메뉴 건너뛰기




Volumn 24, Issue , 2015, Pages 129-137

Secure multi-server-aided data deduplication in cloud computing

Author keywords

Brute force attack; Data deduplication; Server aided; Verifiable secret sharing

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; NETWORK ARCHITECTURE; NETWORK SECURITY; UBIQUITOUS COMPUTING; DIGITAL STORAGE;

EID: 84959860456     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2015.03.002     Document Type: Article
Times cited : (73)

References (29)
  • 2
    • 85030392017 scopus 로고    scopus 로고
    • Google Drive. http://drive.google.com.
  • 5
    • 84874684634 scopus 로고    scopus 로고
    • Data Deduplication. http://en.wikipedia.org/wiki/Data-deduplication.
    • Data Deduplication
  • 12
    • 84874458079 scopus 로고    scopus 로고
    • Fast and secure laptop backups with encrypted de-duplication
    • P. Anderson, L. Zhang, Fast and secure laptop backups with encrypted de-duplication, in: Proceedings of USENIX LISA, 2010, pp. 1-8.
    • (2010) Proceedings of USENIX LISA , pp. 1-8
    • Anderson, P.1    Zhang, L.2
  • 13
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • J. Li, X. Chen, M. Li, J. Li, P. Lee, W. Lou, Secure deduplication with efficient and reliable convergent key management, IEEE Trans. Parallel Distrib. Syst. 25 (6) (2014) 1615-1625.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.5    Lou, W.6
  • 14
    • 84927584035 scopus 로고    scopus 로고
    • A hybrid cloud approach for secure authorized deduplication
    • PrePrints
    • J. Li, Y. Li, X. Chen, P. Lee, W. Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Trans. Parallel Distrib. Syst., no. 1, p. 1, PrePrints. http://dx.doi.org/10.1109/TPDS.2014.2318320.
    • IEEE Trans. Parallel Distrib. Syst. , Issue.1 , pp. 1
    • Li, J.1    Li, Y.2    Chen, X.3    Lee, P.4    Lou, W.5
  • 15
    • 84897568312 scopus 로고    scopus 로고
    • Read-performance optimization for deduplication-based storage systems in the cloud
    • B. Mao, H. Jiang, S. Wu, Y. Fu, L. Tian, Read-performance optimization for deduplication-based storage systems in the cloud, ACM Trans. Storage 10 (2) (2014) 1-22.
    • (2014) ACM Trans. Storage , vol.10 , Issue.2 , pp. 1-22
    • Mao, B.1    Jiang, H.2    Wu, S.3    Fu, Y.4    Tian, L.5
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun. ACM 22 (1979) 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 24
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • LNCS Springer-Verlag
    • T.P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, in: Proceedings of Advances in Cryptology, CRYPTO'91, in: LNCS, Vol. 576, Springer-Verlag, 1992, pp. 129-140.
    • (1992) Proceedings of Advances in Cryptology, CRYPTO'91 , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 28
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services, the case of deduplication in cloud storage
    • special issue of Cloud Security
    • D. Harnik, B. Pinkas, A. Shulman-Peleg, Side channels in cloud services, the case of deduplication in cloud storage, IEEE Secur. Privacy Mag. 8 (6) (2010) 40-47. special issue of Cloud Security.
    • (2010) IEEE Secur. Privacy Mag. , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.