2016
DOI: 10.1007/978-3-319-29883-2_10
|View full text |Cite
|
Sign up to set email alerts
|

PerfectDedup: Secure Data Deduplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(27 citation statements)
references
References 17 publications
0
27
0
Order By: Relevance
“…In addition, multiple users uploading data at the same time can result in bottlenecks. To address this issue, client-side deduplication (CSD) technology was proposed [3,4].…”
Section: Data Deduplication Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, multiple users uploading data at the same time can result in bottlenecks. To address this issue, client-side deduplication (CSD) technology was proposed [3,4].…”
Section: Data Deduplication Methodsmentioning
confidence: 99%
“…The user sends , 3 , to the metadata server. In addition, ownership group renewals are performed on the server.…”
Section: Data Upload Phase (Subsequent Upload)mentioning
confidence: 99%
See 1 more Smart Citation
“…Y.L.He et al proposed an similar scheme which is aware of data popularity [17]. P. Puzio proposed the PerfectDedup scheme [6], using a full hash function to query the privacy level of data through trusted third parties. Similar to the method in Stanek's work, in PerfectDedup, data of low privacy are protected with CE; data of high privacy are protected with traditional symmetric encryption.…”
Section: B Deduplication With Third Partiesmentioning
confidence: 99%
“…The cloud server only performs deduplication on popular data, which better protects data privacy while improving the efficiency. The PerfectDedup scheme was proposed by Puzio et al They used perfect hash function 18 to query the popularity of data with the assistance of a trusted third party. However, the introduction of a trusted third party increases the communication overhead of the CSP, and it causes new security risks.…”
Section: Introductionmentioning
confidence: 99%