Citation: | TANG Xin, ZHANG Yi, ZHOU Linna, et al., “Request Merging Based Cross-User Deduplication for Cloud Storage with Resistance Against Appending Chunks Attack,” Chinese Journal of Electronics, vol. 30, no. 2, pp. 199-209, 2021, doi: 10.1049/cje.2021.01.004 |
[1] |
D. Harnik, B. Pinkas and A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage", IEEE Security & Privacy, Vol. 8, No. 6, pp. 40–47, 2010.
|
[2] |
P.F. Zuo, Y. Hua, C. Wang, et al., "Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage", Proc. of IEEE International Parallel and Distributed Processing Symposium, Vancouver, BC, Canada, pp. 1153–1162, 2018.
|
[3] |
H.B. Cheng, M.Y. Qian and S. Yu, "Securing cloud data using a pirate scheme", Chinese Journal of Electronics, Vol. 26, No. 6, pp. 1289–1296, 2017. doi: 10.1049/cje.2017.09.007
|
[4] |
L.X. Huang, J.L. Zhou, G.X. Zhang, et al., "Certificateless public verification for data storage and sharing in the cloud", Chinese Journal of Electronics, Vol. 29, No. 4, pp. 639–647, 2020. doi: 10.1049/cje.2020.05.007
|
[5] |
Y.N. Qi, X. Tang and Y.F. Huang, "Enabling efficient batch updating verification for multi-versioned data in cloud storage", Chinese Journal of Electronics, Vol. 28, No. 2, pp. 377–385, 2019. doi: 10.1049/cje.2018.02.007
|
[6] |
Z. Pooranian, K.C. Chen, C.M. Yu, et al., "RARE: Defeating side channels based on data-deduplication in cloud storage", Proc. of International Workshop on IEEE Conference on Computer Communications, Honolulu, Hawaii, USA, pp. 444–449, 2018.
|
[7] |
C.M. Yu, S.P. Gochhayat, M. Conti, et al., "Privacy aware data deduplication for side channel in cloud storage", IEEE Transactions on Cloud Computing, Vol. 8, No. 2, pp. 597–609, 2020. doi: 10.1109/TCC.2018.2794542
|
[8] |
William W. Cohen, "Enron Email dataset", https://www.cs.cmu.edu/./enron/, 2015-5-8.
|
[9] |
James Philbin, Relja Arandjelović and Andrew Zisserman, "The Oxford Buildings dataset", http://www.robots.ox.ac.uk//~vgg/data/oxbuildings/, 2020-5-3.
|
[10] |
Fredrik Larsson and Michael Felsberg, "Traffic Signs dataset", http://www.cvl.isy.liu.se/en/research/datasets/traffic-signs-dataset/download/, 2011.
|
[11] |
P. Puzio, R. Molva, M. Onen, et al., "Cloudedup: Secure deduplication with encrypted data for cloud storage", Proc. of 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Bristol, United Kingdom, pp. 363–370, 2013.
|
[12] |
W. Xia, H. Jiang, D. Feng, et al., "A comprehensive study of the past, present, and future of data deduplication", Proceedings of the IEEE, Vol. 104, No. 9, pp. 1681–1710, 2016. doi: 10.1109/JPROC.2016.2571298
|
[13] |
Y. Shin and K. Kim, "Differentially private client-side data deduplication protocol for cloud storage services", Security and Communication Networks, Vol. 8, pp. 2114–2123, 2015. doi: 10.1002/sec.1159
|
[14] |
Y. Zhang, C.X. Xu, H.W. Li, et al., "HealthDep: An efficient and secure deduplication scheme for cloud-assisted eHealth systems", IEEE Transactions on Industrial Informatics, Vol. 14, No. 9, pp. 4101–4112, 2018. doi: 10.1109/TII.2018.2832251
|
[15] |
F. Armknecht, C. Boyd, G.T. Davies, et al., "Side channels in deduplication: Trade-offs between leakage and efficiency", Proc. of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 266–274, 2017.
|
[16] |
P.F. Zuo, Y. Hua, Y.Y. Sun, et al., "Bandwidth and energy efficient image sharing for situation awareness in disasters", IEEE Transactions on Parallel and Distributed Systems, Vol. 30, No. 1, pp. 15–28, 2019. doi: 10.1109/TPDS.2018.2859930
|
[17] |
J. Lin, N. Asokan and B. Pinkas, "Secure deduplication of encrypted data without additional independent servers", Proc. of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, Colorado, USA, pp. 874–885, 2015.
|
[18] |
H. Kwon, C. Hahn, D.Y. Koo, et al., "Scalable and reliable key management for secure deduplication in cloud storage", Proc. of IEEE 10th International Conference on Cloud Computing, Honolulu, CA, USA, pp. 391–398, 2017.
|
[19] |
M. Bellare, S. Keelveedhi and T. Ristenpart, "DepLESS: Server-aided encryption for deduplicated storage", Proc. of the 22nd USENIX conference on Security, Washington, DC, USA, pp. 179–194, 2013.
|
[20] |
C.M. Yu, "Poster: Efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions", Proc. of the 23rd ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, pp. 1763–1765, 2016.
|
[21] |
X. Tang, L.N. Zhou, Y.F. Huang, et al., "Efficient cross-user deduplication of encrypted data through re-encryption", Proc. of 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, New York, NY, USA, pp. 897–904, 2018.
|