[1] NIKALJE S,KUMARI R,INGOLE S. Smart distributed deduplication system with security and reliability using algorithm[J]. International Journal of Innovative Research in Science and Engineering, 2016,2(3):612-621. [2] YU C M,GOCHHAYAT S P,CONTI M,et al. Privacy aware data deduplication for side channel in cloud storage[J]. IEEE Transaction on Cloud Computing,2018(Early Access):1-1. [3] ARMKNECHT F,BOYD C,DAVIES G Tet al. Side channels in deduplication:trade-offs between leakage and efficiency[C]//Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. New York:ACM,2017:266-274. [4] HARNIK D,PINKAS B,SHULMAN-PELEG A. Side channels in cloud services:deduplication in cloud storage[J]. IEEE Security and Privacy,2010,8(6):40-47. [5] ZUO P,HUA Y,WANG C,et al. Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage[C]//Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium. Piscataway:IEEE,2018:1153-1162. [6] POORANIAN Z,CHEN K C,YU C M,et al. RARE:defeating side channels based on data-deduplication in cloud storage[C]//Proceedings of the 2018 IEEE Conference on Computer Communications Workshops. Piscataway:IEEE,2018:444-449. [7] LIU J,ASOKAN N,PINKAS B. Secure deduplication of encrypted data without additional independent servers[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM,2015:874-885. [8] KWON H,HAHN C,KOO D,et al. Scalable and reliable key management for secure deduplication in cloud storage[C]//Proceedings of the 10th IEEE International Conference on Cloud Computing. Piscataway:IEEE,2017:391-398. [9] BELLARE M,KEELVEEDHI S,RISTENPART T. DupLESS:server-aided encryption for deduplication in cloud storage[C]//Proceedings of the 22nd USENIX Security Symposium. Berkeley:USENIX Association,2013:179-194. [10] NI J,ZHANG K,YU Y,et al. Providing task allocation and secure deduplication for mobile crowdsensing via fog computing[J]. IEEE Transactions on Dependable and Secure Computing, 2018(Early Access):1-1. [11] DANG H,CHANG E C. Privacy-preserving data deduplication on trusted processors[C]//Proceedings of the 10th IEEE International Conference on Cloud Computing. Piscataway:IEEE, 2017:66-73. [12] ZHANG K,LIANG X,LU R X,et al. Sybil attacks and their defenses in the Internet of things[J]. IEEE Internet of Things Journal,2014,1(5):372-383. [13] DOUCEUR J R,ADYA A,BOLOSKY W J,et al. Reclaiming space from duplicate files in a serverless distributed file system[C]//Proceedings of the 22nd International Conference on Distributed Computing Systems. Piscataway:IEEE,2002:617-624. [14] 唐鑫,周琳娜,胡冰蔚,等. 云数据去重方法及系统:CN201911237434.2[P]. 2019-12-05.(TANG X,ZHOU L N, HU B W,et al. Deduplication method and system for cloud data:CN201911237434.2[P]. 2019-12-05.) [15] TARASOV V,MUDRANKIT A,BUIK W,et al. Generating realistic datasets for deduplication analysis[C]//Proceedings of the 2012 USENIX Annual Technical Conference. Berkeley:USENIX Association,2012:No. 129. [16] XIA W,JIANG H,FENG D,et al. SiLo:a similarity-locality based near-exact deduplication scheme with low RAN overhead and high throughput[C]//Proceedings of the 2011 USENIX Annual Technical Conference. Berkeley:USENIX Association,2011:26-28. |