[1]McLellan C. Storage in 2014: An overview[OL]. [20151014]. http:www.zdnet.com articlestoragein2014anoverview[2]Csaplar D. Building business resilience through active archiving[OL]. [20151014]. http:www.dataspan.comuploadspdfaberdeenreportbusinessresiliencewithactivearchive.pdf[3]Wallace G, Douglis F, Qian H, et al. Characteristics of backup workloads in production systems[C] Proc of USENIX Conf on File and Storage Technologies. Berkeley: USENIX Association, 2012[4]Harnik D, Pinkas B, Alexandra S. Side channels in cloud services: Deduplication in cloud storage[J]. IEEE Security & Privacy, 2010, 8(6): 4047[5]Mulazzani M, Schrittwieser S, Leithner M, et al. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space[C] Proc of USENIX Security Symposium. Berkeley: USENIX Association, 2011: 6576[6]Halevi S, Harnik D, Pinkas B, et al. Proofs of ownership in remote storage systems[C] Proc of ACM Conf on Computer and Communications Security. New York: ACM, 2011: 491500[7]Bellare M, Keelveedhi S, Ristenpart T. Messagelocked encryption and secure deduplication[G] LNCS 7881: Proc of Advances in Cryptology (EUROCRYPT 2013). Berlin: Springer, 2013: 296312[8]Douceur J, Adya A, William JB, et al. Reclaiming space from duplicate files in a serverless distributed file system[C] Proc of Int Conf on Distributed Computing Systems. Piscataway, NJ: IEEE, 2012: 617624[9]GNUnet[OL]. [20151014]. https:gnunet.org[10]Flud[OL]. [20151014]. http:flud.org[11]Storer W M, Greenan K, Long D E, et al. Secure data deduplication[C] Proc of ACM Int Workshop on Storage Security and Survivability. New York: ACM, 2008: 110[12]WilcoxOHearn Z, Warner B. Tahoe: The leastauthority filesystem[C] Proc of ACM Int Workshop on Storage Security and Survivability. New York: ACM, 2008: 2126[13]Zheng Y, Yuan X, Wang X, et al. Enabling encrypted cloud media center with secure deduplication[C] Proc of ACM Symp on Information, Computer and Communications Security. New York: ACM, 2015: 6372[14]Xu J, Chang E, Zhou J. Weak leakageresilient clientside deduplication of encrypted data in cloud storage[C] Proc of ACM Symp on Information, Computer and Communications Security. New York: ACM, 2013: 195206[15]Backes M, Cachin C, Oprea A. Secure keyupdating for lazy revocation[G] LNCS 4189: Proc of Computer Security (ESORICS 2006). Berlin: Springer, 2006: 327346[16]Bellare M, KeelveedhiS, Ristenpart T. DupLESS: Serveraided encryption for deduplicated storage[C] Proc of USENIX Security Symp. Berkeley: USENIX Association, 2013: 179194[17]Goldwasser S, Bellare M. Lecture notes on cryptography[OL]. [20151014]. http:cseweb.ucsd.edu~mihirpapersgb.html[18]Shoup V. Practical threshold signatures[G] LNCS 1807: Proc of Advances in Cryptology (EUROCRYPT 2000). Berlin: Springer, 2000: 207220[19]Duan Y. Distributed key generation for encrypted deduplication: Achieving the strongest privacy[C] Proc of ACM Workshop on Cloud Computing Security. New York: ACM, 2014: 5768[20]Li M, Qin C, Lee P, et al. Convergent dispersal: Toward storageefficient security in a cloudofclouds[C] Proc of USENIX Workshop on Hot Topics in Storage and File Systems. Berkeley: USENIX Association, 2014[21]Blakley R G, Meadows C. Security of ramp schemes[G] LNCS 196: Proc of Advances in Cryptology. Berlin: Springer, 1984: 242268[22]Resch J, Plank J. AONTRS: Blending security and performance in dispersed storage systems[C] Proc of USENIX Conf on File and Storage Technologies. Berkeley: USENIX Association, 2011: 112[23]DropshipdropboxAPI utilities[OL]. [20151014]. https:github.comdriverdandropship[24]Merkle R C. Protocols for public key cryptosystems[C] Proc of IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 1980: 122134[25]Li M, Qin C, Lee P. CDStore: Toward reliable, secure, and costefficient cloud storage via convergent dispersal[C] Proc of USENIX Annual Technical Conf. Berkeley: USENIX Association, 2015: 111124[26]Zhou Y, Feng D, Xia W, et al. SecDep: A useraware efficient finegrained secure deduplication scheme with multilevel key management[C] Proc of IEEE Symp on Mass Storage Systems and Technologies. Piscataway, NJ: IEEE, 2015: 114[27]Li J, Chen X, Li M, et al. Secure deduplication with efficient and reliable convergent key management[J]. IEEE Trans on Parallel Distributed Systems, 2014, 25(6): 16151625[28]Liu J, Asokan N, Pinkas B. Secure deduplication of encrypted data without additional independent servers[C] Proc of ACM Conf on Computer and Communications Security. New York: ACM, 2015: 874885[29]Rabin M O. Fingerprinting by random polynomials, TRCSE0301[R]. Boston: Center for Research in Computing Technology, Harvard University, 1981[30]Armknecht F, Bohli J, Karame O G, et al. Transparent data deduplication in the cloud[C] Proc of ACM Conf on Computer and Communications Security. New York: ACM, 2015: 886900[31]Li J, Li K T, Chen X, et al. A hybrid cloud approach for secure authorized deduplication[J]. IEEE Trans on Parallel and Distributed Systems, 2015, 26(5): 12061216 |