[1] |
MEHMOOD A , NATGUNANATHAN I , XIANG Y ,et al. Protection of big data privacy[J]. IEEE Access, 2016,4: 1821-1834.
|
[2] |
冯登国, 张敏, 李昊 . 大数据安全与隐私保护[J]. 计算机学报, 2014,37(1): 246-258.
|
|
FENG D G , ZHANG M , LI H . Big data security and privacy protection[J]. Chinese Journal of Computers, 2014,37(1): 246-258.
|
[3] |
MAI J E . Big data privacy:the datafication of personal informa tion[J]. Information Society, 2016,32(3): 192-199.
|
[4] |
熊金波, 张媛媛, 李凤华 ,等. 云环境中数据安全去重研究进展[J]. 通信学报, 2016,37(11): 169-180.
|
|
XIONG J B , ZHANG Y Y , LI F H ,et al. Research progress on secure data deduplication in cloud[J]. Journal on Communications, 2016,37(11): 169-180.
|
[5] |
PAULO J , PEREIRA J . A survey and classification of storage deduplication systems[J]. ACM Computing Surveys (CSUR), 2014,47(1): 11.
|
[6] |
RUSSELL D . Data deduplication will be even bigger in 2010[J]. Gartner, 2010.
|
[7] |
SORIA-COMAS J , DOMINGO-FERRER J . Big data privacy:challenges to privacy principles and models[J]. Data Science and Engineering, 2016,1(1): 21-28.
|
[8] |
DOUCEUR J R , ADYA A , BOLOSKY W J ,et al. Reclaiming space from duplicate files in a serverless distributed file system[C]// The International Conference on Distributed Computing Systems. 2002: 617-624.
|
[9] |
LI M , QIN C , LEE P P C . CDStore:toward reliable,secure,and costefficient cloud storage via convergent dispersal[C]// 2015 USENIX Annual Technical Conference (USENIX ATC 15). 2015: 111-124.
|
[10] |
STANEK J , SORNIOTTI A , ANDROULAKI E ,et al. A secure data deduplication scheme for cloud storage[C]// Financial Cryptography and Data Security. 2014: 99-118.
|
[11] |
BELLARE M , KEELVEEDHI S , RISTENPART T . Message-locked encryption and secure deduplication[C]// Advances in Cryptology–EUROCRYPT. 2013: 296-312.
|
[12] |
KEELVEEDHI S , BELLARE M , RISTENPART T . DupLESS:server-aided encryption for deduplicated storage[C]// The 22nd USENIX Security Symposium. 2013: 179-194.
|
[13] |
HARNIK D , PINKAS B,SHULMAN-PELEG A . Side channels in cloud services:deduplication in cloud storage[J]. IEEE Security &Privacy, 2010,8(6): 40-47.
|
[14] |
LEE S , CHOI D . Privacy-preserving cross-user sourcebased data deduplication in cloud storage[C]// The International Conference on ICT Convergence. 2012: 329-330.
|
[15] |
OLIVIER , NEUMANN C , MONTALVO L ,et al. Improving the resistance to side-channel attacks on cloud storage services[C]// The International Conference on New Technologies,Mobility and Security (NTMS’12). 2012: 1-5.
|
[16] |
DWORK C . Differential privacy[J]. Lecture Notes in Computer Science, 2006,(2): 1-12.
|
[17] |
熊平, 朱天清, 王晓峰 . 差分隐私保护及其应用[J]. 计算机学报, 2014,37(1): 101-122.
|
|
XIONG P , ZHU T Q , WANG X F . A survey on differential privacy and applications[J]. Chinese Journal of Computers, 2014,37(1): 101-122.
|
[18] |
EBADI H , SANDS D , SCHNEIDER G . Differential privacy:now it's getting personal[J]. ACM Special Interest Group on Programming Languages, 2015,50(1): 69-81.
|
[19] |
GENG Q , KAIROUZ P , OH S ,et al. The staircase mechanism in differential privacy[J]. IEEE Journal of Selected Topics in Signal Processing, 2015,9(7): 1.
|