[1] |
GAI K K , QIU M K . Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers[J]. IEEE Transactions on Industrial Informatics, 2017,14(8): 3590-3598.
|
[2] |
LIU J , ASOKAN N , PINKAS B . Secure deduplication of encrypted data without additional independent servers[C]// Proceedings of the 22nd ACM Conference on Computer and Communications Security. New York:ACM Press, 2015: 874-855.
|
[3] |
YAN Z , DING W X , YU X X ,et al. Deduplication on encrypted big data in cloud[J]. IEEE Transactions on Big Data, 2016,2(2): 138-150.
|
[4] |
BELLARE M , KEELVEEDHI S , RISTENPART T . DepLess:server-aided encryption for deduplicated storage[C]// Proceedings of the 22nd USENIX Security Symposium. Berkeley:USENIX Association, 2013: 179-194.
|
[5] |
KWON H , HAHN C , KOO D Y ,et al. Scalable and reliable key management for secure deduplication in cloud storage[C]// Proceedings of IEEE the 10th International Conference on Cloud Computing. Piscataway:IEEE Press, 2017: 391-398.
|
[6] |
DUAN Y , . Distributed key generation for encrypted deduplication:achieving the strongest privacy[C]// Proceedings of the 21st ACM Conference on Computer and Communications Security Workshop. New York:ACM Press, 2014: 57-68.
|
[7] |
YU C M , . Poster:efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions[C]// Proceedings of the 23rd ACM Conference on Computer and Communications Security. New York:ACM Press, 2016: 1763-1765.
|
[8] |
ZUO P F , HUA Y , WANG C ,et al. Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage[C]// Proceedings of the 32nd IEEE International Parallel & Distributed Processing Symposium. Piscataway:IEEE Press, 2018: 1153-1162.
|
[9] |
POORANIAN Z , CHEN K C , YU C M ,et al. RARE:defeating side channels based on data-deduplication in cloud storage[C]// Proceedings of the 37th IEEE International Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2018: 444-449.
|
[10] |
YU C M , GOCHHAYAT S P , CONTI M ,et al. Privacy aware data deduplication for side channel in cloud storage[J]. IEEE Transactions on Cloud Computing, 2018,doi:10.1109/TCC.2018.2794542.
|
[11] |
HARNIK D , PINKAS B , SHULMAN-PELEG A . Side channels in cloud services:deduplication in cloud storage[J]. IEEE Security &Privacy, 2010,8(6): 40-47.
|
[12] |
STANEK J , KENCL L . Enhanced secure thresholded data deduplication scheme for cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(4): 694-707.
|
[13] |
ZHANG Y , MAO Y L , XU M Z ,et al. Towards thwarting template side-channel attacks in secure cloud deduplications[J]. IEEE Transactions on Dependable and Secure Computing, 2019,doi:10.1109/TDSC.2019.2911502.
|
[14] |
STANEK J , SORNIOTTI A , ANDROULAKI E ,et al. A secure data deduplication scheme for cloud storage[C]// Proceedings of the 18th International Conference on Financial Cryptography and Data Security.S.n.:s.l. , 2014: 99-118.
|
[15] |
ARMKNECHT F , BOYD C , DAVIES G T ,et al. Side channels in deduplication:Trade-offs between leakage and efficiency[C]// Proceedings of the 12nd ACM Asia Conference on Computer and Communications Security. New York:ACM Press, 2017: 266-274.
|
[16] |
BELLARE M , KEELVEEDHI S , RISTENPART T . DepLESS:server-aided encryption for deduplicated storage[C]// Proceedings of the 22nd USENIX Security Symposium. Berkeley:USENIX Association, 2013: 179-194.
|
[17] |
LIU X F , SUN W H , LOU W J ,et al. One-tag checker:message-locked integrity auditing on encrypted cloud deduplication storage[C]// Proceedings of the 36th IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2017: 1-9.
|
[18] |
TANG X , ZHOU L N , HUANG Y F ,et al. Efficient cross-user deduplication of encrypted data through re-encryption[C]// Proceedings of the 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications. Piscataway:IEEE Press, 2018: 897-904.
|
[19] |
DANG H , CHANG E C . Privacy-preserving data deduplication on trusted processors[C]// Proceedings of IEEE the 10th International Conference on Cloud Computing. Piscataway:IEEE Press, 2017: 66-73.
|
[20] |
ZHANG K , LIANG X H , LU R X ,et al. Sybil attacks and their defenses in the Internet of Things[J]. IEEE Internet of Things Journal, 2014,1(5): 372-383.
|
[21] |
DOUCEUR J , ADYA A , BOLOSKY W ,et al. Reclaiming space from duplicate files in a server-less distributed file system[C]// Proceedings of the 22nd International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2002: 617-624.
|
[22] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[23] |
ATENIESE G , HOHENBERGER , . Proxy re-signatures:new definitions,algorithms,and applications[C]// Proceedings of the 22nd ACM Conference on Computer and Communications Security. New York:ACM Press, 2015: 310-319.
|