[1] |
BARACALDO N , ANDROULAKI E , GLIDER J ,et al. Reconciling end-to-end confidentiality and data reduction in cloud storage[C]// Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security. 2014.
|
[2] |
熊金波, 李凤华, 王彦超 ,等. 基于密码学的云数据确定性删除研究进展[J]. 通信学报, 2016,37(8): 167-184.
|
|
XIONG J B , LI F H , WANG Y C ,et al. Research progress on cloud data assured deletion based on cryptography[J]. Journal on Communi cations, 2016,37(8): 167-184.
|
[3] |
HARNIK D , PINKAS B,SHULMAN-PELEG A . Side channels in cloud services,the case of deduplication in cloud storage[J]. IEEE Security and Privacy, 2010,8(6): 40-47.
|
[4] |
MULAZZANI M , SCHRITTWIESER S , LEITHNER M ,et al. Dark clouds on the horizon:using cloud storage as attack vector and online slack space[C]// USENIX Security Symposium. 2011.
|
[5] |
HALEVI S , HARNIK D , PINKAS B ,et al. Proofs of ownership in remote storage systems[C]// ACM Conference on Computer and Communications Security. 2011: 491-500.
|
[6] |
ROBERTO D P , ALESSANDRO S . Boosting efficiency and security in proof of ownership for deduplication[C]// ACM Symposium on Information,Computer and Communications Security. 2012: 81-82.
|
[7] |
PIETRO D , ROBERTO , SORNIOTTI A . Proof of ownership for deduplication systems:a secure,scalable,and efficient solution[J]. Computer Communications, 2016,82(2): 71-82.
|
[8] |
DOUCEUR J , BOLOSKY W THEIMER M . US Patent 7266689:encryption systems and methods for identifying and coalescing identical objects encrypted with different keys[P]. 2007.
|
[9] |
GONZáLEZ-MANZANO L , ORFILA A . An efficient confidentiality-preserving proof of ownership for deduplication[J]. Journal of Network and Computer Applications, 2015,50(1): 49-59.
|
[10] |
XU J , CHANG E C , ZHOU J Y . Weak leakage-resilient client-side deduplication of encrypted data in cloud storage[C]// The 8th ACM Symposium on Information,Computer and Communications Security. 2013: 195-206.
|
[11] |
TANG H Y , CUI Y , GUAN C W ,et al. Enabling ciphertext deduplication for secure cloud storage and access control[C]// The 11th ACM on Asia Conference on Computer and Communications Security. 2016: 59-70.
|
[12] |
BELLARE M , KEELVEEDHI S , RISTENPART T . Message-locked encryption and secure deduplication[C]// Advances in CryptologyCRYPTO 2013,Lecture Notes in Computer Science. 2013: 374-391.
|
[13] |
RASHID F , MIRI A , WOUNGANG I . Proof of retrieval and ownership protocols for enterprise-level data deduplication[C]// The 2013 Conference of the Center for Advanced Studies on Collaborative Research. 2013: 81-90.
|