[1] |
NIESEN U. An Information-theoretic Analysis of Deduplication[J]. IEEE Transactions on Information Theory, 2019,65(9):5688-5704.
|
[2] |
ZHU Liehuang, WANG Hongyuan, XU Chang, et al. Efficient Group Proof of Storage with Malicious-member Distinction and Revocation[J]. IEEE Access, 2019(7):75476-75489.
|
[3] |
LIANG Xueqin, YAN Zheng, CHEN Xiaofeng, et al. Game Theoretical Analysis on Encrypted Cloud Data Deduplication[J]. IEEE Transactions on Industrial Informatics, 2019,15(10):5778-5789.
|
[4] |
YOUNGJOO S, DONGYOUNG K, JUNBEOM H. A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems[J]. ACM Computing Surveys, 2017,29(4):74-101.
|
[5] |
YOUNGJOO S, DONGYOUNG K, JUNBEOM H, et al. Decentralized Server-aided Encryption for Secure Deduplication in Cloud Storage[J]. IEEE Transactions on Services Computing, 2018,11(4):621-636.
|
[6] |
DONGYOUNG K, JUNBEOM H. Privacy-preserving Deduplication of Encrypted Data with Dynamic Ownership Management in Fog Computing[J]. Future Generation Computer Systems, 2018,78(3):739-752.
|
[7] |
HYUNSOO K, CHANGHEE H, KYUNGTAE K, et al. Secure Deduplication with Reliable and Revocable Key Management in Fog Computing[J]. Peer-to-Peer Networking and Applications, 2018,11(6):1153-1167.
|
[8] |
GONZÁLEZ-MANZANO L, ORFILA A. An Efficient Confidentiality-preserving Proof of Ownership for Deduplication[J]. Journal of Network and Computer Applications, 2015,50:49-59.
|
[9] |
YANG Chao, REN Jian, MA Jianfeng. Provable Ownership of Files in Deduplication Cloud Storage[J]. Security & Communication Networks, 2015,8(14):2457-2468.
|
[10] |
SHIN Y, KIM K. Differentially Private Client-side Data Deduplication Protocol for Cloud Storage Services[M]. Hoboken: John Wiley & Sons, 2015.
|
[11] |
CHEN Rongmao, MU Yi, YANG Guomin, et al. BL-MLE: Block-level Message-locked Encryption for Secure Large File Deduplication[J]. IEEE Transactions on Information Forensics & Security, 2015,10(12):2643-2652.
|
[12] |
DAEHEE K, SEJUN S, BAEK-YOUNG C. Data Deduplication for Data Optimization for Storage and Network Systems[M]. Berlin: Springer, 2017.
|
[13] |
B/T 37737-2019 Information Technology, Cloud Computing, Overall Technical Requirements for Distributed Block Storage Systems[S]. Beijing: Standard Press, 2019.
|
|
B/T 37737-2019 信息技术云计算分布式块存储系统总体技术要求[S].北京: 标准出版社, 2019.
|
[14] |
NG Wee Keong, WEN Yonggang, ZHU Huafei. Private Data Deduplication Protocols in Cloud Storage [C]//ACM. ACM Symposium on Applied Computing, March 26-30, 2012, Trento, Italy. New York: ACM, 2012: 441-446.
|
[15] |
XU Jia, CHANG E C, ZHOU Jianying. Weak Leakage-resilient Client-side Deduplication of Encrypted Data in Cloud Storage [C]//ACM. The 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, November 4-8, 2013, Berlin, Germany. New York: ACM, 2013: 195-206.
|