Data popularity-based encrypted deduplication scheme without third-party servers

被引:0
|
作者
Ha, Guanxiong [1 ,2 ]
Jia, Qiaowen [3 ]
Chen, Hang [1 ,2 ]
Jia, Chunfu [1 ,2 ]
机构
[1] College of Cyber Science, Nankai University, Tianjin,300350, China
[2] Tianjin Key Laboratory of Network and Data Security Technology, Tianjin,300350, China
[3] Institute of Software, Chinese Academy of Sciences, Beijing,100190, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
27
引用
收藏
页码:17 / 29
相关论文
共 50 条
  • [1] Secure Encrypted Data Deduplication Based on Data Popularity
    Yunlong He
    Hequn Xian
    Liming Wang
    Shuguang Zhang
    Mobile Networks and Applications, 2021, 26 : 1686 - 1695
  • [2] Secure Encrypted Data Deduplication Based on Data Popularity
    He, Yunlong
    Xian, Hequn
    Wang, Liming
    Zhang, Shuguang
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1686 - 1695
  • [3] R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity
    Guo, Cheng
    Jiang, Xueru
    Choo, Kim-Kwang Raymond
    Jie, Yingmo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 162
  • [4] Secure Deduplication of Encrypted Data without Additional Independent Servers
    Liu, Jian
    Asokan, N.
    Pinkas, Benny
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 874 - 885
  • [5] CryptDBaaS Query Over Encrypted DBaaS Without Third-Party
    Draidi, Fadi
    Hmedat, Mohammad
    Abwe, Barakat
    Atrash, Amr
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [6] Secure Generalized Vickrey Auction without third-party servers
    Yokoo, M
    Suzuki, K
    FINANCIAL CRYPTOGRAPHY, 2004, 3110 : 132 - 146
  • [7] A popularity-based data allocation scheme for a VOD server
    Chang, CK
    Shih, CC
    Nguyen, TT
    Mongkolwat, P
    TWENTIETH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE (COMPSAC'96), PROCEEDINGS, 1996, 20 : 62 - 67
  • [8] Deduplication scheme with data popularity for cloud storage
    He X.
    Yang Q.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (01): : 187 - 200
  • [9] Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party
    Qin, Guiyun
    Li, Limin
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [10] Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags
    Ha, Guanxiong
    Jia, Chunfu
    Huang, Yixuan
    Chen, Hang
    Li, Ruiqi
    Jia, Qiaowen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1484 - 1500