[1] |
FU Yinjin, XIAO Nong, LIU Fang.Research and Development on Key Techniques of Data Deduplication[J]. Journal of Computer Research and Development, 2012, 49(1): 12-20.
|
|
付印金,肖侬,刘芳.重复数据删除关键技术研究进展[J].计算机研究与发展,2012,49(1):12-20.
|
[2] |
AO Li, SHU Jiwu, LI Mingqiang.Data Deduplication Techniques[J]. Journal of Software, 2010, 21(5): 916-929.
|
|
敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929.
|
[3] |
DOUCEUR J R, ADYA A, BOLOSKY W J, et al.Reclaiming Space from Duplicate Files in a Serverless Distributed File System[C]//IEEE. Proceedings of the 22nd International Conference on Distributed Computing Systems, July 2-5, 2002, Vienna, Austria. New York: IEEE, 2002: 5-20.
|
[4] |
BELLARE M, KEELVEEDHI S, RISTENPART T.Message-Locked Encryption and Secure Deduplication[C]//Springer. The 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 26-30, 2013, Athens, Greece. Heidelberg: Springer, 2013: 296-312.
|
[5] |
LIU Jian, ASOKAN N, PINKAS B.Secure Deduplication of Encrypted Data without Additional Servers[C]//ACM. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, Denver, USA. New York: ACM, 2015: 874-885.
|
[6] |
STANEK J, SORNIOTTI A, ANDROULAKI E, KENCL L.A Secure Data Deduplication Scheme for Cloud Storage[C]//Springer. International Conference on Financial Cryptography and Data Security, March 3-7, 2014, Christ Church, Barbados. Heidelberg: Springer, 2014: 99-118.
|
[7] |
PUZIO P, MOLVA R, ÖNEN M, LOUREIRO S.PerfectDedup: Secure Data Deduplication[C]//Springer, International Workshop on Data Privacy Management, September 21-22, 2015, Vienna, Austria. Heidelberg: Springer, 2015: 150-166.
|
[8] |
HUR J, KOO D, SHIN Y, KANG K.Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 28(11): 3113-3125.
|
[9] |
YAN Z, DING W, YU X, et al.Deduplication on Encrypted Big Data in Cloud[J]. IEEE Transactions on Big Data, 2016, 2(2): 138-150.
|
[10] |
ZHANG Shuguang, XIAN Hequn, WANG Yazhe, et al.Secure Encrypted Data Deduplication Method Based on Offline Key Distribution[J]. Journal of Software, 2018, 29(7): 66-72.
|
|
张曙光,咸鹤群,王雅哲,等.基于离线密钥分发的加密数据重复删除方法[J].软件学报, 2018,29(27):66-72.
|
[11] |
GREEN M, ATENIESE G.Identity-Based Proxy Re-encryption[C]// Springer. International Conference on Applied Cryptography and Network Security, June 5-8, 2007, Zhuhai, China. Heidelberg: Springer, 2007: 288-306.
|
[12] |
DI P R, SORNIOTTI A.Boosting Efficiency and Security in Proof of Ownership for Deduplication[C]//ACM. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, May 2-4, 2012, Seoul, Korea. New York: ACM, 2012: 81-82.
|
[13] |
CARO A D, IOVINO V.JPBC: Java Pairing Based Cryptography[C]//IEEE. Proceedings of the 16th IEEE Symposium on Computers and Communications, June 28-July 1, 2011, Corfu, Greece. New York: IEEE, 2011: 850-855.
|
[14] |
LOUKIDES M, ORAM A.Programming with GNU Software[M]. Sebastopol: O'Reilly Media, 1996.
|
[15] |
VIEGA J, MESSIER M, CHANDRA P.Network Security with OpenSSL[M]. Sebastopol: O'Reilly Media, 2002.
|