[1] |
DUTCH M , FREEMAN L . Understanding data de-duplication ra-tios[EB/OL]. . 2012.
|
[2] |
CNET. Who owns your files on google drive[EB/OL]. . 2013.
|
[3] |
Dropbox. Dropbox privacy policy[EB/OL]. . 2013.
|
[4] |
Google. Google terms of service[EB/OL]. . 2013.
|
[5] |
Apple Inc. Apple privacy policy (Covering iCloud)[EB/OL]. . 2013.
|
[6] |
Microsoft. Microsoft services agreement[EB/OL]. . 2013.
|
[7] |
Wired.com. Dropbox left user accounts unlocked for 4 hours sun-day[EB/OL]. . 2013.
|
[8] |
Twitter. Tweetdeck[EB/OL]. . 2013.
|
[9] |
DOUCEUR J R , ADYA A , BOLOSKY W J , et al. Reclaiming space from duplicate files in a serverless distributed file system[A]. Proc.of ICDCS'02[C]. 2002.617-624.
|
[10] |
SHAI H , DANNY H , BENNY P , et al. Proofs of ownership in remote storage systems[A]. Proc.of the 18th ACM conference on Computer and communications security (CCS'11)[C]. New York,USA, 2011.491-500.
|
[11] |
XU J , CHANG E C , ZHOU J Y . Leakage-Resilient Client-side Dedu-plication of Encrypted Data in Cloud Storage[A]. Cryptology ePrint Archive,Report 2011/538, 2011.
|
[12] |
Dropship. Dropbox api utilities[EB/OL]. . 2013.
|
[13] |
CHANG E C , XU J . Remote integrity check with dishonest storage server[A]. Proc.of ESORICS '08:European Symposium on Research in Computer Security:Computer Security[C]. Berlin,Heidelberg, 2008.223-237.
|
[14] |
敖莉, 舒继武, 李明强 . 重复数据删除技术[J]. 软件学报 2010,21(5): 916-929. AO L , SHU J W , LI M Q . Data deduplication techniques[J]. Journal of Software, 2010,21(5): 916-929.
|
[15] |
王灿, 秦志光, 冯朝胜 , 等. 面向重复数据消除的备份数据加密方法[J]. 计算机应用 2010,30(7): 1763-1766,1781. WANG C , QIN Z G , FENG C S , et al. Deduplication-oriented backup-data encryption method[J]. Journal of Computer Applications, 2010,30(7): 1763-1766,1781.
|
[16] |
ANDERSON P , ZHANG L . Fast and secure laptop backups with en-crypted de-duplication[A]. Proc.of the 24th International Conference on Large Installation System Administration (LISA'10)[C]. 2010.29-40.
|
[17] |
MARK W S , KEVIN G , DARRELL D E , et al. Secure data deduplica-tion[A]. Proc.of the 4th ACM International Workshop on Storage se-curity and survivability[C]. New York,USA, 2008.1-10.
|
[18] |
王珂, 刘川意, 王春露 . 基于代理重加密的安全重复数据删除机制的研究[EB/OL]. . 2013. WANG K , LIU C Y , WANG C L . Research on secure de-duplication based on proxy-reencryption[EB/OL]. . 2013.
|
[19] |
LIU C Y , LIU X J , WAN L . Policy-based de-duplication in secure cloud storage[J]. Trustworthy Computing and Services Communica-tions in Computer and Information Science, 2013,320:250-262.
|
[20] |
KEONG N W , WEN Y G , ZHU H F . Private data deduplication proto-cols in cloud storage[A]. Proc.of the 27th Annual ACM Symposium on Applied Computing (SAC'12)[C]. New York,USA, 2012.441-446.
|
[21] |
DANNY H , BENNY P , ALEXANDRA S P . Side channels in cloud ser-vices – the case of deduplication in cloud storage[J]. IEEE Security and Privacy Magazine,special issue of Cloud Security, 2010,8(6): 40-47.
|
[22] |
TAN Y J , JIANG H , FENG D , et al. SAM:a semantic-aware multi-tiered source de-duplication framework for cloud backup[A]. 2010 39th International Conference on Parallel Processing[C]. San Diego,CA, 2010.614-623.
|
[23] |
ROBERTO D P , ALESSANDRO S . Boosting efficiency and security in proof of ownership for deduplication[A]. Proc.of the 7th ACM Symposium on Information,Computer and Communications Security (ASIACCS'12)[C]. New York,USA, 2012.81-90.
|
[24] |
JO?O B , LUíS V , PAULO F . Hash challenges:stretching the limits of compare-by-hash in distributed data deduplication[J]. Information Processing Letters, 2012,112:380-385.
|
[25] |
王丽娜, 任正伟, 余荣威 , 等. 一种适于云存储的数据确定性删除方法[J]. 电子学报 2012,40(2): 266-272. WANG L N , REN Z W , YU R W , et al. A data assured deletion ap-proach adapted for cloud storage[J]. Acta Electronica Sinica, 2012,40(2): 266-272.
|
[26] |
ATENIESE G , BURNS R , CURTMOLA R , et al. Provable data pos-session at untrusted stores[A]. Proc of ACM-CCS'07[C]. Alexandria,Virginia,USA, 2007.598-609.
|