-
Tahoe: The least-authority filesystem
-
Alexandria, VA, USA: ACM Association, October
-
Z. Wilcox-O'Hearn and B. Warner, "Tahoe: the least-authority filesystem, " in Proceedings of the 4th ACM international workshop on Storage security and survivability. Alexandria, VA, USA: ACM Association, October 2008, pp. 21-26.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 21-26
-
-
Wilcox-O'Hearn, Z.1
Warner, B.2
-
18
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
Athens: Springer, May
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication, " in Proceedings of Advances in Cryptology-EUROCRYPT 2013. Athens: Springer, May 2013, pp. 296-312.
-
(2013)
Proceedings of Advances in Cryptology-EUROCRYPT 2013
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret, " Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
70349237760
-
Secure data deduplication
-
Alexandria, Virginia, USA: ACM Association, October
-
M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, "Secure data deduplication, " in Proceedings of the 4th ACM international workshop on Storage Security and Survivability. Alexandria, Virginia, USA: ACM Association, October 2008, pp. 1-10.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
21
-
-
78649596156
-
SAM: A semantic-aware multi-tiered source de-duplication framework for cloud backup
-
San Diego, CA, USA: IEEE Computer Society Press, September
-
Y. Tan, H. Jiang, D. Feng, and et al, "SAM: A Semantic-Aware Multi-Tiered Source De-duplication Framework for Cloud Backup, " in Proceedings of the 39th International Conference on Parallel Processing (ICPP'10). San Diego, CA, USA: IEEE Computer Society Press, September 2010, pp. 614-623.
-
(2010)
Proceedings of the 39th International Conference on Parallel Processing (ICPP'10)
, pp. 614-623
-
-
Tan, Y.1
Jiang, H.2
Feng, D.3
-
22
-
-
84952064925
-
-
Openssl project
-
"Openssl project, " https://www.openssl.org/, 2015.
-
(2015)
-
-
-
23
-
-
38049132285
-
Simulatable adaptive oblivious transfer
-
Santa Barbara, CA, USA: Springer, August
-
J. Camenisch, G. Neven et al., "Simulatable adaptive oblivious transfer, " in Proceedings of the 27th Advances in Cryptology-EUROCRYPT. Santa Barbara, CA, USA: Springer, August 2007, pp. 573-590.
-
(2007)
Proceedings of the 27th Advances in Cryptology-EUROCRYPT
, pp. 573-590
-
-
Camenisch, J.1
Neven, G.2
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
0003676885
-
-
Center for Research in Computing Techn., Aiken Computation Laboratory, Univ.
-
M. O. Rabin, Fingerprinting by random polynomials. Center for Research in Computing Techn., Aiken Computation Laboratory, Univ., 1981.
-
(1981)
Fingerprinting by Random Polynomials
-
-
Rabin, M.O.1
-
27
-
-
85084163110
-
Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds
-
hiladelphia, PA, USA: USENIX Association, June
-
M. Li, C. Qin, P. P. Lee, and J. Li, "Convergent dispersal: toward storage-efficient security in a cloud-of-clouds, " in Proceedings of the 6th USENIX conference on Hot Topics in Storage and File Systems (HotStorage'14). Philadelphia, PA, USA: USENIX Association, June 2014, pp. 1-1.
-
(2014)
Proceedings of the 6th USENIX Conference on Hot Topics in Storage and File Systems (HotStorage'14).
, pp. 1-1
-
-
Li, M.1
Qin, C.2
Lee, P.P.3
Li, J.4
-
28
-
-
85066881368
-
Avoiding the disk bottleneck in the data domain deduplication file system
-
San Jose, CA, USA: USENIX Association, February
-
B. Zhu, K. Li, and R. H. Patterson, "Avoiding the disk bottleneck in the data domain deduplication file system." in Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST'08). San Jose, CA, USA: USENIX Association, February 2008, pp. 1-14.
-
(2008)
Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST'08)
, pp. 1-14
-
-
Zhu, B.1
Li, K.2
Patterson, R.H.3
-
29
-
-
84925068051
-
Similarity and locality based indexing for high performance data deduplication
-
W. Xia, H. Jiang, D. Feng, and Y. Hua, "Similarity and locality based indexing for high performance data deduplication, " IEEE Transactions on Computers, 2015, vol. 64, no. 4, pp. 1162-1176, 2015.
-
(2015)
IEEE Transactions on Computers 2015
, vol.64
, Issue.4
, pp. 1162-1176
-
-
Xia, W.1
Jiang, H.2
Feng, D.3
Hua, Y.4
-
30
-
-
84920191892
-
Concurrent deletion in a distributed content-addressable storage system with global deduplication
-
San Jose, CA, USA: USENIX Association, February
-
P. Strzelczak, E. Adamczyk, U. Herman-Izycka, J. Sakowicz, L. Slusarczyk, J. Wrona, and C. Dubnicki, "Concurrent deletion in a distributed content-addressable storage system with global deduplication." in Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST'13). San Jose, CA, USA: USENIX Association, February 2013, pp. 161-174.
