参考文献
|
-
Abadi, M.,Boneh, D.,Mironov, I.,Raghunathan, A.,Segev, G.(2013).Message-locked encryption for lock-dependent messages.International Cryptology Conference (CRYPTO)
-
Anderson, P.,Zhang, L.(2010).Fast and secure laptop backups with encrypted deduplication.USENIX Large Installation System Administration Conference (LISA)
-
Baracaldo, N.,Androulaki, E.,Glider, J.,Sorniotti, A.(2014).Reconciling end-to-end confidentiality and data reduction in cloud storage.ACM Workshop on Cloud Computing Security (CCSW)
-
Bellare, M.,Keelveedhi, S.,Ristenpart, T.(2013).DupLESS: server-aided encryption for deduplicated storage.USENIX Security Symposium
-
Bellare, M.,Keelveedhi, S.,Ristenpart, T.(2013).Message-locked encryption and secure deduplication.International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
-
Blasco, J.,Orfila, A.,Pietro, R. D. I.,Sorniotti, A.(2014).A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters.IEEE Conference on Communications and Network Security (CNS)
-
Bloom, B. H.(1970).Space/time trade-offs in hash coding with allowable errors.Communications of the ACM,13(7),422-426.
-
Cormode, G.,Muthukrishnan, S.(2004).An Improved Data Stream Summary: The CountMin Sketch and its Applications.Journal of Algorithms,55,29-38.
-
Di Pietro, R.,Sorniotti, A.(2012).Boosting efficiency and security in proof of ownership for deduplication.ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
Douceur, J. R.,Adya, A.,Bolosky, W. J.,Simon, P.,Theimer, M.(2002).Reclaiming space from duplicate files in a serverless distributed file system.International Conference on Distributed Computing Systems (ICDCS)
-
Drago, I.,Mellia, M.,Munafo, M. M.,Sperotto, A,Sadre, R.,Pras, A.(2012).Inside dropbox: understanding personal cloud storage services.ACM conference on Internet Measurement Conference (IMC)
-
Duan, Y.(2014).Distributed key generation for encrypted deduplication: achieving the strongest privacy.ACM Workshop on Cloud Computing Security (CCSW)
-
M. Dutch and L. Freeman, “Understanding data de-duplication ratios,” SNIA, 2009. http://www.snia.org
-
Eshghi, K.,Tang, H. K.(2005).Hewlett-Packard (HP) Technical ReportHewlett-Packard (HP) Technical Report,未出版
-
Fan, L.,Cao, P.,Almeida, J.,Broder, A. Z.(2000).Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol.IEEE/ACM Transactions on Networking,8(3),281-293.
-
Fu, Y. J.,Xiao, N.,Liao, X. K.,Liu, F.(2013).Application-aware client-side data reduction and encryption of personal data in cloud backup services.Journal of Computer Science and Technology
-
Guo, D.,Wu, J.,Chen, H.,Yuan, Y.,Luo, X.(2010).The dynamic bloom filter.IEEE Transactions on Knowledge and Data Engineering,22(1),120-133.
-
Halevi, S.,Harnik, D.,Pinkas, B.,Shulman-Peleg, A.(2011).Proofs of ownership in remote storage systems.ACM Conference on Computer and Communications (CCS)
-
Harnik, D.,Pinkas, B.,Shulman-Peleg, A.(2010).Side channels in cloud services, the case of deduplication in cloud storage.IEEE Security & Privacy,8(6),40-47.
-
Jin, X,Wei, L,Yu, M,Yu, N,Sun, J(2013).Anonymous deduplication of encrypted data with proof of ownership in cloud storage.IEEE/CIC International Conference on Communications in China (ICCC)
-
Juels, A.,Kaliski, B., Jr(2007).PORS: proofs of retrievability for large files.ACM conference on Computer and Communications Security (CCS)
-
Kaaniche, N.,Laurent, M.(2014).A secure client side deduplication scheme in cloud storage environments.International Conference on New Technologies, Mobility and Security (NTMS)
-
Li, J.,Chen, X.,Li, M.,Lee, P.,Lou, W.(2014).Secure deduplication with efficient and reliable convergent key management.IEEE Transactions on Parallel and Distributed Systems,25(6),1615-1625.
