[1] |
XIA Wen, ZOU Xiangyu, JIANG Hong, et al. The Design of Fast Content-defined Chunking for Data Deduplication-based Storage Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2020,31(9):2017-2031.
|
[2] |
LIU Xueyan, LU Tingting, HE Xiaomei, et al. Verifiable Attribute-based Keyword Search over Encrypted Cloud Data Supporting Data Deduplication[J]. IEEE Access, 2020,8(3):52062-52074.
|
[3] |
ZHANG Yucheng, FU Min, WU Xinyun, et al. Improving Restore Performance of Packed Datasets in Deduplication Systems via Reducing Persistent Fragmented Chunks[J]. IEEE Transactions on Parallel and Distributed Systems, 2020,31(7):1651-1664.
|
[4] |
PRIYANKA S, NISHANT A, BALASUBRAMANIAN R. Secure Data Deduplication Using Secret Sharing Schemes over Cloud[J]. Future Generation Computer Systems, 2018,78(5):156-167.
|
[5] |
YOUNGJOO S, DONGYOUNG K, JUNBEOM H, et al. Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage[J]. IEEE Transactions on Services Computing, 2018,11(4):621-636.
|
[6] |
HYUNSOO K, CHANGHEE H, KYUNGTAE K, et al. Secure Deduplication with Reliable and Revocable Key Management in Fog Computing[J]. Peer-to-Peer Networking and Applications, 2018,11(6):1153-1167.
|
[7] |
HALEVI S, HARNIK D, PINKAS B, et al. Proofs of Ownership in Remote Storage Systems[C]// ACM. The 18th ACM Conference on Computer and Communications Security, October 17-21, 2011, Chicago, USA. New York: ACM, 2011: 491-500.
|
[8] |
PIETRO R D, SORNIOTTI A. Boosting Efficiency and Security in Proof of Ownership for Deduplication [C]//ACM. The 7th ACM Symposium on Information, Computer and Communications Security, May 2-4, 2012, Seoul, Korea. New York: ACM, 2012: 81-82.
|
[9] |
GONZÁLEZ-MANZANO L, ORFILA A. An Efficient Confidentiality-preserving Proof of Ownership for Deduplication[J]. Journal of Network and Computer Applications, 2015,50(4):49-59.
|
[10] |
SREEKUMAR A, SUNDAR S. An Efficient Secret Sharing Scheme for n out of n Scheme Using POB-Number System[J]. International Journal on Information Processing, 2009,3(4):77-83.
|
[11] |
ASMUTH C, BLOOM J. A Modular Approach to Key Safeguarding[J]. IEEE Transactions on Information Theory, 1983,29(2):208-210.
|
[12] |
MIGNOTTE M. How to Share a Secret[M]// Springer. Cryptography. Heidelberg: Springer, Berlin, Heidelberg, 1983: 371-375.
|
[13] |
XU Jia, CHANG E C, ZHOU Jianying. Weak Leakage-resilient Client-side Deduplication of Encrypted Data in Cloud Storage[C]// ACM. ACM Sigsac Symposium on Information, Computer and Communications Security, November 4-8, 2013, Berlin, Germany. New York: ACM, 2013: 195-206.
|
[14] |
KOO Dongyoung, HUR Junbeom. Privacy-preserving Deduplication of Encrypted Data with Dynamic Ownership Management in Fog Computing[J]. Future Generation Computer Systems, 2018,78(2):739-752.
|