[1] |
HARNIK D, PINKAS B, SHULMAN-PELE G. Side Channels in Cloud Services:Deduplication in Cloud Storage[J]. IEEE Security & Privacy, 2010, 8(6):40-47.
|
[2] |
SU K W, LEU J S, YU M C, et al. Design and Implementation of Various File Deduplication Schemes on Storage Devices[J]. Mobile Networks and Applications, 2017, 22:40-50.
doi: 10.1007/s11036-016-0677-9
|
[3] |
刘红燕. 云存储环境中安全的重复数据删除方法研究[D]. 青岛: 青岛大学, 2020.
|
[4] |
PAULO J, PEREIRA J. A Survey and Classification of Storage Deduplication Systems[J]. ACM Computing Surveys (CSUR), 2014, 47(1):1-30.
|
[5] |
刘小梅, 唐鑫, 杨舒婷, 等. 基于Reed-Solomon编码的抗边信道攻击云数据安全去重方法[J]. 信息安全学报, 2022, 7(6):80-93.
|
|
LIU Xiaomei, TANG Xin, YANG Shuting, et al. Reed-Solomon Coding Based Secure Deduplication for Cloud Storage with Resistance Against Side Channel Attack[J]. Journal of Cyber Security, 2022, 7(6):80-93.
|
[6] |
RABOTKA V, MANNAN M. An Evaluation of Recent Secure Deduplication Proposals[J]. Journal of Information Security & Applications, 2016, 27:3-18.
|
[7] |
ZUO P F, HUA Y, WANG C, et al. Mitigating Traffic-Based Side Channel Attacks in Bandwidth-Efficient Cloud Storage[C]//The 32th IEEE International Parallel and Distributed Processing Symposium(IPDPS). Piscataway:IEEE, 2018:1153-1162.
|
[8] |
唐鑫, 周琳娜, 单伟杰, 等. 基于阈值重加密的抗边信道攻击云数据安全去重方法[J]. 通信学报, 2020, 41(6):98-111.
doi: 10.11959/j.issn.1000-436x.2020103
|
|
TANG Xin, ZHOU Linna, SHAN Weijie, et al. Threshold Re-Encryption Based Secure Deduplication Method for Cloud Data with Resistance Against Side Channel Attack[J]. Journal of Communications, 2020, 41(6):98-111.
doi: 10.11959/j.issn.1000-436x.2020103
|
[9] |
HEEN O, NEUMANN C, MONTALVO L, et al. Improving the Resistance to Side-channel Attacks on Cloud Storage Services[C]//International Conference on New Technologies,Mobility and Security(NTMS). Piscataway:IEEE, 2012:1-5.
|
[10] |
高原, 咸鹤群, 穆雪莲, 等. 基于阈值自适应调整的重复数据删除方案[J]. 青岛大学学报:自然科学版, 2019, 32(4):36-39.
|
|
GAO Yuan, XIAN Hequn, MU Xuelian, et al. Data Deduplication Scheme Based on Adaptive Adjustment of Threshold[J]. Journal of Qingdao University:Natural Science Edition, 2019, 32(4):36-39.
|
[11] |
TANG X, CHEN X, ZHOU R, et al. Marking Based Obfuscation Strategy to Resist Side Channel Attack in Cross-User Deduplication for Cloud Storage[C]//The 21th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom). Piscataway:IEEE, 2022:1-9.
|
[12] |
TANG X, ZHANG Y, ZHOU L N, et al. Request Merging Based Cross-User Deduplication for Cloud Storage with Resistance Against Appending Chunks Attack[J]. Chinese Journal of Electronics, 2021, 30(2):199-209.
doi: 10.1049/cje2.v30.2
|
[13] |
LEE S, CHOI D. Privacy-Preserving Cross-User Source-Based Data Deduplication in Cloud Storage[C]//International Conference on ICT Convergence. Piscataway:IEEE, 2012:329-330.
|
[14] |
WANG B, LOU W, HOU Y T. Modeling the Side-Channel Attacks in Data Deduplication with Game Theory[C]//2015 IEEE Conference on Communications and Network Security(CNS).Piscataway:IEEE, 2015:200-208.
|
[15] |
TANG X, ZHOU L, HU B, et al. Aggregation-Based Tag Deduplication for Cloud Storage with Resistance Against Side Channel Attack[J]. Security and Communication Networks, 2021, 2021:1-15.
|
[16] |
ZHANG Y, MAO Y, XU M, et al. Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(3):1008-1018.
|
[17] |
YU C M, GOCHHAYAT S P, CONTI M, et al. Privacy Aware Data Deduplication for Side Channel in Cloud Storage[J]. IEEE Transactions on Cloud Computing, 2018, 8(2):597-609.
doi: 10.1109/TCC.6245519
|
[18] |
POORANIAN Z, CHEN K C, YU C M, et al. RARE:Defeating Side Channels Based on Data-Deduplication in Cloud Storage[C]//The 39th IEEE International Conference on Computer Communications Workshops (INFOCOM WKSHPS). Piscataway:IEEE, 2018:444-449.
|
[19] |
VESTERGAARD R, ZHANG Q, LUCANI D E. CIDER:A Low Overhead Approach to Privacy Aware Client-Side Deduplication[C]//The 63th IEEE Global Communications Conference(GLOBALCOM). Piscataway:IEEE, 2021:1-6.
|
[20] |
HA G, CHEN H, JIA C, et al. Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication[J]. Tsinghua Science and Technology, 2022, 28(1):1-12.
|
[21] |
TANG X, ZHOU L N, HUANG Y F, et al. Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption[C]//The 17th IEEE International Conference on Trust,Security and Privacy in Computing and Communications. Piscataway:IEEE, 2018:897-904.
|
[22] |
WANG Y H, TANG X, ZHOU Y T, et al. Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage[C]//The Seventh International Conference on Data Mining and Big Data(DMBD'2022).Heidelberg:Springer, 2022:303-318.
|
[23] |
BECKER B, KOHAVI R.Census Income (2002)[R/OL].[2002-01-01]. https://archive.ics.uci.edu/ml/machine-learning-databases/adult/adult.data.
|
[24] |
COHEN W W. Enron Email Dataset (2015)[R/OL].[2015-05-07]. https://www.cs.cmu.edu/-enron/.
|