-
1
-
-
84884496219
-
Message-locked encryption for lock-dependent messages
-
Lecture Notes in Computer Science, Springer
-
Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, and Gil Segev. 2013. Message-locked encryption for lock-dependent messages. In Advances in Cryptology-CRYPTO 2013. Lecture Notes in Computer Science, Vol. 8042. Springer, 374-391.
-
(2013)
Advances in Cryptology-CRYPTO 2013
, vol.8042
, pp. 374-391
-
-
Abadi, M.1
Boneh, D.2
Mironov, I.3
Raghunathan, A.4
Segev, G.5
-
3
-
-
85011395133
-
-
Amazon. Retrieved December 7, from
-
Amazon. 2016a. Amazon S3. Retrieved December 7, 2016, from https://aws.amazon.com/s3.
-
(2016)
Amazon S3
-
-
-
4
-
-
85011395115
-
-
Amazon. Retrieved December 7, 2016, from
-
Amazon. 2016b. Protecting Data Using Server-Side Encryption. Retrieved December 7, 2016, from http://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html.
-
(2016)
Protecting Data Using Server-Side Encryption
-
-
-
5
-
-
74049102823
-
Provable data possession at untrusted stores
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). 598-609. DOI:http://dx.doi.org/10.1145/1315245.1315318.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
84925263946
-
Interactivemessage-locked encryption and secure deduplication
-
Lecture Notes in Computer Science, Vol. 9020. Springer
-
Mihir Bellare and Sriram Keelveedhi. 2015. Interactivemessage-locked encryption and secure deduplication. In Advances in Cryptology-EUROCRYPT 2013. Lecture Notes in Computer Science, Vol. 9020. Springer, 516-538.
-
(2015)
Advances in Cryptology-EUROCRYPT 2013
, pp. 516-538
-
-
Bellare, M.1
Keelveedhi, S.2
-
7
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
Lecture Notes in Computer Science, Vol. 7881. Springer
-
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. 2013a. Message-locked encryption and secure deduplication. In Advances in Cryptology-EUROCRYPT 2013. Lecture Notes in Computer Science, Vol. 7881. Springer, 296-312.
-
(2013)
Advances in Cryptology-EUROCRYPT 2013
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
10
-
-
85007001078
-
-
Bitcasa. Retrieved December 7, 2016, from
-
Bitcasa. 2016. Home Page. Retrieved December 7, 2016, from https://www.bitcasa.com.
-
(2016)
Home Page
-
-
-
11
-
-
84961369151
-
Security of ramp schemes
-
Lecture Notes in Computer Science
-
G. R. Blakley and C. Meadows. 1985. Security of ramp schemes. In Advances in Cryptology-CRYPTO 1984. Lecture Notes in Computer Science, Vol. 196. 242-268. DOI:http://dx.doi.org/10.1007/3-540-39568-7-20.
-
(1985)
Advances in Cryptology-CRYPTO 1984
, vol.196
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
13
-
-
33846663173
-
Improving duplicate elimination in storage systems
-
Deepak R. Bobbarjung, Suresh Jagannathan, and Cezary Dubnicki. 2006. Improving duplicate elimination in storage systems. ACM Transactions on Storage 2, 4, 424-448.
-
(2006)
ACM Transactions on Storage
, vol.2
, Issue.4
, pp. 424-448
-
-
Bobbarjung, D.R.1
Jagannathan, S.2
Dubnicki, C.3
-
14
-
-
79956075292
-
Identifying and filtering near-duplicate documents
-
Lecture Notes in Computer Science, Vol. 1848. Springer
-
Andrei Z. Broder. 2000. Identifying and filtering near-duplicate documents. In Combinatorial Pattern Matching. Lecture Notes in Computer Science, Vol. 1848. Springer, 1-10. DOI: http://dx.doi.org/10.1007/3-540-45123-4-1.
-
(2000)
Combinatorial Pattern Matching
, pp. 1-10
-
-
Broder, A.Z.1
-
15
-
-
84975146878
-
-
Cisco. Available at
-
Cisco. 2015. CISCO Global Cloud Index (2012-2017). Available at http://www.cisco.com/c/en/us/solutions/service-provider/global-cloud-index-gci/index.html.
-
(2015)
CISCO Global Cloud Index (2012-2017)
-
-
-
16
-
-
85011409605
-
-
Home Page. Retrieved December 7, 2016, from
-
Cloud Berry. 2016. Home Page. Retrieved December 7, 2016, from http://www.cloudberrylab.com.
-
(2016)
Cloud Berry
-
-
-
17
-
-
84990895562
-
-
Cloud Flare. Retrieved December 7, 2016, from
-
Cloud Flare. 2014. The Relative Cost of Bandwidth Around the World. Retrieved December 7, 2016, from https://blog.cloudflare.com/the-relative-cost-of-bandwidth-Around-The-world/.
-
(2014)
The Relative Cost of Bandwidth Around the World
-
-
-
19
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
IEEE, Los Alamitos, CA
-
John R. Douceur, Atul Adya, William J. Bolosky, Dan Simon, and Marvin Theimer. 2002. Reclaiming space from duplicate files in a serverless distributed file system. In Proceedings of the 2002 22nd International Conference on Distributed Computing Systems. IEEE, Los Alamitos, CA, 617-624.
-
(2002)
Proceedings of the 2002 22nd International Conference on Distributed Computing Systems
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
20
-
-
85011338132
-
-
Home Page. Retrieved December 7, 2016, from
-
Dropbox. 2016a. Home Page. Retrieved December 7, 2016, from http://www.dropbox.com.
-
(2016)
Dropbox
-
-
-
21
-
-
85011394600
-
-
Dropbox. Retrieved December 7, 2016, from
-
Dropbox. 2016b. Dropbox Business Security: A Dropbox Whitepaper. Retrieved December 7, 2016, from https://www.dropbox.com/static/business/resources/Security-Whitepaper.pdf.
-
(2016)
Dropbox Business Security: A Dropbox Whitepaper
-
-
-
23
-
-
85011395077
-
-
Home Page. Retrieved December 7, 2016, from
-
Duplicati. 2016. Home Page. Retrieved December 7, 2016, from http://www.duplicati.com.
-
(2016)
Duplicati
-
-
-
24
-
-
70349305273
-
Differential privacy: A survey of results
-
Lecture Notes in Computer Science, Vol. 4978. Springer
-
Cynthia Dwork. 2008. Differential privacy: A survey of results. In Theory and Applications of Models of Computation. Lecture Notes in Computer Science, Vol. 4978. Springer, 1-19. DOI:http://dx.doi.org/10.1007/978-3-540-79228-4-1.
-
(2008)
Theory and Applications of Models of Computation
, pp. 1-19
-
-
Dwork, C.1
-
25
-
-
33745532541
-
Intrusion-resilience via the bounded-storage model
-
Lecture Notes in Computer Science, Vol. 3876. Springer
-
Stefan Dziembowski. 2006. Intrusion-resilience via the bounded-storage model. In Theory of Cryptography-TCC 2006. Lecture Notes in Computer Science, Vol. 3876. Springer, 207-224. DOI:http://dx.doi.org/10.1007/11681878-11.
-
(2006)
Theory of Cryptography-TCC 2006
, pp. 207-224
-
-
Dziembowski, S.1
-
26
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Taher Elgamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 4, 469-472. DOI:http://dx.doi.org/10.1109/TIT.1985.1057074.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
27
-
-
84869487159
-
Why Eve and mallory love android: An analysis of android SSL (in)security
-
Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Lars Baumgartner, and Bernd Freisleben. 2012. Why Eve and Mallory love Android: An analysis of Android SSL (In)Security. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12). 50-61.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12)
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Baumgartner, L.5
Freisleben, B.6
-
28
-
-
85011386070
-
-
Fingolfin. Retrieved December 7, 2016, from
-
Fingolfin. 2016. SSH Implementation Comparison. Retrieved December 7, 2016, from http://sshcomparison.quendi.de/.
