2014
DOI: 10.1109/tpds.2013.284
|View full text |Cite
|
Sign up to set email alerts
|

Secure Deduplication with Efficient and Reliable Convergent Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
178
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 465 publications
(178 citation statements)
references
References 16 publications
0
178
0
Order By: Relevance
“…In their system, a third party called key server is introduced to generate the file tag for duplication check. Li et al [26] addressed the key management issue in block-level de duplication by distributing these keys across multiple servers after encrypting the files. Li et al [29] considered the hybrid cloud architecture consisting of a public cloud and a private cloud and efficiently solved the problem of de duplication with differential privileges.…”
Section: Literature Survey:-mentioning
confidence: 99%
“…In their system, a third party called key server is introduced to generate the file tag for duplication check. Li et al [26] addressed the key management issue in block-level de duplication by distributing these keys across multiple servers after encrypting the files. Li et al [29] considered the hybrid cloud architecture consisting of a public cloud and a private cloud and efficiently solved the problem of de duplication with differential privileges.…”
Section: Literature Survey:-mentioning
confidence: 99%
“…The malicious node and data handling mechanism are suggested in this case. [22] Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure deduplication in cloud storage.…”
Section: Limitations and Concernsmentioning
confidence: 99%
“…According to the paper [12] titled "Secure De-duplication with Efficient and Reliable Convergent Key Management 2014", convergent encryption provides a viable option to enforce data confidentiality while realizing deduplication. It encrypts/decrypts a data copy by convergent key, which is derived by computing cryptographic hash of the content of data copy itself.…”
Section: Iiiliterature Surveymentioning
confidence: 99%