1 |
J. Li et al., "Secure Deduplication with Dfficient and Reliable Convergent Key Management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, June 2014, pp. 1615-1625.
DOI
|
2 |
M. Storer et al., "Secure Data Deduplication," Proc. ACM Int. Workshop Storage Security Survivability, Alexandria, GA, USA, Oct. 31, 2008, pp. 1-10.
|
3 |
Y. Shin et al., "Efficient and Secure File Deduplication in Cloud Storage," IEICE Trans. Inform. Syst., vol. E97-D, no. 2, 2014, pp. 184-197.
DOI
|
4 |
J. Xu, E. Chang, and J. Zhou, "Weak Leakage-Resilient Client-Side Deduplication of Encrypted Data in Cloud Storage," Proc. ACM SIGSAC Symp. Inform., Comput., Commun. Security, Hangzhou, China, May 8-10, 2013, pp. 195-206.
|
5 |
N. Kaaniche and M. Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," Proc. Int. Conf. New Technol., Mobility Security, Dubai, United Arab Emirates, Mar. 30-Apr. 2, 2014, pp. 1-7.
|
6 |
J.R. Douceur et al., "Reclaiming Space from Duplicate Files in a Serverless Distributed File System," Proc. Int. Conf. Distr. Comput. Syst., Vienna, Austria, July 2-5, 2002, pp. 617-624.
|
7 |
D. Harnik, B. Pinkas, and A. Shulman Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage," IEEE Security Privacy, vol. 8, no. 6, Dec. 2010, pp. 40-47.
|
8 |
S. Halevi et al., "Proofs of Ownership in Remote Storage Systems," Proc. ACM Conf. Comput. Commun. Security, Chicago, IL, USA, Oct. 17-22, 2011, pp. 491-500.
|
9 |
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-Locked Encryption and Secure Deduplication," Adv. Cryptology - Eurocrypt, Athens, Greece, May 2013, pp. 296-312.
|
10 |
M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Server-Aided Encryption for Deduplicated Storage," Proc. USENIX Conf. Security, Washington, DC, USA, Aug. 14-16, 2013, pp. 179-194.
|