Data security and privacy protection for cloud storage: A survey

P Yang, N **ong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

A survey of secure data deduplication schemes for cloud storage systems

Y Shin, D Koo, J Hur - ACM computing surveys (CSUR), 2017 - dl.acm.org
Data deduplication has attracted many cloud service providers (CSPs) as a way to reduce
storage costs. Even though the general deduplication approach has been increasingly …

Proofs of ownership in remote storage systems

S Halevi, D Harnik, B Pinkas… - Proceedings of the 18th …, 2011 - dl.acm.org
Cloud storage systems are becoming increasingly popular. A promising technology that
keeps their cost down is deduplication, which stores only a single copy of repeating data …

The moral character of cryptographic work

P Rogaway - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Cryptography rearranges power: it configures who can do what, from what. This makes
cryptography an inherently\textit {political} tool, and it confers on the field an intrinsically\textit …

Leakage-resilient cryptography

S Dziembowski, K Pietrzak - 2008 49th Annual IEEE …, 2008 - ieeexplore.ieee.org
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …

Public-key cryptosystems resilient to key leakage

M Naor, G Segev - Advances in Cryptology-CRYPTO 2009: 29th Annual …, 2009 - Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …

Leakage-resilient public-key cryptography in the bounded-retrieval model

J Alwen, Y Dodis, D Wichs - Advances in Cryptology-CRYPTO 2009: 29th …, 2009 - Springer
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …

Cryptography against continuous memory attacks

Y Dodis, K Haralambiev, A López-Alt… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …

A leakage-resilient mode of operation

K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …

Public-key encryption in the bounded-retrieval model

J Alwen, Y Dodis, M Naor, G Segev, S Walfish… - Advances in Cryptology …, 2010 - Springer
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM),
providing security against various forms of adversarial “key leakage” attacks. In this model …