Secure Authorized Deduplication with Data Mining in Cloud
Abstract
Full Text:
PDFReferences
M. Bellare, S. Keelveedhi, T. Ristenpart. “DupLESS: Server aided encryption for deduplicated storage,” In: Proc. 22nd USENIX Conf. Secur. 2013, 179–94p.
J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system, In: Proc. IEEE Int. Conf. Distrib. Comput. Syst. 2002, 617–24p. doi:10.1109/ICDCS.2002.1022312.
G. Wallace, et al. Characteristics of backup workloads in production systems, In: Proc USENIX Conf File Storage Technol. 2012, 1–16p.
Z.O. Wilcox. “Convergent encryption reconsidered,” 2011. [Online]. Available: http://www.mailarchive.com/cryptography @ metzdowd.com/msg08949.html.
G. Ateniese, K. Fu, M. Green, S. Hohenberger. Improved proxy re- encryption schemes with applications to secure distributed storage, ACM Trans Inform Syst Secur. 2006; 9(1): 1–30p. doi:10.1145/1127345.1127346.
Opendedup. (2016). [Online]. Available: http://opendedup.org/.
D.T. Meyer, W.J. Bolosky. A study of practical deduplication, ACM Trans Storage. 2012; 7(4): 1–20p. doi:10.1145/2078861.2078864.
M. Bellare, S. Keelveedhi, T. Ristenpart. Message-locked encryption and secure deduplication, In: Proc Cryptol – Eurocrypt. 2013; [8] 296–312p. doi:10.1007/978-3-642-38348-9_18.
D. Perttula, B. Warner, Z. Wilcox- O’Hearn. “Attacks on convergent encryption.” (2016). [Online]. Available: http://bit.ly/ yQxyvl.
C.Y. Liu, X.J. Liu, L. Wan. “Policy-based deduplication in secure cloud storage, In: Proc Trustworthy Comput Serv. 2013; 250–62p. doi:10.1007/978-3-642-35795-4_32.
P. Puzio, R. Molva, M. Onen, S. Loureiro. “ClouDedup: secure deduplication with encrypted data for cloud storage, Proc IEEE Int Conf Cloud Comput Technol Sci. 2013; 363–70p. doi:10.1109/CloudCom.2013.54.
Z. Sun, J. Shen, J.M. Yong. “DeDu: building a deduplication storage system over cloud computing, Proc IEEE Int Conf Comput Support Cooperat Work Des. 2011 ; 348–55p, doi:10.1109/CSCWD.2011.5960097.
Z.C. Wen, J.M. Luo, H.J. Chen, J.X. Meng, X. Li, J. Li. A verifiable data deduplication scheme in cloud computing, Proc Int Conf Intel Netw Collaborative Syst. 2014; 85–90p. doi:10.1109/INCoS.2014.111.
J. Li, Y.K. Li, X.F. Chen, P.P.C. Lee, W.J. Lou. A hybrid cloud approach for secure authorized deduplication, IEEE Trans Parallel Distrib Syst. 2015; 26(5): 1206–16p. doi:10.1109/TPDS.2014.2318320.
P. Meye, P. Raipin, F. Tronel, E. Anceaume. A secure two phase data deduplication scheme, Proc HPCC/CSS/ICESS. 2014; 802–9p. doi:10.1109/HPCC.2014.134.
J. Paulo, J. Pereira. A survey and classification of storage deduplication systems, ACM Comput Surveys. 2014; 47(1): 1–30p. doi:10.1109/HPCC.2014.134.
Y.-K. Li, M. Xu, C.-H. Ng, P.P.C. Lee. Efficient hybrid inline and out-of-line deduplication for backup storage, ACM Trans Storage. 2014; 11(1): 2:1–21p. doi:10.1145/2641572.
M. Fu, et al. Accelerating restore and garbage collection in deduplication- based backup systems via exploiting historical information, Proc USENIX Annu Tech Conf. 2014; 181–92p.
M. Kaczmarczyk, M. Barczynski, W. Kilian, C. Dubnicki. Reducing impact of data fragmentation caused by in-line deduplication, In: Proc. 5th Annu. Int. Syst. Storage Conf. 2012; 15:1–12p. doi:10.1145/2367589.2367600.
M. Lillibridge, K. Eshghi, D. Bhagwat. Improving restore speed for backup systems that use inline chunk-based deduplication, In: Proc. USENIX Conf. File Storage Technol. 2013, 183–98p.
L.J. Gao. Game theoretic analysis on acceptance of a cloud data access control scheme based on reputation, M.S. Thesis. Xidian University, State Key Lab of ISN, School of Telecommunications Engineering, Xi’an, China, 2015.
DOI: https://doi.org/10.37628/ijocspl.v3i1.260
Refbacks
- There are currently no refbacks.