2019
DOI: 10.1109/tbdata.2017.2701352
|View full text |Cite
|
Sign up to set email alerts
|

Heterogeneous Data Storage Management with Deduplication in Cloud Computing

Abstract: Abstract-Cloud storage as one of the most important services of cloud computing helps cloud users break the bottleneck of restricted resources and expand their storage without upgrading their devices. In order to guarantee the security and privacy of cloud users, data are always outsourced in an encrypted form. However, encrypted data could incur much waste of cloud storage and complicate data sharing among authorized users. We are still facing challenges on encrypted data storage and management with deduplica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 45 publications
(28 citation statements)
references
References 36 publications
0
26
0
2
Order By: Relevance
“…Suppose if primary system fails, backup system needs to take over. It increases the data availability features for the users [9]. At any point the data can be retrieved from any combination of fragments which can decompose the original structure.…”
Section: Design Principles Of Cloud Storagementioning
confidence: 99%
“…Suppose if primary system fails, backup system needs to take over. It increases the data availability features for the users [9]. At any point the data can be retrieved from any combination of fragments which can decompose the original structure.…”
Section: Design Principles Of Cloud Storagementioning
confidence: 99%
“…Searchable encryption [6] helps duplication check over encrypted data. Thus far, substantial encrypted cloud-data deduplication schemes were proposed based on convergent encryption [7]- [10], proofs-of-ownership (PoW) [1], [11]- [13], secret sharing [14], [15], password-authenticated key exchange (PAKE) [16], keywords search [10] and data ownership challenge with Proxy Re-Encryption (PRE) [1], [17]. Most explored encrypted data deduplication schemes support duplication check before uploading data, which significantly save network bandwidth.…”
Section: Introductionmentioning
confidence: 99%
“…A data user can easily access its data in the cloud at any time and everywhere. Significant efforts have been made to securely and efficiently outsource data to the cloud in recent years, ranging from protecting data security and privacy ( Chu et al, 2014;Wan et al, 2012;Wang et al, 2010a;Wei et al, 2014 ), reducing copyright risks ( Hwang et al, 2009;Hwang and Li, 2010 ), controlling data access ( Ruj et al, 2014;Wang et al, 2010b;Yan et al, 2017a;Yang and Jia, 2014;Zhou et al, 2013 ), to encrypted data deduplication ( Harnik et al, 2010;Li et al, 2014;Liu et al, 2015;Xu et al, 2009;Yan et al, 2016a;2016b;2017b ).…”
Section: Introductionmentioning
confidence: 99%
“…However, almost all existing deduplication schemes ( Harnik et al, 2010;Li et al, 2014;Liu et al, 2015;Xu et al, 2009;Yan et al, 2016a;2016b;2017b ) are designed and analyzed only from technological perspectives. Few effort s in the literature were made to investigate the acceptability of deduplication schemes by all stakeholders (e.g., data users and CSPs).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation