A Study on Deduplication Techniques over Encrypted Data
Open Access
- 1 January 2016
- journal article
- Published by Elsevier BV in Procedia Computer Science
- Vol. 87, 38-43
- https://doi.org/10.1016/j.procs.2016.05.123
Abstract
No abstract availableThis publication has 15 references indexed in Scilit:
- HEDup: Secure Deduplication with Homomorphic EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Secure Distributed Deduplication Systems with Improved ReliabilityInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2015
- A Hybrid Cloud Approach for Secure Authorized DeduplicationIEEE Transactions on Parallel and Distributed Systems, 2014
- ClouDedup: Secure Deduplication with Encrypted Data for Cloud StoragePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Message-Locked Encryption and Secure DeduplicationLecture Notes in Computer Science, 2013
- Proofs of ownership in remote storage systemsPublished by Association for Computing Machinery (ACM) ,2011
- Twin Clouds: Secure Cloud Computing with Low LatencyLecture Notes in Computer Science, 2011
- Secure data deduplicationPublished by Association for Computing Machinery (ACM) ,2008
- Security of Ramp SchemesPublished by Springer Science and Business Media LLC ,2000
- Multiple ramp schemesIEEE Transactions on Information Theory, 1999