[1] |
XIA W , JIANG H , FENG D ,et al. A comprehensive study of the past,present,and future of data deduplication[J]. Proceedings of the IEEE, 2016,104(9): 1681-1710.
|
[2] |
XIONG J B , ZHANG Y Y , LI F H ,et al. Research progress on secure data deduplication in cloud[J]. Journal on Communications, 2016,37(11): 169-180.
|
[3] |
LIU J , ASOKAN N , PINKAS B . Secure deduplication of encrypted data without additional independent servers[C]// ACM SIGSAC Conference on Computer and Communications Security. 2015: 874-885.
|
[4] |
XIONG J , ZHANG Y , LI X ,et al. RSE-PoW:a role symmetric encryption PoW scheme with authorized deduplication for multimedia data[J]. Mobile Networks and Applications, 2017: 1-14.
|
[5] |
DOUCEUR J , ADYA A , BOLOSKY W ,et al. Reclaiming space from duplicate files in a serverless distributed file system[C]// International Conference on Distributed Computing Systems. 2002: 617-624.
|
[6] |
PUZIO P , MOLVA R , ONEN M ,et al. ClouDedup:secure deduplication with encrypted data for cloud storage[C]// 5th International Conference on Cloud Computing Technology and Science (CloudCom). 2013: 363-370.
|
[7] |
LI M , QIN C , LI J ,et al. CDStore:toward reliable,secure,and cost-efficient cloud storage via convergent dispersal[J]. IEEE Internet Computing, 2016,20(3): 45-53.
|
[8] |
STANEK J , SORNIOTTI A , ANDROULAKI E ,et al. A secure data deduplication scheme for cloud storage[C]// International Conference on Financial Cryptography and Data Security,Springer Berlin Heidelberg,2014, 8437: 99-118.
|
[9] |
BELLARE M , KEELVEEDHI S , RISTENPART T . Message-locked encryption and secure deduplication[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer Berlin Heidelberg,2013, 7881: 296-312.
|
[10] |
CHEN R , MU Y , YANG G ,et al. Bl-MLE:block-level messagelocked encryption for secure large file deduplication[J]. IEEE Transactions on Information Forensics and Security, 2015,10(12): 2643-2652.
|
[11] |
JIANG T , CHEN X , WU Q ,et al. Secure and efficient cloud data deduplication with randomized tag[J]. IEEE Transactions on Information Forensics and Security, 2017,12(3): 532-543.
|
[12] |
LI J , QIN C , LEE P P C ,et al. Rekeying for encrypted deduplication storage[C]// 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2016: 618-629.
|
[13] |
QIN C , LI J , LEE P P C . The design and implementation of a rekeying-aware encrypted deduplication storage system[J]. ACM Transactions on Storage (TOS), 2017,13(1):9.
|
[14] |
PUZIO P , MOLVA R , ?NEN M , ,et al. PerfectDedup:secure data deduplication[C]// International Workshop on Data Privacy Management. Springer International Publishing, 2015: 150-166.
|
[15] |
BELLARE M , KEELVEEDHI S . Interactive message-locked encryption and secure deduplication[C]// IACR International Workshop on Public Key Cryptography. Springer Berlin Heidelberg,2013, 7881: 296-312.
|
[16] |
LI J , CHEN X F , LI M Q ,et al. Secure deduplication with efficient and reliable convergent key management[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(6): 1615-1625.
|
[17] |
MIAO M , WANG J , LI H ,et al. Secure multi-server-aided data deduplication in cloud computing[J]. Pervasive and Mobile Computing, 2015,24: 129-137.
|
[18] |
HALEVI S , HARNIK D , PINKAS B ,et al. Proofs of ownership in remote storage systems[C]// 18th ACM conference on Computer and Communications Security,ACM, 2011: 491-500.
|
[19] |
DI PIETRO R , SORNIOTTI A . Boosting efficiency and security in proof of ownership for deduplication[C]// 7th ACM Symposium on Information,Computer and Communications Security. ACM, 2012: 81-82.
|
[20] |
DI PIETRO R , SORNIOTTI A . Proof of ownership for deduplication systems:a secure,scalable,and efficient solution[J]. Computer Communications, 2016,82: 71-82.
|
[21] |
BLASCO J , ROBERTO D P , ALEJANDRO O ,et al. A tunable proof of ownership scheme for deduplication using bloom filters[C]// IEEE Conference on Communications and Network Security (CNS). 2014: 481-489.
|
[22] |
GONZáLEZ-MANZANO L , AGUSTIN O . An efficient confidentiality-preserving proof of ownership for deduplication[J]. Journal of Network and Computer Applications, 2015,50: 49-59.
|
[23] |
LI J , LI Y K , CHEN X ,et al. A hybrid cloud approach for secure authorized deduplication[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(5): 1206-1216.
|
[24] |
GONZáLEZ-MANZANO L , FUENTES J M D , CHOO K K R . ase-POW:a proof of ownership mechanism for cloud deduplication in hierarchical environments[C]// 12th EAI International Conference on Security and Privacy in Communication Networks. 2016: 412-428.
|
[25] |
ZHANG Y , XIONG J , REN J ,et al. A novel role symmetric encryption algorithm for authorized deduplication in cloud[C]// 10th EAI International Conference on Mobile Multimedia Communications (EAI MOBIMEDIA). 2017: 104-110.
|
[26] |
王宏远, 祝烈煌, 李龙一佳 . 云存储中支持数据去重的群组数据持有性证明[J]. 软件学报, 2016,27(6): 1417-1431.
|
|
WANG H Y , ZHU L H , LI L Y J . Group provable data possession with deduplication in cloud storage[J]. Journal of Software, 2016,27(6): 1417-1431.
|
[27] |
SANTIS A D , FERRARA A L , MASUCCI B . Efficient provably-secure hierarchical key assignment schemes[J]. Theoretical Computer Science, 2011,412(41): 5684-5699.
|
[28] |
ATALLAH M , BLANTON M , FAZIO N ,et al. Dynamic and efficient key management for access hierarchies[J]. ACM Transactions on Information and System Security (TISSEC), 2009,12(3): 1-43.
|
[29] |
马骏, 郭渊博, 马建峰 ,等. 物联网感知层一种分层访问控制方案[J]. 计算机研究与发展, 2013,50(6): 1267-1275.
|
|
MA J , GUO Y B , MA J F ,et al. A hierarchical access control scheme for perceptual layer of IoT[J]. Journal of Computer Research and Development, 2013,50(6): 1267-1275.
|
[30] |
宋建业, 何暖, 朱一明 ,等. 基于阿里云平台的密文数据安全去重系统的设计与实现[J]. 信息网络安全, 2017(3): 39-45.
|
|
SONG J Y , HE N , ZHU Y M ,et al. Design and implementation of secure deduplication system for ciphertext data based on Aliyun[J]. Netinfo Security, 2017(3): 39-45.
|