Privacy Preserving Source Based Deduplication In Cloud Storage |
Park, Cheolhee
(Kongju National University)
Hong, Dowon (Kongju National University) Seo, Changho (Kongju National University) Chang, Ku-Young (ETRI) |
1 | DropBox, http://www.dropbox.com |
2 | Mozy, http://www.mozy.com |
3 | google-Drive, http://www.drive.google.com |
4 | Douceur, John R., et al. "Reclaiming space from duplicate files in a serverless distributed file system." Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on. IEEE, pp. 617-624, 2002. |
5 | Bellare, Mihir, Sriram Keelveedhi, and Thomas Ristenpart. "DupLESS: server-aided encryption for deduplicated storage." Proceedings of the 22nd USENIX conference on Security. USENIX Association, pp. 179-194, August. 2013. |
6 | Halevi, Shai, et al. "Proofs of ownership in remote storage systems." Proceedings of the 18th ACM conference on Computer and communications security. ACM, pp. 491-500, October. 2011. |
7 | Kaaniche, Nesrine, and Maryline Laurent. "A Secure Client Side Deduplication Scheme in Cloud Storage Environments." New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on. IEEE, pp. 1-7, March. 2014. |
8 | Camenisch, Jan, and Gregory Neven. "Simulatable adaptive oblivious transfer." Advances in Cryptology-EUROCRYPT 2007. Springer Berlin Heidelberg, pp. 573-590, 2007. |
9 | Naor, Moni, and Omer Reingold. "Number-theoretic constructions of efficient pseudo-random functions." Journal of the ACM (JACM) 51.2, pp. 231-262, 2004. DOI |
10 | Merkle, Ralph C. "A certified digital signature." Advances in Cryptology-CRYPTO'89 Proceedings. Springer New York, pp. 218-238, January. 1990. |
11 | Harnik, Danny, Benny Pinkas, and Alexandra Shulman-Peleg. "Side channels in cloud services: Deduplication in cloud storage." Security & Privacy, IEEE 8.6, pp. 40-47, 2010. |