2013 IEEE 5th International Conference on Cloud Computing Technology and Science 2013
DOI: 10.1109/cloudcom.2013.54
|View full text |Cite
|
Sign up to set email alerts
|

ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
52
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(53 citation statements)
references
References 13 publications
0
52
0
1
Order By: Relevance
“…소유권(PoW) [11] , 데이터에 대한 사용가능성 (PoR) [12,13] , 데이터의 저장(PoS) [14] , 데이터의 삭제 (PoD) [15] [16] , 키 서버를 통한 안전한 중복제거 [17,18] , PAKE 프로토콜(Password Authenticated Key Exchange Protocol)을 활용한 기법 …”
Section: 침입 탐지 시스템(Intrusion Detection System)unclassified
“…소유권(PoW) [11] , 데이터에 대한 사용가능성 (PoR) [12,13] , 데이터의 저장(PoS) [14] , 데이터의 삭제 (PoD) [15] [16] , 키 서버를 통한 안전한 중복제거 [17,18] , PAKE 프로토콜(Password Authenticated Key Exchange Protocol)을 활용한 기법 …”
Section: 침입 탐지 시스템(Intrusion Detection System)unclassified
“…Despite the effort invested in improving the existing de-duplication algorithm to provide users with adequate privacy, thus far there is no work that has a solution for an effective and secure combination of the two [18]. Current systems rely primarily upon three main data de-duplication strategies [20], [17] as follows: Firstly, Whole File strategy typically utilises a file's cryptographic hash value as an identifier. If two or more files hash are of the same value, they are assumed to have identical content and only stored once.…”
Section: A Space Saving With De-duplicationmentioning
confidence: 99%
“…According to [17], the location at which data de-duplication is performed is also very important; if the data are deduplicated at the client side, then it is known as the source-based de-duplication or otherwise, target-based deduplication. In source-based de-duplication, the client will perform hash functions on each data segment that needs to be uploaded.…”
Section: A Space Saving With De-duplicationmentioning
confidence: 99%
“…Pasqualepuzioet. al [5] proposedClouDedup, a secure and efficient storage service that assured block-level deduplication and data confidentiality at an equivalent time. Even whenbased on convergent encryption, ClouDedup remained secure because of a component that implemented an additional encryption operation and an access control mechanism.…”
Section: ) Cost Reductionmentioning
confidence: 99%