Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Ded...
Saved in:
Main Authors: | Yue CHEN, Chao-ling LI, Ju-long LAN, Kai-chun JIN, Zhong-hui WANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
New method for file deduplication in cloud storage
by: Chao YANG, et al.
Published: (2017-03-01) -
Research progress on secure data deduplication in cloud
by: Jin-bo XIONG, et al.
Published: (2016-11-01) -
PoSW:novel secure deduplication scheme for collaborative cloud applications
by: Jin-bo XIONG, et al.
Published: (2017-07-01) -
Block level cloud data deduplication scheme based on attribute encryption
by: Wenting GE, et al.
Published: (2023-10-01) -
Deduplication algorithm based on condensed nearest neighbor rule for deduplication metadata
by: Wen-bin YAO, et al.
Published: (2015-08-01)