Secure deduplication storage systems supporting keyword search
DOI10.1016/J.JCSS.2014.12.026zbMATH Open1328.68056OpenAlexW2060099509MaRDI QIDQ494049FDOQ494049
Authors: Xiaofeng Chen, Fatos Xhafa, Leonard Barolli, Jin Li
Publication date: 31 August 2015
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2117/79891
Recommendations
- A key-sharing based secure deduplication scheme in cloud storage
- Secure deduplication of encrypted data: refined model and new constructions
- Verifiable secure data deduplication method in cloud storage
- Security notions for cloud storage and deduplication
- Secure data deduplication with reliable data deletion in cloud
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Space/time trade-offs in hash coding with allowable errors
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Deterministic and Efficiently Searchable Encryption
- Message-locked encryption and secure deduplication
Cited In (13)
- Balancing access control and privacy for data deduplication via functional encryption
- A key-sharing based secure deduplication scheme in cloud storage
- Secure deduplication of encrypted data: refined model and new constructions
- Security notions for cloud storage and deduplication
- Pairing-free identity-based encryption with authorized equality test in online social networks
- A secure cloud backup system with deduplication and assured deletion
- Secure data deduplication with reliable data deletion in cloud
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
- Incentive-driven attacker for corrupting two-party protocols
- Fine-grained searchable encryption in multi-user setting
- Verifiable secure data deduplication method in cloud storage
- Reliability provision mechanism for large-scale de-duplication storage systems
- An Almost Non-interactive Order Preserving Encryption Scheme
This page was built for publication: Secure deduplication storage systems supporting keyword search
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q494049)