共 35 条
- [1] Liu J., Asokan N., Pinkas B., Secure deduplication of encrypted data without additional independent servers, Proc. of the 22nd ACM SIGSAC Conf. on Computer and Communications Security, pp. 874-885, (2015)
- [2] Bellare M., Keelveedhi S., Ristenpart T., DupLESS: Server-aided encryption for deduplicated storage, Proc. of the Usenix Conf. on Security, pp. 179-194, (2013)
- [3] Zhang S.G., Xian H.Q., Wang Y.Z., Liu H.Y., Hou R.T., Secure encrypted data deduplication method based on offline key distribution, Ruan Jian Xue Bao/Jornal of Software, 29, 7, pp. 1909-1921, (2018)
- [4] Meyer D.T., Bolosky W.J., A study of practical deduplication, ACM Trans. on Storage (TOS), 7, 4, pp. 1-20, (2012)
- [5] Baracaldo N., Androulaki E., Glider J., Sorniotti A., Reconciling end-to-end confidentiality and data reduction in cloud storage, Proc. of the 6th Edition of the ACM Workshop on Cloud Computing Security, pp. 21-32, (2014)
- [6] Storer M.W., Greenan K., Long D.D.E., Miller E.L., Secure data deduplication, Proc. of the 4th ACM Int'l Workshop on Storage Security and Survivability, pp. 1-10, (2008)
- [7] Koo D., Hur J., Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing, Future Generation Computer Systems, 78, 2, pp. 739-752, (2018)
- [8] Liu J.F., Wang J.F., Tao X.L., Jian S., Secure similarity-based cloud data deduplication in Ubiquitous city, Pervasive and Mobile Computing, 41, pp. 231-242, (2017)
- [9] Fu Y.X., Luo S.M., Shu J.W., Survey of secure cloud storage system and key technologies, Journal of Computer Research and Development, 50, 1, pp. 136-145, (2013)
- [10] Xu J., Chang E.C., Zhou J.Y., Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, Proc. of the 8th ACM SIGSAC Symp. on Information, Computer and Communications Security, pp. 195-206, (2013)