{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T23:10:03Z","timestamp":1748646603337,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_25","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T20:20:13Z","timestamp":1444076413000},"page":"243-251","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure Image Deduplication in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Han","family":"Gang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hongyang","family":"Yan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lingling","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud, vol. 53, issue 6, p. 50 (2009)","key":"25_CR1"},{"unstructured":"Gantz, J.F., Ghute, C., Manfrediz, A., Minton, S., Reinsel, D., Schilchting, W., