[1] |
熊金波, 张媛媛, 李凤华 ,等. 云环境中数据安全去重研究进展[J]. 通信学报, 2016,37(11): 169-180.
|
|
XIONG J B , ZHANG Y Y , LI F H ,et al. Research progress on secure data deduplication in cloud[J]. Journal on Communications, 2016,37(11): 169-180.
|
[2] |
DOUCEUR J , ADYA A , BOLOSKY W ,et al. Reclaiming space from duplicate files in a serverless distributed file system[C]// 22nd International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2002: 617-624.
|
[3] |
BELLARE M , KEELVEEDHI S , RISTENPART T . DupLESS:server-aided encryption for deduplicated storage[C]// 22nd USENIX Security Symposium. Berkeley:USENIX Association, 2013: 179-194.
|
[4] |
BELLARE M , KEELVEEDHI S , RISTENPART T . Message-locked encryption and secure deduplication[M]. Berlin: SpringerPress, 2013: 296-312.
|
[5] |
LI J , QIN C , LEE P ,et al. Information leakage in encrypted deduplication via frequency analysis[C]// 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Piscataway:IEEE Press, 2017: 2110-2118.
|
[6] |
HARNIK D , PINKAS B , SHULMAN-PELEG A . Side channels in cloud services:deduplication in cloud storage[J]. IEEE Security &Privacy, 2010,8(6): 40-47.
|
[7] |
HALEVI S , HARNIK D , PINKAS B ,et al. Proofs of ownership in remote storage systems[C]// The 18th ACM conference on Computer and Communications Security (CCS 2011). New York:ACM Press, 2011: 491-500.
|
[8] |
LI M , QIN C , LEE P . CDStore:toward reliable,secure,and cost-efficient cloud storage via convergent dispersal[C]// USENIX Annual Technical Conference. Berkeley:USENIX Association, 2015: 111-124.
|
[9] |
SHIN Y , KIM K . Differentially private client-side data deduplication protocol for cloud storage services[J]. Security and Communication Networks, 2015,8(12): 2114-2123.
|
[10] |
XU J , CHANG E C , ZHOU J . Weak leakage-resilient client-side deduplication of encrypted data in cloud storage[C]// 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. New York:ACM Press, 2013: 195-206.
|
[11] |
LI J , LI Y K , CHEN X ,et al. A hybrid cloud approach for secure authorized deduplication[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(5): 1206-1216.
|
[12] |
QIN C , LI J , LEE P . The design and implementation of a rekeying-aware encrypted deduplication storage system[J]. ACM Transactions on Storage, 2017,13(1): 1-30.
|
[13] |
SQUICCIARINI A , PETRACCA G , BERTINO E . Adaptive data protection in distributed systems[C]// Third ACM Conference on Data and Application Security and Privacy. New York:ACM Press, 2013: 365-376.
|
[14] |
THILAKANATHAN D , CALVO R , CHEN S ,et al. Secure and controlled sharing of data in distributed computing[C]// Proceedings of the 16th IEEE International Conference on Computational Science and Engineering. Piscataway:IEEE Press, 2013: 825-832.
|
[15] |
ZAFAR F , KHAN A , MALIK S U R ,et al. A survey of cloud computing data integrity schemes:design challenges,taxonomy and future trends[J]. Computers & Security, 2017(65): 29-49.
|
[16] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// 2007 IEEE Symposium on Security and Privacy (S&P 2007). Piscataway:IEEE Press, 2007: 321-334.
|
[17] |
GAMAL T E . A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472.
|
[18] |
林婷婷, 来学嘉 . 白盒密码研究[J]. 密码学报, 2015,2(3): 258-267.
|
|
LIN T T , LAI X J . Research on white-box cryptography[J]. Journal of Cryptologic Research, 2015,2(3): 258-267.
|
[19] |
王鹃, 樊成阳, 程越强 ,等. SGX 技术的分析和研究[J]. 软件学报, 2018,29(9): 2778-2798.
|
|
WANG J , FAN C Y , CHENG Y Q ,et al. Analysis and research on SGX technology[J]. Journal of Software, 2018,29(9): 2778-2798.
|
[20] |
杨超, 张俊伟, 董学文 ,等. 云存储加密数据去重删除所有权证明方法[J]. 计算机研究与发展, 2015,52(1): 248-258.
|
|
YANG C , ZHANG J W , DONG X W ,et al. Proving method of ownership of encrypted files in cloud de-duplication deletion[J]. Journal of Computer Research and Development, 2015,52(1): 248-258.
|