The verifiable secure schemes for resisting attacks in cloud deduplication services
暂无分享,去创建一个
[1] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[2] Jon B. Weissman,et al. ViDeDup: An Application-Aware Framework for Video De-duplication , 2011, HotStorage.
[3] Jianfeng Ma,et al. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.
[4] Kai Li,et al. Avoiding the Disk Bottleneck in the Data Domain Deduplication File System , 2008, FAST.
[5] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[6] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] André Brinkmann,et al. Multi-level comparison of data deduplication in a backup scenario , 2009, SYSTOR '09.
[9] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[10] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[11] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[12] Michael Vrable,et al. Cumulus: Filesystem backup to the cloud , 2009, TOS.
[13] Benny Pinkas,et al. Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .