Acknowledgement
이 성과는 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임(No. NRF-2021R1F1A1064256).
References
- Statista, "Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2025," [Internet], https://www.statista.com/statistics/871513/worldwide-data-created/
- Memopal, "Technology," [Internet], https://www.memopal.com/technology/
- Dropbox, "Dropbox," [Internet], https://www.dropbox.com/
- Google Drive, "Google Drive," [Internet], https://drive.google.com/
- P. Puzio, R. Molva, M. Onen, and S. Loureiro, "ClouDedup: Secure deduplication with encrypted data for cloud storage," IEEE International Conference on Cloud Computing Technology and Science, pp.363-370, 2013.
- M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication," Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.296-312, 2013.
- M. Wen, K. Lu, J. Lei, F. Li, and J. Li, "DBO-SD: An efficient scheme for big data outsourcing with secure deduplication," IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.214-219, 2015.
- M. Bellare and S. Keelveedhi, "Interactive message-locked encryption and secure deduplication," IACR International Workshop on Public Key Cryptography (PKC), pp.516-538, 2015.
- S. Mishra, S. Singh, and S. T. Ali, "RCDSD: RSA based cross domain secure deduplication on cloud storage," International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp.1-7, 2018.
- P. Singh, N. Agarwal, and B. Raman, "Secure data deduplication using secret sharing schemes over cloud," Future Generation Computer Systems, Vol.88, No.2018, pp.156-167, 2018. https://doi.org/10.1016/j.future.2018.04.097
- Y. Wang, M. Miao, J. Wang, and Xuefeng Zhang, "Secure deduplication with efficient user revocation in cloud storage," Computer Standards & Interfaces, Vol.78, pp.1-8, 2021.
- I. Stojmenovic, S. Wen, X. Huang, and H. Luan, "An overview of fog computing and its security issues," Concurrency and Computation: Practice and Experience, Vol.28, No.10, pp.2991-3005, 2015. https://doi.org/10.1002/cpe.3485
- J. R. Douceur, A. Adya, W. J. Bolosky, D. Simin, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," Technical Report MSR-TR-2002-30, Microsoft Research, pp.1-14, 2002.
- W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet of Things Journal, Vol.3, No.5, pp.637-646, 2016. https://doi.org/10.1109/JIOT.2016.2579198
- D. Koo, Y. Shin, J. Yun, and J. Hur, "A hybrid deduplication for secure and efficient data outsourcing in fog computing," IEEE International Conference on Cloud Computing Technology and Science(CloudCom), pp.285-293, 2016.
- D. Koo and J. Hur, "Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing," Future Generation Computer Systems, Vol.78, No.2, pp.739-752, 2018. https://doi.org/10.1016/j.future.2017.01.024
- M. Sabt, M. Achemlal, and A. Bouabdallah, "Trusted execution environment: What it is, and what it is not," IEEE Trustcom/BigDataSE/ISPA, pp.57-64, 2015.
- ARM, "Learn the architecture: TrustZone for AArch64," [Internet] https://developer.arm.com/documentation/102418/0101/What-is-TrustZone-?lang=en
- Intel, "Intel® Software Guard Extensions (Intel® SGX)," [Internet] https://www.intel.sg/content/www/xa/en/architecture-and-technology/software-guard-extensions.html
- AMD, "AMD Secure Encrypted Virtualization (SEV)," [Internet] https://developer.amd.com/sev/
- V. Costan and S. Devadas, "Intel SGX explained," Cryptology ePrint Archive, pp.1-118, 2016.
- Y. Ren, J. Li, P. P. C. Lee, and X. Zhang, "Accelerating encrypted deduplication via SGX," USENIX Annual Technical Conference (USENIX ATC), pp.303-316, 2021.
- S. Keelveedhi, M. Bellare, T. Ristenpart, "DupLESS: Server-aided encryption for deduplicated storage," USENIX Security Symposium (USENIX Security), pp.179-194, 2013.
- M. Miranda, T. Esteves, B. Portela, and J. Paulo, "S2Dedup: SGX-enabled secure deduplication," ACM International Conference on Systems and Storage(SYSTOR), pp.1-12, 2021.
- D. Meister, J. Kaiser, A. Brinkmann, T. Cortes, M. Kuhn, and J. Kunkel, "A study on data deduplication in HPD storage systems," IEEE International Conference on High Performance Computing, Networking, Storage and Analysis (SC), pp.1-11, 2012.
- M. Dutch, "Understanding data deduplication ratios," SNIA (Storage Networking Industry Association) - Data Management Forum, [Internet] https://www.snia.org/sites/default/files/Understanding_Data_Deduplication_Ratios-20080718.pdf, pp.1-13, 2008.
- V. Tarasov, W. Buik, P. Shilane, G. Kuenning, and E. Zadok, "Generating realistic datasets for deduplication analysis," USENIX Annual Technical Conference (ATC), pp.1-12, 2012.
- Advanced Storage Products Group, "Identifying the Hidden Risk of Data Deduplication: How the HYDRAstorTM Solution Proactively Solves the Problem," White paper - NEC, pp.1-9, [Internet] https://silo.tips/downloadFile/identifying-the-hidden-risk-of-data-deduplication-how-the-hydrastor-tm-solution, 2009.
- D. T. Meyer and W. J. Bolosky, "A study of practical deduplication," ACM Transactions on Storage, pp.1-20, 2012.