Tapping the potential: Secure chunk-based deduplication of encrypted data for cloud backup

W Sun, N Zhang, W Lou, YT Hou - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
We, in this work, investigate the problem of designing a secure chunk-based deduplication
scheme in the enterprise backup storage setting. Most of the existing works focus on …

A bandwidth-efficient middleware for encrypted deduplication

H Cui, C Wang, Y Hua, Y Du… - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
Data deduplication is a vital component of current cloud storage systems for optimized
space utilization. However, users cannot fairly enjoy the storage savings of deduplication …

A similarity-aware encrypted deduplication scheme with flexible access control in the cloud

Y Zhou, D Feng, Y Hua, W Xia, M Fu, F Huang… - Future Generation …, 2018 - Elsevier
Data deduplication has been widely used in the cloud to reduce storage space. To protect
data security, users encrypt data with message-locked encryption (MLE) to enable …

Information leakage in encrypted deduplication via frequency analysis: Attacks and defenses

J Li, PPC Lee, C Tan, C Qin, X Zhang - ACM Transactions on Storage …, 2020 - dl.acm.org
Encrypted deduplication combines encryption and deduplication to simultaneously achieve
both data security and storage efficiency. State-of-the-art encrypted deduplication systems …

Security-aware and efficient data deduplication for edge-assisted cloud storage systems

Q Xie, C Zhang, X Jia - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Data deduplication at the network edge significantly improves communication efficiency in
edge-assisted cloud storage systems. With the increasing concern about data privacy …

Privacy-preserving and updatable block-level data deduplication in cloud storage services

H Shin, D Koo, Y Shin, J Hur - 2018 IEEE 11th International …, 2018 - ieeexplore.ieee.org
To achieve high storage saving, data deduplication techniques are widely used in many
practical cloud storage services, which removes redundant data and keeps only a single …

Poster: Efficient cross-user chunk-level client-side data deduplication with symmetrically encrypted two-party interactions

CM Yu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
Data deduplication has been widely used in cloud storage to reduce the amount of storage
space and save bandwidth. Unfortunately, as an increasing number of sensitive data are …

Information leakage in encrypted deduplication via frequency analysis

J Li, C Qin, PPC Lee, X Zhang - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
Encrypted deduplication seamlessly combines encryption and deduplication to
simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted …

Tunable encrypted deduplication with attack-resilient key management

Z Yang, J Li, Y Ren, PPC Lee - ACM Transactions on Storage, 2022 - dl.acm.org
Conventional encrypted deduplication approaches retain the deduplication capability on
duplicate chunks after encryption by always deriving the key for encryption/decryption from …

Secure encrypted data deduplication for cloud storage against compromised key servers

Y Zhang, C Xu, N Cheng, X Shen - 2019 IEEE global …, 2019 - ieeexplore.ieee.org
Message-locked encryption (MLE) is a special type of symmetric encryption enabling
deduplication over ciphertexts. Since an MLE key is extracted from the message itself, it is …