-
(2013)
Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST'13)
, pp. 161-174
-
-
Strzelczak, P.1
Adamczyk, E.2
Herman-Izycka, U.3
Sakowicz, J.4
Slusarczyk, L.5
Wrona, J.6
Dubnicki, C.7
-
31
-
-
85077436231
-
Accelerating restore and garbage collection in deduplication-based backup systems via exploiting historical information
-
Philadelphia, PA, USA: USENIX Association, June
-
M. Fu, D. Feng, Y. Hua, X. He, Z. Chen, W. Xia, F. Huang, and Q. Liu, "Accelerating restore and garbage collection in deduplication-based backup systems via exploiting historical information, " in Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC'14). Philadelphia, PA, USA: USENIX Association, June 2014, pp. 181-192.
-
(2014)
Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC'14)
, pp. 181-192
-
-
Fu, M.1
Feng, D.2
Hua, Y.3
He, X.4
Chen, Z.5
Xia, W.6
Huang, F.7
Liu, Q.8
-
32
-
-
85077057432
-
Silo: A similaritylocality based near-exact deduplication scheme with low ram overhead and high throughput
-
Portland, OR, USA: USENIX Association, June
-
W. Xia, H. Jiang, D. Feng, and Y. Hua, "Silo: a similaritylocality based near-exact deduplication scheme with low ram overhead and high throughput, " in Proceedings of the 2011 USENIX conference on USENIX annual technical conference. Portland, OR, USA: USENIX Association, June 2011, pp. 285-298.
-
(2011)
Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference
, pp. 285-298
-
-
Xia, W.1
Jiang, H.2
Feng, D.3
Hua, Y.4
-
33
-
-
78349261217
-
Peerdedupe: Insights into the peer-assisted sampling deduplication
-
elft, Netherlands: IEEE Computer Society Press, August
-
Y. Xing, Z. Li, and Y. Dai, "Peerdedupe: Insights into the peer-assisted sampling deduplication, " in Proceedings of the 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P). Delft, Netherlands: IEEE Computer Society Press, August 2010, pp. 1-10.
-
(2010)
Proceedings of the 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
, pp. 1-10
-
-
Xing, Y.1
Li, Z.2
Dai, Y.3
-
34
-
-
85077129387
-
Generating realistic datasets for deduplication analysis
-
Boston, MA, USA: USENIX Association, June
-
V. Tarasov, A. Mudrankit, W. Buik, P. Shilane, G. Kuenning, and E. Zadok, "Generating realistic datasets for deduplication analysis." in Proceedings of the 2012 USENIX Annual Technical Conference (ATC'12). Boston, MA, USA: USENIX Association, June 2012, pp. 261-272.
-
(2012)
Proceedings of the 2012 USENIX Annual Technical Conference (ATC'12)
, pp. 261-272
-
-
Tarasov, V.1
Mudrankit, A.2
Buik, W.3
Shilane, P.4
Kuenning, G.5
Zadok, E.6
-
36
-
-
84870815282
-
Alternatives for detecting redundancy in storage systems data
-
Boston, MA, USA: USENIX Association, June
-
C. Policroniades and I. Pratt, "Alternatives for detecting redundancy in storage systems data." in Proceedings of the 2004 USENIX Annual Technical Conference (ATC'04). Boston, MA, USA: USENIX Association, June 2004, pp. 73-86.
-
(2004)
Proceedings of the 2004 USENIX Annual Technical Conference (ATC'04)
, pp. 73-86
-
-
Policroniades, C.1
Pratt, I.2
-
37
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
San Francisco, CA, USA: USENIX Association, August
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, "Dark clouds on the horizon: Using cloud storage as attack vector and online slack space." in Proceedings of the 20th USENIX Security Symposium. San Francisco, CA, USA: USENIX Association, August 2011, pp. 1-11.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
, pp. 1-11
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
38
-
-
84922456743
-
-
Technical Report, Tech. Rep.
-
J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage, " Technical Report, Tech. Rep., 2013.
-
(2013)
A Secure Data Deduplication Scheme for Cloud Storage
-
-
Stanek, J.1
Sorniotti, A.2
Androulaki, E.3
Kencl, L.4
-
39
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
Chicago, Illinois, USA: ACM Association, October
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems, " in Proceedings of the 18th ACM conference on Computer and communications security (CCS'11). Chicago, Illinois, USA: ACM Association, October 2011, pp. 491-500.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
40
-
-
84877968673
-
Weak leakage-resilient clientside deduplication of encrypted data in cloud storage
-
Hangzhou, China: ACM Association, May
-
J. Xu, E.-C. Chang, and J. Zhou, "Weak leakage-resilient clientside deduplication of encrypted data in cloud storage, " in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. Hangzhou, China: ACM Association, May 2013, pp. 195-206.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 195-206
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
-
41
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
Seoul, Republic of Korea: ACM Association, May
-
R. Di Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication, " in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. Seoul, Republic of Korea: ACM Association, May 2012, pp. 81-82.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
, pp. 81-82
-
-
Di Pietro, R.1
Sorniotti, A.2
-
42
-
-
84863584951
-
Private data deduplication protocols in cloud storage
-
Riva del Garda (Trento), Italy: ACM Association, March
-
W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in cloud storage, " in Proceedings of the 27th Annual ACM Symposium on Applied Computing. Riva del Garda (Trento), Italy: ACM Association, March 2012, pp. 441-446.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing
, pp. 441-446
-
-
Ng, W.K.1
Wen, Y.2
Zhu, H.3
|