{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:10:23Z","timestamp":1756570223310,"version":"3.44.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031944574","type":"print"},{"value":"9783031944581","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94458-1_14","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T15:54:46Z","timestamp":1756569286000},"page":"284-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ADG-Dedup: Adaptive Dynamic Grained Deduplication Scheme for\u00a0IoT Data in\u00a0Cloud Storage"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9922-8426","authenticated-orcid":false,"given":"Xinyue","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7538-338X","authenticated-orcid":false,"given":"Hequn","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"issue":"3","key":"14_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jitr.2020070101","volume":"13","author":"S Garg","year":"2020","unstructured":"Garg, S., Gupta, B.: A comprehensive study on data deduplication: concepts, techniques and challenges. J. Inf. Technol. Res. 13(3), 1\u201323 (2020). https:\/\/doi.org\/10.4018\/jitr.2020070101","journal-title":"J. Inf. Technol. Res."},{"issue":"10","key":"14_CR2","doi-asserted-by":"publisher","first-page":"6775","DOI":"10.1109\/TII.2021.3060456","volume":"17","author":"M Gao","year":"2021","unstructured":"Gao, M., Jia, Y., Han, Z.: LEVER: secure deduplicated cloud storage with encrypted two-party interactions in cyber-physical systems. IEEE Trans. Industr. Inf. 17(10), 6775\u20136784 (2021). https:\/\/doi.org\/10.1109\/TII.2021.3060456","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3745\/JIPS.04.0102","volume":"15","author":"JH Chun","year":"2019","unstructured":"Chun, J.H., Lee, S.J., Kim, J.W.: An efficient data deduplication scheme based on differential encoding in cloud storage systems. J. Inf. Process. Syst. 15(1), 1\u201310 (2019). https:\/\/doi.org\/10.3745\/JIPS.04.0102","journal-title":"J. Inf. Process. Syst."},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s41635-020-00116-0","volume":"4","author":"N Mentens","year":"2020","unstructured":"Mentens, N., Verbauwhede, I.: Survey on side-channel attacks and defenses in cryptography. J. Hardware Syst. Secur. 4(2), 111\u2013140 (2020). https:\/\/doi.org\/10.1007\/s41635-020-00116-0","journal-title":"J. Hardware Syst. Secur."},{"issue":"4","key":"14_CR5","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1007\/s11277-021-08367-0","volume":"117","author":"X Shi","year":"2021","unstructured":"Shi, X., Wu, H., Jiang, K., Xiao, Y.: An encrypted data deduplication scheme based on cloud storage. Wirel. Pers. Commun. 117(4), 2009\u20132022 (2021). https:\/\/doi.org\/10.1007\/s11277-021-08367-0","journal-title":"Wirel. Pers. Commun."},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Bignold, A., et al.: A conceptual framework for externally-influenced agents: an assisted reinforcement learning review. J. Ambient. Intell. Humaniz. Comput., 1\u201324 (2021). https:\/\/doi.org\/10.1007\/s12652-021-03489-y","DOI":"10.1007\/s12652-021-03489-y"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, pp. 469-478 (2002). https:\/\/doi.org\/10.1109\/ICDCS.2002.1021701.","DOI":"10.1109\/ICDCS.2002.1021701."},{"issue":"7","key":"14_CR8","doi-asserted-by":"publisher","first-page":"6411","DOI":"10.1007\/s12652-021-03005-3","volume":"12","author":"F Huang","year":"2021","unstructured":"Huang, F., Cheng, Q., Liu, R., Feng, D.: A novel convergence encryption technique supporting deduplication in cloud storage. J. Ambient. Intell. Humaniz. Comput. 12(7), 6411\u20136424 (2021). https:\/\/doi.org\/10.1007\/s12652-021-03005-3","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-540-72540-4_25","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"R Granger","year":"2007","unstructured":"Granger, R., Hess, F., Oyono, R., Th\u00e9riault, N., Vercauteren, F.: Ate pairing on hyperelliptic curves. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 430\u2013447. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72540-4_25"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Liu, X., Yang, G., Susilo, W., Tonien, J., Lv, X.: Message-Locked searchable encryption: a new versatile tool for secure cloud storage. IEEE Trans. Serv. Comput. PP(99), 1-1 (2020). https:\/\/doi.org\/10.1109\/TSC.2020.2992948","DOI":"10.1109\/TSC.2020.2992948"},{"issue":"12","key":"14_CR11","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1109\/TIFS.2015.2483341","volume":"10","author":"R Chen","year":"2015","unstructured":"Chen, R., Mu, Y., Yang, G., Guo, F.: BL-MLE: block-level message-locked encryption for secure large file deduplication. IEEE Trans. Inf. Forensics Secur. 