Privacy Preserving source Based Deuplication Method |
Nam, Seung-Soo
(공주대학교 융합과학과)
Seo, Chang-Ho (공주대학교 융합과학과) Lee, Joo-Young (전자통신연구원) Kim, Jong-Hyun (전자통신연구원) Kim, Ik-Kyun (전자통신연구원) |
1 | Kaaniche, Nesrine, M, Laurent, "A Secure Client Side Deduplication Scheme in Cloud Storage Environments," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, lEEE, 2014. |
2 | Douceur, R. John, "Reclaiming space from duplicate files in a serverless distributed file system," Distributed Computing Systems, 2002, Proceedings, 22nd International Conference on, IEEE, 2002. |
3 | Camenisch, Jan, G. Neven, "Simulatable adaptive oblivious transfer," Advances in Cryptology-EUROCRYPT, Springer Berlin Heidelberg, 2007, 573-590. |
4 | Naor, Moni, O. Reingold. "Number-theoretic constructions of efficient pseudo-random functions," Journal of the ACM (JACM) 51,2 (2004): 231-262. DOI |
5 | Bellare, Mihir, S. Keelveedhi, T. Ristenpart, "DupLESS: server-aided encryption for deduplicated storage," Proceedings of the 22nd USENIX conference on Security, USENIX Association, 2013. |
6 | Halevi, Shai, "Proofs of ownership in remote storage systems," Proceedings of the 18th ACM conference on Computer and communications security, ACM, 2011. |
7 | Merkle, C. Ralph, "A certified digital signature," Advances in Cryptology-CRYPTO'89 Proceedings, Springer New York, 1990. |