-
(2016)
SSH Implementation Comparison
-
-
-
29
-
-
85077062946
-
Design tradeoffs for data deduplication performance in backup workloads
-
Min Fu, Dan Feng, Yu Hua, Xubin He, Zuoning Chen, Wen Xia, Yucheng Zhang, and Yujuan Tan. 2015. Design tradeoffs for data deduplication performance in backup workloads. In Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST'15). 331-344.
-
(2015)
Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST'15)
, pp. 331-344
-
-
Fu, M.1
Feng, D.2
Hua, Y.3
He, X.4
Chen, Z.5
Xia, W.6
Zhang, Y.7
Tan, Y.8
-
31
-
-
85009103252
-
-
Home Page. Retrieved December 7, 2016, from
-
Google Drive. 2016. Home Page. Retrieved December 7, 2016, from https://www.google.com/drive/.
-
(2016)
Google Drive
-
-
-
33
-
-
84866168915
-
Estimation of deduplication ratios in large data sets
-
Danny Harnik, Oded Margalit, Dalit Naor, Dmitry Sotnikov, and Gil Vernik. 2012. Estimation of deduplication ratios in large data sets. In Proceedings of the 2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST'12). 1-11.
-
(2012)
Proceedings of the 2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST'12)
, pp. 1-11
-
-
Harnik, D.1
Margalit, O.2
Naor, D.3
Sotnikov, D.4
Vernik, G.5
-
34
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg. 2010. Side channels in cloud services: Deduplication in cloud storage. IEEE Security and Privacy Magazine 8, 6, 40-47.
-
(2010)
IEEE Security and Privacy Magazine
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
35
-
-
84863892951
-
Improving the resistance to side-channel attacks on cloud storage services
-
O. Heen, C. Neumann, L. Montalvo, and S. Defrance. 2012. Improving the resistance to side-channel attacks on cloud storage services. In Proceedings of the 2012 5th International Conference on New Technologies, Mobility, and Security (NTMS'12). 1-5.
-
(2012)
Proceedings of the 2012 5th International Conference on New Technologies, Mobility, and Security (NTMS'12)
, pp. 1-5
-
-
Heen, O.1
Neumann, C.2
Montalvo, L.3
Defrance, S.4
-
36
-
-
78651107729
-
-
Intel. White Paper. Retrieved December 7, 2016, from
-
Intel. 2010. Breakthrough AES Performance with Intel AES New Instructions. White Paper. Retrieved December 7, 2016, from http://www.intel.it/content/dam/www/public/us/en/documents/white-papers/aesbreakthrough-performance-paper.pdf.
-
(2010)
Breakthrough AES Performance with Intel AES New Instructions
-
-
-
38
-
-
84961188517
-
-
Retrieved December 7, 2016, from
-
Christine Jost, Ha Lam, Alexander Maximov, and Ben J.M. Smeets. 2015. Encryption Performance Improvements of the Paillier Cryptosystem. Retrieved December 7, 2016, from https://eprint.iacr.org/2015/864.
-
(2015)
Encryption Performance Improvements of the Paillier Cryptosystem
-
-
Jost, C.1
Lam, H.2
Maximov, A.3
Smeets, B.J.M.4
-
44
-
-
84946905043
-
Secure distributed deduplication systems with improved reliability
-
J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. Hassan, and A. Alelaiwi. 2015. Secure distributed deduplication systems with improved reliability. IEEE Transactions on Computers 64, 12, 3569-3579. DOI:http://dx.doi.org/0.1109/TC.2015.2401017.
