Supported by : 공주대학교
- Dropbox. [Online]. Available: http://www.dropbox.com
- Mozy. [Online]. Available: http://www.mozy.com
- Google-Drive. [Online]. Available: http://www.drive.google.com
- J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," Distributed Computing Systems, Proc. of 22nd International Conference on Distributed Computing Systems, IEEE, pp. 617-624, 2002.
- M. Ballare, S. Keelveedhi, and T. Ristenpart, "Dup-LESS : Server-aided encryption for deduplicated storage," Proc. of the 22nd USENIX conference on Security, pp. 179-194, Aug. 2013.
- D. Chaum, "Blind signatures for untraceable payments," CRYPTO'82 (Santa Barbara, CA, USA), pp. 199-203, 1983.
- Storer, Mark W., et al., "Secure data deduplication," Proc. of the 4th ACM international workshop on Storage security and survivability, ACM, 2008.
- S.Halevi, D.Harnik, B.Pinkas, and A.Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," Proc. of the 18th ACM conference on Computer and communications security, ACM, pp. 491-500, Oct. 2011.
- Di Pietro, Roberto, and Alessandro Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication," Proc. of the 7th ACM Symposium on Information, Computer and Communications Security, ACM, 2012.
- Gonzalez-Manzano, Lorena, and Agustin Orfila. "An efficient confidentiality-preserving proof of ownership for deduplication," Journal of Network and Computer Applications 50 : 49-59, 2015. https://doi.org/10.1016/j.jnca.2014.12.004
- Camenisch, Jan, and G.Neven, "Simulatable adaptive oblivious transfer," Advances in Cryptology-EUROCRYPT 2007, pp. 573-590, 2007.
- Naor, Moni and O.Reingold, "Number-theoretic constructions of efficient pseudo-random functions," Journal of the ACM(JACM), pp. 231-262, 2004.
- Blasco, Jorge, et al., "A tunable proof of ownership scheme for deduplication using bloom filters," Communications and Network Security (CNS), 2014 IEEE Conference on, IEEE, 2014.
- Xu, Jia, Ee-Chien Chang, and Jianying Zhou, "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage," Proc. of the 8th ACM SIGSAC symposium on Information, computer and communications security, ACM, 2013.
- Openstack. [Online]. Available: http://www.openstack.org/
- Openstack Swift. [Online]. Available: http://docs.openstack.org/developer/swift/