BL-MLE: Block-level message-locked encryption for secure large file deduplication

R Chen, Y Mu, G Yang, F Guo - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Deduplication is a popular technique widely used to save storage spaces in the cloud. To
achieve secure deduplication of encrypted files, Bellare et al. formalized a new …

A cloud data deduplication scheme based on certificateless proxy re-encryption

X Zheng, Y Zhou, Y Ye, F Li - Journal of Systems Architecture, 2020 - Elsevier
Cloud data deduplication removes redundant data blocks or files and keeps only one copy
in the cloud storage server. In order to improve on security, we need to encrypt data files and …

CPDA: A confidentiality-preserving deduplication cloud storage with public cloud auditing

J Wu, Y Li, T Wang, Y Ding - IEEE Access, 2019 - ieeexplore.ieee.org
With growing popularity of cloud storage, the number of users of outsourcing data to cloud
servers has increased dramatically. On the one hand, the rapidly increasing volume of data …

An efficient confidentiality-preserving proof of ownership for deduplication

L González-Manzano, A Orfila - Journal of Network and Computer …, 2015 - Elsevier
Data storage in the cloud is becoming widespread. Deduplication is a key mechanism to
decrease the operating costs cloud providers face, due to the reduction of replicated data …

Updatable block-level message-locked encryption

Y Zhao, SSM Chow - Proceedings of the 2017 ACM on Asia Conference …, 2017 - dl.acm.org
Deduplication is a widely used technique for reducing storage space of cloud service
providers. Yet, it is unclear how to support deduplication of encrypted data securely until the …

Secure encrypted data with authorized deduplication in cloud

J **ong, Y Zhang, S Tang, X Liu, Z Yao - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based
on convergent encryption and the role re-encryption algorithm to prevent the privacy data …

[PDF][PDF] Filter based data deduplication in cloud storage using dynamic perfect hash functions

BT Reddy, MVPCS Rao - International Journal of Simulation …, 2018 - researchgate.net
Cloud storage offers cost effective storage to the users dynamically. Corporate and private
users upload their sensitive data items to the cloud storage. But mostly the data stored in the …

[PDF][PDF] 云环境中数据安全去重研究进展

熊金波, 张媛媛, **凤华, **素萍, 任君, 姚志** - 通信学报, 2016 - infocomm-journal.com
为了提高云存储效率和节约网络通信带宽, 需要对云端同一数据的多个副本执行重复性检测与去
重操作, 而云环境下的密文数据阻碍了数据安全去重的实施, 这一问题迅速引起学术界和产业界 …

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities

C Yang, M Zhang, Q Jiang, J Zhang, D Li, J Ma… - Pervasive and Mobile …, 2017 - Elsevier
As typical applications in the field of the cloud computing, cloud storage services are popular
in the development of smart cities for their low costs and huge storage capacity. Proofs-of …

Big data storage security

M Wen, S Yu, J Li, H Li, K Lu - Big Data Concepts, Theories, and …, 2016 - Springer
The demand for data storage and processing is increasing at a rapid speed in the big data
era. The management of such tremendous volume of data is a critical challenge to the data …