-
Li, J.,Li, Y. K.,Chen, X.,Lee, P. P. C.,Lou, W.A hybrid cloud approach for secure authorized deduplication.IEEE Transactions on Parallel and Distributed Systems
-
Liu, C.,Liu, X.,Wan, L(2013).Policy-based de-duplication in secure cloud storage.Trustworthy Computing and Services,250-262.
-
Marques, L.,Costa, C. J.(2011).Secure deduplication on mobile devices.Workshop on Open Source and Design of Communication (OSDOC)
-
Meye, P.,Raipin, P.,Tronel, F.,Anceaume, E.(2014).A secure two-phase data deduplication scheme.International Symposium on Cyberspace Safety and Security (CSS)
-
Mulazzani, M.,Schrittwieser, S.,Leithner, M.,Huber, M.,Weippl, E.(2011).Dark clouds on the horizon: using cloud storage as attack vector and onlineslack space.USENIX Security Symposium
-
Naor, M.,Reingold, O.(1997).Number-Theoretic Constructions of Efficient Pseudo-Random Functions.IEEE Symposium on Foundations of Computer Science (FOCS)
-
Nisan, N.,Zuckerman, D.(1996).Randomness is Linear in Space.Journal of Computer and System Sciences,52,43-52.
-
Paulo, J.,Pereira, J.(2014).A survey and classification of storage deduplication systems.ACM Computing Surveys (CSUR),47(1)
-
Puzio, P.,Molva, R.,Önen, M.,Loureiro, S.(2014).Block-level de-duplication with encrypted data.Open Journal of Cloud Computing,1(1),10-18.
-
Rabin, M. O.(1981).Tech ReportTech Report,Center for Research in Computing Technology, Harvard University.
-
Rashid, F.,Miri, A.,Woungang, I.(2012).A Secure Data Deduplication Framework for Cloud Environments.International Conference on Privacy, Security and Trust
-
Rashid, F.,Miri, A.,Woungang, I.(2013).Proof of retrieval and ownership protocols for enterprise-level data deduplication.Conference of the Center for Advanced Studies on Collaborative Research (CASCON)
-
Shin, Y.,Kim, K..Differentially private client-side data deduplication protocol for cloud storage services.Security and Communication Networks
-
Stanek, J.,Sorniotti, A.,Androulaki, E.,Kencl, L.(2013).,IBM.
-
Storer, M.,Greenan, K.,Long, D.,Miller, E..Secure data deduplication.International Workshop on Storage Security and Survivability
-
W. V. der Laan, Dropship, https://github.com/driverdan/dropship
-
Vadhan, S.(2004).Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model.Journal of Cryptology,17(1),43-77.
-
Xu, J.,Chang, E. C.,Zhou, J.(2013).Weak leakage-resilient client-side deduplication of encrypted data in cloud storage.ACM SIGSAC symposium on Information, computer and communications security (ASIACCS)
-
Xu, J.,Zhou, J.(2014).Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited.International Conference on Applied Cryptography and Network Security (ACNS)
-
Yang, C.,Ren, J..Provable ownership of encrypted files in de-duplication cloud storage.Ad Hoc & Sensor Wireless Networks
-
Yang, C.,Ren, J.,Ma, J.(2013).Provable ownership of files in de-duplication cloud storage.IEEE Global Telecommunications Conference (GLOBECOM)
-
Youngjoo, S.,Kwangjo, K.(2014).Efficient and Secure File Deduplication in Cloud Storage.IEICE Transactions on Information and Systems,E97(2),184-197.
-
Yu, C.-M.(2014).HTTP Botnet Resilient to Takedown.IEEE Symposium on Security and Privacy (S&P),San Jose, California, USA:
-
Yu, C.-M.,Chen, C.-Y.,Chao, H.-C..Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency.IEEE Network
-
Zheng, Q.,Xu, S.(2012).Secure and efficient proof of storage with deduplication.ACM conference on Data and Application Security and Privacy (CODASPY)
|