Acknowledgement
이 논문은 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임(No. NRF-2021R1F1A1064256).
References
- M. Armbrust, et al., "A View of Cloud Computing," in Communications of the ACM, Vol.53, No.4, pp.50-58, 2010. https://doi.org/10.1145/1721654.1721672
- Y. Fan, X. Lin, W. Liang, G. Tan, and P. Nanda, "A secure privacy preserving deduplication scheme for cloud computing," in Future Generation Computer Systems, Vol.101, pp.127-135, 2019. https://doi.org/10.1016/j.future.2019.04.046
- Y. Shin, D. Koo, and J. Hur, "A survey of secure data deduplication schemes for cloud storage systems," in ACM Computing Surveys, Vol.49, No.74, pp.1-38, 2017.
- M. Sabt, M. Achemlal, and A. Bouabdallah, "Trusted execution environment: What it is, and what it is not," in Proceedings of IEEE Trustcom/BigDataSE/ISPA, pp.57-64, 2015.
- M. Miranda, T. Esteves, B. Portela, and J. Paulo, "S2Dedup: SGX-enabled secure deduplication," in Proceedings of ACM International Conference on Systems and Storage (SYSTOR), pp.1-12, 2021.
- Y. Ren, J. Li, P. P. C. Lee, and X. Zhang, "Accelerating encrypted deduplication via SGX," in Proceedings of USENIX Annual Technical Conference (USENIX ATC), pp.303-316, 2021.
- J. R. Douceur, A. Adya, W. J. Bolosky, D. Simin, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," Technical Report MSR-TR-2002-30, Microsoft Research, pp.1-14, 2002.
- M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication," in Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.296-312, 2013.
- S. Keelveedhi, M. Bellare, and T. Ristenpart, "DupLESS: Server-Aided Encryption for Deduplicated Storage," in Proceedings of USENIX Security Symposium (USENIX Security), pp.179-194, 2013.
- V. Costan and S. Devadas, "Intel SGX explained," Cryptology ePrint Archive, pp.1-118, 2016.
- J. Liu, N. Asokan, and B. Pinkas, "Secure deduplication of encrypted data without additional independent servers," in Proceedings of ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), pp.874-885, 2015.
- Y. Duan, "Distributed key generation for encrypted deduplication: Achieving the strongest privacy," in Proceedings of ACM Workshop on Cloud Computing Security (CCSW), pp.57-68, 2014.
- S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proceedings of ACM Conference on Computer and Communications Security(CCS), pp.491-500, 2011.
- Wikipedia, List of countries by Internet connection speeds, [Internet] https://en.wikipedia.org/wiki/List_of_countries_by_Internet_connection_speeds