-
(2015)
IEEE Transactions on Computers
, vol.64
, Issue.12
, pp. 3569-3579
-
-
Li, J.1
Chen, X.2
Huang, X.3
Tang, S.4
Xiang, Y.5
Hassan, M.6
Alelaiwi, A.7
-
45
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
J. Li, X. Chen, M. Li, P. P. C. Lee, and W. Lou. 2014a. Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems 25, 6, 1615-1625.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Lee, P.P.C.4
Lou, W.5
-
46
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
J. Li, Y. K. Li, X. Chen, P. P. C. Lee, and W. Lou. 2015a. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems 26, 5, 1206-1216.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.C.4
Lou, W.5
-
47
-
-
85077119766
-
CDStore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal
-
Mingqiang Li, Chuan Qin, and Patrick P. C. Lee. 2015b. CDStore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. In Proceedings of the 2015 USENIX Annual Technical Conference (ATC'15). 1-20.
-
(2015)
Proceedings of the 2015 USENIX Annual Technical Conference (ATC'15)
, pp. 1-20
-
-
Li, M.1
Qin, C.2
Lee, P.P.C.3
-
48
-
-
85011402126
-
-
Retrieved December 7, 2016, from
-
Mingqiang Li, Chuan Qin, and Patrick P. C. Lee. 2015c. Source Code of CD Store. Retrieved December 7, 2016, from https://github.com/chintran27/CDStore.
-
(2015)
Source Code of CD Store
-
-
Li, M.1
Qin, C.2
Lee, P.P.C.3
-
50
-
-
84893067231
-
Inter cloud RAIDer: A do-it-yourself multi-cloud private data backup system
-
Lecture Notes in Computer Science, Vol. 8314. Springer
-
Chih Wei Ling and Anwitaman Datta. 2014. Inter Cloud RAIDer: A do-it-yourself multi-cloud private data backup system. In Distributed Computing and Networking. Lecture Notes in Computer Science, Vol. 8314. Springer, 453-468. DOI:http://dx.doi.org/10.1007/978-3-642-45249-9-30.
-
(2014)
Distributed Computing and Networking
, pp. 453-468
-
-
Ling, C.W.1
Datta, A.2
-
51
-
-
84900482066
-
A policy-based de-duplication mechanism for encrypted cloud storage
-
Chuanyi Liu, Yancheng Wang, and Jie Lin. 2014. A policy-based de-duplication mechanism for encrypted cloud storage. Journal of Computational Information Systems 10, 6, 2297-2304.
-
(2014)
Journal of Computational Information Systems
, vol.10
, Issue.6
, pp. 2297-2304
-
-
Liu, C.1
Wang, Y.2
Lin, J.3
-
54
-
-
84969346266
-
A certified digital signature
-
Lecture Notes in Computer Science, Vol. 435. Springer
-
Ralph C. Merkle. 1990. A certified digital signature. In Advances in Cryptology-CRYPTO 1989. Lecture Notes in Computer Science, Vol. 435. Springer, 218-238. DOI:http://dx.doi.org/10.1007/0-387-34805-0-21.
-
(1990)
Advances in Cryptology-CRYPTO 1989
, pp. 218-238
-
-
Merkle, R.C.1
-
56
-
-
84959860456
-
Secure multi-server-Aided data deduplication in cloud computing
-
Meixia Miao, Jianfeng Wang, Hui Li, and Xiaofeng Chen. 2015. Secure multi-server-Aided data deduplication in cloud computing. Pervasive and Mobile Computing 24, C, 129-137. DOI:http://dx.doi.org/10.1016/j.pmcj.2015.03.002.
-
(2015)
Pervasive and Mobile Computing
, vol.24
, pp. 129-137
-
-
Miao, M.1
Wang, J.2
Li, H.3
Chen, X.4
-
59
-
-
85011331520
-
-
Home Page. Retrieved December 7, 2016, from
-
One Drive. 2016. Home Page. Retrieved December 7, 2016, from https://onedrive.live.com.
-
(2016)
One Drive
-
-
-
60
-
-
85011429095
-
-
Home Page. Retrieved December 7, 2016, from
-
Open Dedup. 2016. Home Page. Retrieved December 7, 2016, from http://www.opendedup.org.
