2012 International Conference on ICT Convergence (ICTC) 2012
DOI: 10.1109/ictc.2012.6386851
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving cross-user source-based data deduplication in cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…Many data deduplication mechanisms have been proposed recently [5], [6], [7], [8], [9], [10], [11], [12], [13], [14]. In this section, we research into the encrypted data deduplication and discuss some security issues.…”
Section: Related Workmentioning
confidence: 99%
“…Many data deduplication mechanisms have been proposed recently [5], [6], [7], [8], [9], [10], [11], [12], [13], [14]. In this section, we research into the encrypted data deduplication and discuss some security issues.…”
Section: Related Workmentioning
confidence: 99%
“…Lee et al , observed that the probability of Harnik et al . scheme that information of the existence of a file is leaked to the adversary is not negligible in security parameter d .…”
Section: Related‐files Attackmentioning
confidence: 99%
“…Harnik et al . scheme and its security‐enhanced version obfuscate the occurrence of deduplication by randomizing the event with certain probability. This randomized approach, however, causes huge network bandwidth consumption owing to the unnecessary file upload.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations