A survey of secure data deduplication schemes for cloud storage systems

Y Shin, D Koo, J Hur - ACM computing surveys (CSUR), 2017 - dl.acm.org
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce
storage costs. Even though the general deduplication approach has been increasingly …

Secure deduplication with efficient and reliable convergent key management

J Li, X Chen, M Li, J Li, PPC Lee… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it …

A hybrid cloud approach for secure authorized deduplication

J Li, YK Li, X Chen, PPC Lee… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Data deduplication is one of important data compression techniques for eliminating
duplicate copies of repeating data, and has been widely used in cloud storage to reduce the …

A comprehensive study of the past, present, and future of data deduplication

W **a, H Jiang, D Feng, F Douglis… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …

Deduplication on encrypted big data in cloud

Z Yan, W Ding, X Yu, H Zhu… - IEEE transactions on big …, 2016 - ieeexplore.ieee.org
Cloud computing offers a new way of service provision by re-arranging various resources
over the Internet. The most important and popular cloud service is data storage. In order to …

Weak leakage-resilient client-side deduplication of encrypted data in cloud storage

J Xu, EC Chang, J Zhou - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Recently, Halevi et al.(CCS'11) proposed a cryptographic primitive called proofs of
ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof …

Secure auditing and deduplicating data in cloud

J Li, J Li, D **e, Z Cai - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
As the cloud computing technology develops during the last decade, outsourcing data to
cloud service for storage becomes an attractive trend, which benefits in sparing efforts on …

A secure data deduplication scheme for cloud storage

J Stanek, A Sorniotti, E Androulaki, L Kencl - Financial Cryptography and …, 2014 - Springer
As more corporate and private users outsource their data to cloud storage providers, recent
data breach incidents make end-to-end encryption an increasingly prominent requirement …

Outsourced proofs of retrievability

F Armknecht, JM Bohli, GO Karame, Z Liu… - Proceedings of the 2014 …, 2014 - dl.acm.org
Proofs of Retrievability (POR) are cryptographic proofs that enable a cloud provider to prove
that a user can retrieve his file in its entirety. POR need to be frequently executed by the user …

Secure distributed deduplication systems with improved reliability

J Li, X Chen, X Huang, S Tang, Y **ang… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Data deduplication is a technique for eliminating duplicate copies of data, and has been
widely used in cloud storage to reduce storage space and upload bandwidth. However …