2014 IEEE Conference on Communications and Network Security 2014
DOI: 10.1109/cns.2014.6997518
|View full text |Cite
|
Sign up to set email alerts
|

A tunable proof of ownership scheme for deduplication using Bloom filters

Abstract: Deduplication is a widely used technique in storage services, since it affords a very efficient usage of resourcesbeing especially effective for consumer-grade storage services (e.g. Dropbox). Deduplication has been shown to suffer from several security weaknesses, the most severe ones enabling a malicious user to obtain possession of a file it is not entitled to. Standard solutions to this problem require users to prove possession of data prior to its upload. Unfortunately, the schemes proposed in the literat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(43 citation statements)
references
References 18 publications
0
43
0
Order By: Relevance
“…The security analysis of ase-PoW is based on ce-PoW [14] and builds on the earlier proofs of Di Pietro et al [12] and Blasco et al [13]. The adversary is challenged on J independent chunk positions where the probability of success is:…”
Section: Securitymentioning
confidence: 99%
See 3 more Smart Citations
“…The security analysis of ase-PoW is based on ce-PoW [14] and builds on the earlier proofs of Di Pietro et al [12] and Blasco et al [13]. The adversary is challenged on J independent chunk positions where the probability of success is:…”
Section: Securitymentioning
confidence: 99%
“…In contrast to [12] and [13] which do not apply encryption and to [14] which applies CE, a symmetric encryption scheme is applied herein. It ensures encrypted chunks are independent of files entropy, thus preventing this attack.…”
Section: Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…For this purpose Vedic mathematical methods such as [20] can be used, especially where the resources (memory to store and compute) keys are constrained. The constrained memory scenarios are the normally found in Cloud and IoT industry.…”
Section: Prime Numbers In Cryptography and Deduplicationmentioning
confidence: 99%