Secure and Efficient Client-side Deduplication for Cloud Storage |
Park, Kyungsu
(Graduate School of Information Security, Korea University)
Eom, Ji Eun (Graduate School of Information Security, Korea University) Park, Jeongsu (Graduate School of Information Security, Korea University) Lee, Dong Hoon (Graduate School of Information Security, Korea University) |
1 | M. Dutch and L. Freeman. "Understanding data deduplication ratios." SNIA Data Management Forum, Jun. 2008. |
2 | "DropBox, Hacked on client accounts", http://www.bloter.net/archives/121266 |
3 | D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services : Deduplication in cloud storage," IEEE Security and Privacy Magazine, vol.8, pp. 40-47, Nov. 2010. |
4 | J. Xu, E. C. Chang, and J. Zhou. "Weak Leakage-Resilient client-side deduplication of encrypted data in cloud storage." ASIA CCS, pp. 195-206, May. 2013. |
5 | M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of abe ciphertexts," Proc. USENIX Conf. Security (SEC' 11), Aug. 2011. |
6 | J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system." Proc. Int'l Conf. Distributed Computing Systems (ICDCS' 02), pp. 617-624, Jul. 2002. |
7 | M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. "The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme." J. Cryptology, vol. 16, no.3, pp. 185-215, Jun. 2003. DOI |
8 | M. Bellare, and S. Keelveedhi. "DupLess : Server-aided encryption for deduplicated storage." Proc. USENIX conf. Security (SEC' 13), pp. 179-194, Aug. 2013. |
9 | S. Halevi, D. Harnik, B. Pinkas, A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," Proc. 18th ACM. Conf. Computer and Communications Security (CCS '11), ACM Press, pp. 491-500, Oct. 2011. |
10 | D. Russell, "Data deduplication will be even bigger in 2010," Gartner, Feb. 2010. |
11 | Y. Shin, and K. Kim, "Efficient and Secure File Deduplication in Cloud Storage," IEICE TRANS. INF. & SYST., Vol. E97-D, NO.2, pp. 184-197, Feb. 2014. DOI |
12 | D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," In Proceedings of Eurocrypt '04, LNCS Vol. 3027, pp. 506-522, Springer-Verlag, May. 2004. |
13 | K. Park, J. E. Eom, D. H. Lee, "An analysis of Shin et al's scheme for secure deduplication," Korea Institute of Information Security & Cryptology CISC-S, pp. 50, Jun, 2014. |