[1]Amazon.CaseStudies[EB/OL].[20150617].https:∥aws.amazon.com/cn/solutions/casestudies/ #backup.
[2]Meyer D T, Bolosky W J. A study of practical deduplication[J].TCM Transactions on Storage, 2012,7(4):1.
[3]Wallace G,Douglis F,Qian H,et al.Characteristics of backup workloads in production systems[C]∥Proc of the 10th USENIX Conference on File and Storage Technologies (FAST’12),2012:4.
[4]Seny K,Lauter K. Cryptographic cloud storage[M]∥Financial Cryptography and Data Security.Berlin:Springer Berlin Heidelberg,2010:136149.
[5]Li J,Chen X,Li M,et al.Secure deduplication with efficient and reliable convergent key management[J].IEEE Transactions on Parallel & Distributed Systems, 2013,25(6):1.
[6]ElShimi A,Kalach R,Kumar A,et al.Primary data deduplicationlarge scale study and system design[C]∥Proc of USENIX Conference on Technical Conference,2012:26.
[7]Douceur J R,Adya A,Bolosky W J,et al.Reclaiming space from duplicate files in a serverless distributed file system[C]∥Proc of the 22nd International Conference on Distributed Computing Systems,2002:617624.
[8]Storer M W,Greenan K,Long D D E,et al.Secure data deduplication[C]∥Proc of the 4th ACM International Workshop on Storage Security and Survivability,2008:110.
[9]Anderson P,Zhang L.Fast and secure laptop backups with encrypted deduplication[C]∥Proc of USENIX LISA,2010:3.
[10]Chaum D.Blind signatures for untraceable payments[C]∥Proc of Advances in Cryptology,1983:199203.
[11]Yun A,Shi C,Kim Y.On protecting integrity and confidentiality of cryptographic file system for outsourced storage[C]∥Proc of the 2009 ACM Workshop on Cloud Computing Security,2009:6776.
[12]Harnik D, Pinkas B, ShulmanPeleg A. Side channels in cloud services:Deduplication in cloud storage[J].Security & Privacy,IEEE,2010,8(6):4047.
[13]WilcoxO’Hearn Z. Convergent encryption reconsidered[EB/OL].[20080818].http://tahoelafs.org/pipermail/tahoedev/2008March/000460.html.
[14]Bellare M,Keelveedhi S,Ristenpart T.DupLESS:Serveraided encryption for deduplicated storage[C]∥Proc of USENIX Conference on Security,2013:179194.
[15]Muthitacharoen A, Chen B, Mazieres D. A lowbandwidth network file system[J].ACM Sigops Operating Systems Review,2001,35(5):174187.
[16]Cox L P,Murray C D,Noble B D.Pastiche:Making backup cheap and easy[J].ACM SIGOPS Operating Systems Review,2002,36(SI):285298.
[17]Bellare M,Keelveedhi S,Ristenpart T.Messagelocked encryption and secure deduplication[M]∥Advances in CryptologyEUROCRYPT 2013. Berlin:Springer Berlin Heidelberg,2013:296312.
[18]De Santis A,Masucci B.Multiple ramp schemes[J].IEEE Transactions on Information Theory,1999,45(5):17201728.
[19]Halevi S,Harnik D,Pinkas B,et al.Proofs of ownership in remote storage systems[C]∥Proc of the 18th ACM Conference on Computer and Communications Security,2011:491500.
[20]Di Pietro R,Sorniotti A.Boosting efficiency and security in proof of ownership for deduplication[C]∥Proc of the 7th ACM Symposium on Information,Computer and Communications Security,2012:8182.
[21]Marques L, Costa C J. Secure deduplication on mobile devices[C]∥Proc of the 2011 Workshop on Open Source and Design of Communication,2011:1926. |