| [1] |
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
|
| [2] |
REINSEL D, GANTZ J, RYDNING J. The digitization of the world from edge to core[EB/OL]. [2024-03-24]..
|
| [3] |
WANG L, WANG B, SONG W, et al. A key-sharing based secure deduplication scheme in cloud storage[J]. Information Sciences, 2019, 504: 48-60.
|
| [4] |
ZHANG Y, SU H, YANG M, et al. Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing[J]. Security and Communication Networks, 2018, 2018: No.9081814.
|
| [5] |
KUSZMAUL J. Verkle trees[EB/OL]. [2024-09-04]..
|
| [6] |
GAO X, YU J, SHEN W T, et al. Achieving low-entropy secure cloud data auditing with file and authenticator deduplication[J]. Information Sciences, 2021, 546: 177-191.
|
| [7] |
HALEVI S, HARNIK D, PINKAS B, et al. Proofs of ownership in remote storage systems[C]// Proceedings of the 18th ACM Conference on Computer and Communications Security. New York: ACM, 2011: 491-500.
|
| [8] |
QI H, LI P, WANG C, et al. A hierarchical key management scheme for cross-domain secure deduplication[J]. Mobile Networks and Applications, 2023, 28(2): 473-485.
|
| [9] |
TANG X, GUO C, CHOO K K R, et al. A secure and lightweight cloud data deduplication scheme with efficient access control and key management[J]. Computer Communications, 2024, 222: 209-219.
|
| [10] |
袁颖,朱洪亮,陈玉玲,等.基于数据持有性证明的完整性验证技术综述[J].计算机工程与应用,2019,55(18):1-7.
|
|
YUAN Y, ZHU H L, CHEN Y L, et al. Survey of data integrity verification technology based on provable data possession[J]. Computer Engineering and Applications, 2019, 55(18): 1-7.
|
| [11] |
ZHANG F, WEN B, YAN Y, et al. Privacy protection multi-copy provable data possession supporting data reliability[C]// Proceedings of the 2023 International Conference on Blockchain and Trustworthy Systems, CCIS 1896. Singapore: Springer, 2024: 119-132.
|
| [12] |
ZHANG K, GUO Z, WANG L, et al. Revocable certificateless provable data possession with identity privacy in cloud storage[J]. Computer Standards and Interfaces, 2024, 90: No.103848.
|
| [13] |
高婷婷,姚中原,贾淼,等.链上链下一致性保护技术综述[J]. 计算机应用,2024,44(12):3658-3668.
|
|
GAO T T, YAO Z Y, JIA M, et al. Overview of on-chain and off-chain consistency protection technologies[J]. Journal of Computer Applications, 2024, 44(12): 3658-3668.
|
| [14] |
JUELS A, KALISKI B S, Jr. PORs: proofs of retrievability for large files[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 584-597.
|
| [15] |
TAN X, XIE Q, HAN L, et al. Proof of retrievability with flexible designated verification for cloud storage[J]. Computers and Security, 2023, 135: No.103486.
|
| [16] |
YUAN H, CHEN X, WANG J, et al. Blockchain-based public auditing and secure deduplication with fair arbitration[J]. Information Sciences, 2020, 541: 409-425.
|
| [17] |
XU Y, JIN C, QIN W, et al. BDACD: blockchain-based decentralized auditing supporting ciphertext deduplication[J]. Journal of Systems Architecture, 2024, 147: No.103053.
|
| [18] |
LIU S, YAO Y, TIAN G, et al. A blockchain-based compact audit-enabled deduplication in decentralized storage[J]. Computer Standards and Interfaces, 2023, 85: No.103718.
|
| [19] |
LI S, XU C, ZHANG Y, et al. Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage[J]. IEEE Transactions on Services Computing, 2023, 16(1): 134-146.
|
| [20] |
TIAN G, HU Y, WEI J, et al. Blockchain-based secure deduplication and shared auditing in decentralized storage[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(6): 3941-3954.
|
| [21] |
KWON H, HAHN C, KANG K, et al. Secure deduplication with reliable and revocable key management in fog computing[J]. Peer-to-Peer Networking and Applications, 2019, 12: 850-864.
|
| [22] |
KIM W B, LEE I Y. Survey on data deduplication in cloud storage environments[J]. Journal of Information Processing Systems, 2021, 17(3): 658-673.
|
| [23] |
伍高飞,袁紫依,孙思贤,等.云数据安全去重技术研究综述[J].密码学报,2023,10(6):1099-1117.
|
|
WU G F, YUAN Z Y, SUN S X, et al. A survey on secure data deduplication techniques in cloud[J]. Journal of Cryptologic Research, 2023, 10(6): 1099-1117.
|
| [24] |
BELLARE M, KEELVEEDHI S, RISTENPART T. Message-locked encryption and secure deduplication[C]// Proceedings of the 2013 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7881. Berlin: Springer, 2013: 296-312.
|
| [25] |
DI PIETRO R, SORNIOTTI A. Boosting efficiency and security in proof of ownership for deduplication[C]// Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2012: 81-82.
|
| [26] |
MIAO Y, GAI K, ZHU L, et al. Blockchain-based shared data integrity auditing and deduplication[J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21(4): 3688-3703.
|
| [27] |
LI J W, LI J, XIE D, et al. Secure auditing and deduplicating data in cloud[J]. IEEE Transactions on Computers, 2016, 65(8): 2386-2396.
|