10(12), 2643\u20132652 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2483341","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"14_CR12","doi-asserted-by":"publisher","first-page":"3891","DOI":"10.1007\/s12652-020-01828-x","volume":"11","author":"Y Dai","year":"2020","unstructured":"Dai, Y., Wen, Q., Zhang, Y., Li, J.: BL-MLE: block-level message-locked encryption for secure large file deduplication. J. Ambient. Intell. Humaniz. Comput. 11(9), 3891\u20133903 (2020). https:\/\/doi.org\/10.1007\/s12652-020-01828-x","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Puzio, P., Molva, R., Nen, M., Loureiro, S.: ClouDedup: secure deduplication with encrypted data for cloud storage. In: IEEE International Conference on Cloud Computing Technology and Science, pp. 410-417 (2013). https:\/\/doi.org\/10.1109\/CloudCom.2013.92","DOI":"10.1109\/CloudCom.2013.92"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: International Conference on Financial Cryptography and Data Security, pp. 99-118. Springer (2014).https:\/\/doi.org\/10.1007\/978-3-662-44774-1_8","DOI":"10.1007\/978-3-662-44774-1_8"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Puzio, P., Molva, R., M., Loureiro, S.: PerfectDedup: secure data deduplication. In Data Privacy Management, and Security Assurance, pp. 150-166. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-23276-4_11","DOI":"10.1007\/978-3-319-23276-4_11"},{"issue":"4","key":"14_CR16","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/TDSC.2016.2613086","volume":"15","author":"J Stanek","year":"2018","unstructured":"Stanek, J., Kencl, L.: Enhanced secure thresholded data deduplication scheme for cloud storage. IEEE Trans. Dependable Secure Comput. 15(4), 694\u2013707 (2018). https:\/\/doi.org\/10.1109\/TDSC.2016.2613086","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"P Singh","year":"2018","unstructured":"Singh, P., Agarwal, N., Raman, B.: Secure data deduplication using secret sharing schemes over cloud. Futur. Gener. Comput. Syst. 88, 156\u2013167 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.05.046","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"14_CR18","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s11277-020-07222-4","volume":"113","author":"X Zhou","year":"2020","unstructured":"Zhou, X., et al.: A secure, efficient and practical group key management scheme for secure communications in industrial internet of things. Wireless Pers. Commun. 113(1), 69\u201392 (2020)","journal-title":"Wireless Pers. Commun."},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Huang, K., Zhang, X. S., Mu, Y., Rezaeibagha, F., Du, X.: Bidirectional and malleable proof-of-ownership for large file in cloud storage. IEEE Trans. Cloud Comput. PP(99), 1-1 (2021). https:\/\/doi.org\/10.1109\/TCC.2021.3112416","DOI":"10.1109\/TCC.2021.3112416"},{"issue":"3","key":"14_CR20","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1002\/int.22331","volume":"36","author":"M Miao","year":"2021","unstructured":"Miao, M., Tian, G., Susilo, W.: New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. Int. J. Intell. Syst. 36(3), 435\u2013448 (2021). https:\/\/doi.org\/10.1002\/int.22331","journal-title":"Int. J. Intell. Syst."},{"issue":"6","key":"14_CR21","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1109\/TSC.2017.2748594","volume":"13","author":"Y Shin","year":"2020","unstructured":"Shin, Y., Koo, D., Yun, J., Hur, J.: Decentralized server-aided encryption for secure deduplication in cloud storage. IEEE Trans. Serv. Comput. 13(6), 1021\u20131033 (2020). https:\/\/doi.org\/10.1109\/TSC.2017.2748594","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"13","key":"14_CR22","doi-asserted-by":"publisher","first-page":"6183","DOI":"10.1007\/s00521-020-05304-w","volume":"33","author":"P Xie","year":"2021","unstructured":"Xie, P., et al.: A splitting majority voting-based extreme learning machine for fault diagnosis. Neural Comput. Appl. 33(13), 6183\u20136192 (2021). https:\/\/doi.org\/10.1007\/s00521-020-05304-w","journal-title":"Neural Comput. Appl."},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Walden, J.: OpenSSL 3.0.0: An exploratory case study. In: 2022 IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR), pp. 735-737 (2022). https:\/\/doi.org\/10.1145\/3524842.3528035.","DOI":"10.1145\/3524842.3528035."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94458-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T15:54:47Z","timestamp":1756569287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94458-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783031944574","9783031944581"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94458-1_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}