Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security 2014
DOI: 10.1145/2664168.2664169
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Key Generation for Encrypted Deduplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(29 citation statements)
references
References 37 publications
0
29
0
Order By: Relevance
“…It adopts oblivious PRF to make sure that Cs generate their keys without revealing their files, or letting the Cs learn anything about the secret. Duan [11] and Shin [17] later used decentralized architectures to distributed the trust of the third party in DupLESS.…”
Section: Related Workmentioning
confidence: 99%
“…It adopts oblivious PRF to make sure that Cs generate their keys without revealing their files, or letting the Cs learn anything about the secret. Duan [11] and Shin [17] later used decentralized architectures to distributed the trust of the third party in DupLESS.…”
Section: Related Workmentioning
confidence: 99%
“…Other approaches, such as blinded BLS signatures [21], can be used to implement MLE key generation. This work considers a single key manager, while our design can be generalized to multiple key managers for improved availability [29]. Server: REED performs server-side deduplication.…”
Section: Architecturementioning
confidence: 99%
“…DupLESS [13] implements server-aided MLE. Duan [29] improves the robustness of key management in DupLESS via threshold signature [58]. Zheng et al [69] propose a layer-level strategy specifically for video deduplication.…”
Section: Related Workmentioning
confidence: 99%
“…Server-aided MLE protects against brute-force attacks by maintaining content-to-key mappings in a dedicated key manager, and has been implemented in various storage system prototypes [8,12,53,56]. Given that the dedicated key manager is a single-point-of-failure, Duan [24] proposes to maintain a quorum of key managers via threshold signature for fault-tolerant key management. Note that all the above systems build on deterministic encryption to preserve the deduplication capability of ciphertext chunks, and hence are vulnerable to the inference attacks studied in this paper.…”
Section: Related Workmentioning
confidence: 99%