2012 International Conference on Information Security and Intelligent Control 2012
DOI: 10.1109/isic.2012.6449734
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid data deduplication in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…But this work cannot support the deduplication on encrypted data. A hybrid data deduplication mechanism was proposed by Fan et al [27]. It can deduplicate both plaintext and ciphertext.…”
Section: Other Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…But this work cannot support the deduplication on encrypted data. A hybrid data deduplication mechanism was proposed by Fan et al [27]. It can deduplicate both plaintext and ciphertext.…”
Section: Other Related Workmentioning
confidence: 99%
“…We implemented the scheme based on MIRACL Crypto Library (http://info.certivox.com/docs/miracl), Pairing Based Cryptography (PBC) Library [27], OpenSSL Cryptography, JHU-MIT Proxy Re-cryptography Library (https://isi.jhu.edu/~mgreen/prl/index.html), and SSL / TLS Toolkit (https://www.openssl.org/). In our implementation, we applied AES for symmetric encryption, RSA for PKC and SHA-1 as a hash function to generate hash codes and hash sets.…”
Section: Scheme Implementationmentioning
confidence: 99%
“…al. [3] introduces hybrid data de-duplication with mixture of encrypted and un-encrypted data on cloud storage having three blocks: Check block, enabling block and cipher block. The check block would be used for checking unique data.…”
Section: Related Workmentioning
confidence: 99%
“…Because it is possible that same plaintexts may lead to different ciphertexts. If one can realize data deduplication on ciphertexts, the cloud server must be able to identify all of the ciphertexts of the same plaintext [3] . One more thing needs to be there in data deduplication is authorized deduplication in which users would have set of privileges because in many of applications differential authorized duplication is needed.…”
Section: Fig 1: Data Deduplicationmentioning
confidence: 99%
“…Environment [3] A message in the proposed hybrid data deduplication mechanism consists of a triple of blocks, i.e., (check block, enabling block, and cipher block). The check block can be used to check the repetition of encrypted files.…”
Section: Hybrid Data Deduplication In Cloudmentioning
confidence: 99%