A survey of secure data deduplication schemes for cloud storage systems
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce
storage costs. Even though the general deduplication approach has been increasingly …
storage costs. Even though the general deduplication approach has been increasingly …
Secure deduplication with efficient and reliable convergent key management
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …
A hybrid cloud approach for secure authorized deduplication
Data deduplication is one of important data compression techniques for eliminating
duplicate copies of repeating data, and has been widely used in cloud storage to reduce the …
duplicate copies of repeating data, and has been widely used in cloud storage to reduce the …
A comprehensive study of the past, present, and future of data deduplication
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …
and popularity in large-scale storage systems due to the explosive growth of digital data. It …
Deduplication on encrypted big data in cloud
Cloud computing offers a new way of service provision by re-arranging various resources
over the Internet. The most important and popular cloud service is data storage. In order to …
over the Internet. The most important and popular cloud service is data storage. In order to …
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
Recently, Halevi et al.(CCS'11) proposed a cryptographic primitive called proofs of
ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof …
ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof …
Secure auditing and deduplicating data in cloud
As the cloud computing technology develops during the last decade, outsourcing data to
cloud service for storage becomes an attractive trend, which benefits in sparing efforts on …
cloud service for storage becomes an attractive trend, which benefits in sparing efforts on …
A secure data deduplication scheme for cloud storage
As more corporate and private users outsource their data to cloud storage providers, recent
data breach incidents make end-to-end encryption an increasingly prominent requirement …
data breach incidents make end-to-end encryption an increasingly prominent requirement …
Outsourced proofs of retrievability
Proofs of Retrievability (POR) are cryptographic proofs that enable a cloud provider to prove
that a user can retrieve his file in its entirety. POR need to be frequently executed by the user …
that a user can retrieve his file in its entirety. POR need to be frequently executed by the user …
Secure distributed deduplication systems with improved reliability
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. However …
widely used in cloud storage to reduce storage space and upload bandwidth. However …