-
(2016)
Open Dedup
-
-
-
61
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Lecture Notes in Computer Science, Vol. 1592. Springer
-
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT 1999. Lecture Notes in Computer Science, Vol. 1592. Springer, 223-238. DOI:http://dx.doi.org/10.1007/3-540-48910-X-16.
-
(1999)
Advances in Cryptology-EUROCRYPT 1999
, pp. 223-238
-
-
Paillier, P.1
-
62
-
-
84905868354
-
A survey and classification of storage deduplication systems
-
João Paulo and José Pereira. 2014. A survey and classification of storage deduplication systems. ACM Computing Surveys 47, 1, 1-30. DOI:http://dx.doi.org/10.1145/2611778.
-
(2014)
ACM Computing Surveys
, vol.47
, Issue.1
, pp. 1-30
-
-
Paulo, J.1
Pereira, J.2
-
63
-
-
84982943258
-
Non-interactive and information-Theoretic secure verifiable secret sharing
-
Lecture Notes in Computer Science, Vol. 576. Springer
-
Torben Pryds Pedersen. 1992. Non-interactive and information-Theoretic secure verifiable secret sharing. In Advances in Cryptology-CRYPTO 1992. Lecture Notes in Computer Science, Vol. 576. Springer, 129-140. DOI:http://dx.doi.org/10.1007/3-540-46766-1-9.
-
(1992)
Advances in Cryptology-CRYPTO 1992
, pp. 129-140
-
-
Pedersen, T.P.1
-
66
-
-
85011402163
-
-
Home Page. Retrieved December 7, 2016, from
-
Quantum. 2016. Home Page. Retrieved December 7, 2016, from http://www.quantum.com/products/cloudservices/q-cloud/index.aspx.
-
(2016)
Quantum
-
-
-
67
-
-
0003676885
-
Fingerprinting by random polynomials
-
Aiken Computation Laboratory, Harvard University, Cambridge, MA
-
Michael Rabin. 1981. Fingerprinting by Random Polynomials. Center for Research in Computing Technology, Aiken Computation Laboratory, Harvard University, Cambridge, MA.
-
(1981)
Center for Research in Computing Technology
-
-
Rabin, M.1
-
68
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Michael Rabin. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36, 335-348.
-
(1989)
Journal of the ACM
, vol.36
, pp. 335-348
-
-
Rabin, M.1
-
70
-
-
0018545449
-
How to share a secret
-
Adi Shamir. 1979. How to share a secret. Communications of the ACM 22, 11, 612-613. DOI:http://dx.doi.org/10.1145/359168.359176.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
72
-
-
84937000951
-
Differentially private client-side data deduplication protocol for cloud storage services
-
Youngjoo Shin and Kwangjo Kim. 2015. Differentially private client-side data deduplication protocol for cloud storage services. Security and Communication Networks 8, 2114-2123. DOI:http://dx.doi.org/10.1002/sec.1159.
-
(2015)
Security and Communication Networks
, vol.8
, pp. 2114-2123
-
-
Shin, Y.1
Kim, K.2
-
73
-
-
84916638740
-
A secure data deduplication scheme for cloud storage
-
Lecture Notes in Computer Science, Vol. 8437. Springer
-
Jan Stanek, Alessandro Sorniotti, Elli Androulaki, and Lukas Kencl. 2013. A secure data deduplication scheme for cloud storage. In Financial Cryptography and Data Security. Lecture Notes in Computer Science, Vol. 8437. Springer, 99-118.
-
(2013)
Financial Cryptography and Data Security
, pp. 99-118
-
-
Stanek, J.1
Sorniotti, A.2
Androulaki, E.3
Kencl, L.4
-
75
-
-
85011397094
-
-
Home Page. Retrieved December 7, 2016, from
-
Stor Reduce. 2016. Home Page. Retrieved December 7, 2016, from http://www.storreduce.com.
-
(2016)
Stor Reduce
-
-
-
76
-
-
84943263073
-
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication
-
Mi Wen, Kejie Lu, Jingsheng Lei, Fengyong Li, and Jing Li. 2015. BDO-SD: An efficient scheme for big data outsourcing with secure deduplication. In Proceedings of the 2015 IEEE INFOCOM Workshop on Big Data Security. 1-6.
-
(2015)
Proceedings of the 2015 IEEE INFOCOM Workshop on Big Data Security
, pp. 1-6
-
-
Wen, M.1
Lu, K.2
Lei, J.3
Li, F.4
Li, J.5
-
77
-
-
85011429105
-
-
Wikipedia. Retrieved December 7, 2016, from
-
Wikipedia. 2016a. Comparison of Disk Encryption Software. Retrieved December 7, 2016, from https://en.wikipedia.org/wiki/Comparison-of-disk-encryption-software.
-
(2016)
Comparison of Disk Encryption Software
-
-
-
78
-
-
85011429102
-
-
Wikipedia. Retrieved December 7, 2016, from
-
Wikipedia. 2016b. Comparison of TLS Implementations. Retrieved December 7, 2016, from https://en.wikipedia.org/wiki/Comparison-of-TLS-implementations.
-
(2016)
Comparison of TLS Implementations
-
-
-
79
-
-
85011335054
-
-
Home Page. Retrieved December 7, 2016, from
-
Wuala. 2015. Home Page. Retrieved December 7, 2016, from https://en.wikipedia.org/wiki/Wuala.
-
(2015)
Wuala
-
-
-
81
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
Jia Xu, Ee-Chien Chang, and Jianying Zhou. 2013. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACMSymposium on Information, Computer, and Communications Security (ASIACCS'13). 195.
-
(2013)
Proceedings of the 8th ACMSymposium on Information, Computer, and Communications Security (ASIACCS'13)
, pp. 195
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
-
82
-
-
84926611629
-
Provable ownership of encrypted files in de-duplication cloud storage
-
Chao Yang, Jianfeng Ma, and Jian Ren. 2015. Provable ownership of encrypted files in de-duplication cloud storage. Ad Hoc and Sensor Wireless Networks 26, 43-72.
-
(2015)
Ad Hoc and Sensor Wireless Networks
, vol.26
, pp. 43-72
-
-
Yang, C.1
Ma, J.2
Ren, J.3
-
84
-
-
84939445947
-
Provable ownership of files in deduplication cloud storage
-
Chao Yang, Jian Ren, and Jianfeng Ma. 2013b. Provable ownership of files in deduplication cloud storage. Security and Communication Networks 8, 14, 2457-2468. DOI:http://dx.doi.org/10.1002/sec.784.
-
(2013)
Security and Communication Networks
, vol.8
, Issue.14
, pp. 2457-2468
-
-
Yang, C.1
Ren, J.2
Ma, J.3
-
87
-
-
84942514912
-
Enabling encrypted cloud media center with secure deduplication
-
Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, and Xiaolin Gui. 2015. Enabling encrypted cloud media center with secure deduplication. In Proceedings of the 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS'15). 63-72.
-
(2015)
Proceedings of the 10th ACM Symposium on Information, Computer, and Communications Security (ASIACCS'15)
, pp. 63-72
-
-
Zheng, Y.1
Yuan, X.2
Wang, X.3
Jiang, J.4
Wang, C.5
Gui, X.6
-
88
-
-
84952038963
-
Sec dep: A user-Aware efficient fine-grained secure deduplication scheme with multi-level key management
-
Y. Zhou, D. Feng, W. Xia, M. Fu, F. Huang, Y. Zhang, and C. Li. 2015. Sec Dep: A user-Aware efficient fine-grained secure deduplication scheme with multi-level key management. In Proceedings of the 31st International Conference on Massive Storage Systems and Technology (MSST'15).
-
(2015)
Proceedings of the 31st International Conference on Massive Storage Systems and Technology (MSST'15)
-
-
Zhou, Y.1
Feng, D.2
Xia, W.3
Fu, M.4
Huang, F.5
Zhang, Y.6
Li, C.7
|