ESAD: An Efficient Secure Authorized Data Deduplication On Hybrid Cloud Storage Architecture
Abstract
References
OpenSSL Project, (1998). [Online]. Available: http://www. openssl.org/
P. Anderson and L. Zhang, “Fast and secure laptop backups with encrypted de-duplication,†in Proc. 24th Int. Conf. Large Installation Syst. Admin., 2010, pp. 29–40.
M. Bellare, S. Keelveedhi, and T. Ristenpart, “Dupless: Serveraided encryption for deduplicated storage,†in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179–194.
M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,†in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296–312.
M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,†J. Cryptol., vol. 22, no. 1, pp. 1–61, 2009.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â