A Technique for Secure Data Deduplication in Cloud Storage
Abstract
Full Text:
PDFReferences
Open Security Foundation: DataLossDB (http://datalossdb.org/).
Meister, D., Brinkmann, A.: Multi-level comparison of data deduplication in a backup scenario. In: SYSTOR '09, New York, NY, USA, ACM (2009) 8:1{8:12 Mandagere, N., Zhou, P., Smith, M.A., Uttamchandani, S.: Demystifying data deduplication. In: Middleware '08, New York, NY, USA, ACM (2008)
H. Miranda and L. Rodrigues, “Preventing Selfishness in Open Mobile Ad Hoc Networks,” Proc. Seventh CaberNet Radicals Workshop, 2002.
Aronovich, L., Asher, R., Bachmat, E., Bitner, H., Hirsch, M., Klein, S.T.: The design of a similarity based deduplication system. In: SYSTOR '09. (2009) 6:1{6:14
Dutch, M., Freeman, L.: Understanding data de-duplication ratios. SNIA forum (2008) ttp://www.snia.org/sites/default/files/Understanding_Data_Deduplication_Ratios-20080718.pdf.
Harnik, D., Margalit, O., Naor, D., Sotnikov, D., Vernik, G.: Estimation of deduplication ratios in large data sets. In: IEEE MSST '12. (april 2012)
Harnik, D., Margalit, O., Naor, D., Sotnikov, D., Vernik, G.: Estimation of deduplication ratios in large data sets. In: IEEE MSST '12. (april 2012) 1 -11
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. Security Privacy, IEEE 8(6) (nov.-dec. 2010) 40 -47
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: CCS '11, New York, NY, USA, ACM (2011) 491-500
Di Pietro, R., Sorniotti, A.: Boosting e_ciency and security in proof of ownership for deduplication. In: ASIACCS '12, New York, NY, USA, ACM (2012) 81-82
Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate _les in a serverless distributed _le system. In: ICDCS '02, Washington, DC, USA, IEEE Computer Society (2002) 617-632
Storer, M.W., Greenan, K., Long, D.D., Miller, E.L.: Secure data deduplication.
In: StorageSS '08, New York, NY, USA, ACM (2008) 1{10
12. Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and securededuplication. In: Advances in Cryptology{EUROCRYPT 2013. Springer 296{312
Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: 8th ACM SIGSAC symposium. 195{206
Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: 22nd USENIX conference on Security. (2013) 179{194
Douceur, J.R.: The sybil attack. In: Peer-to-peer Systems. Springer (2002) 251{260
Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. (1984)
Fahl, S., Harbach, M., Muders, T., Smith, M.: Condentiality as a service{usable security for the cloud. In: TrustCom 2012. 153{162
Fahl, S., Harbach, M., Muders, T., Smith, M., Sander, U.: Helping johnny 2.0 to encrypt his facebook conversations. In: SOUPS 2012. 11{28
Ateniese, G., Blanton, M., Kirsch, J.: Secret handshakes with dynamic and fuzzy matching. In: NDSS '07
A. Pelc. Detecting errors in searching games. Journal of Combinatorial Theory Series A, 51(1):43–54, 1989.
DOI: https://doi.org/10.23956/ijarcsse.v7i12.513
Refbacks
- There are currently no refbacks.