2015
DOI: 10.1016/j.jcss.2014.12.026
|View full text |Cite
|
Sign up to set email alerts
|

Secure deduplication storage systems supporting keyword search

Abstract: Data deduplication is an attractive technology to reduce storage space for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. However, the issue of keyword search over encrypted data in dedupl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Topology control technology is an important and commonly used optimization technique in networks fields [34][35][36][37]. Topology control technology has considerable studies in WSNs [38,39].…”
Section: Related Workmentioning
confidence: 99%
“…Topology control technology is an important and commonly used optimization technique in networks fields [34][35][36][37]. Topology control technology has considerable studies in WSNs [38,39].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the diffusion of codes is an important processing technology for big data networks (big data technology). However, due to the limited energy of sensor nodes in the network, when nodes communicate with other nodes, an important question is how to ensure that big data codes are transmitted to destinations quickly at lower complexity [27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%
“…However, designing a method for WSNs with higher network lifetime and lower complexity and communication delay is a challenging issue [25,[30][31][32][33][34][35][36][37][38][39]. In WSNs, data codes are transmitted for device-to-device communication (D2D) by multihop transmission way.…”
Section: Introductionmentioning
confidence: 99%
“…Two-party protocols can be widely used in various fields such as cloud computing (Gao et al 2018;Tian et Ibtihal et al 2017;Zheng and Wang 2018), file encryption , verifiable computation , keyword searching (Li et al 2015) and trust evaluation (Jiang et al 2016(Jiang et al , 2018Jhaveri et al 2018). Normally, the security of two-party protocols is discussed with a single external attacker, who is assumed to arbitrarily sabotage the protocols by corrupting at most one party.…”
Section: Introductionmentioning
confidence: 99%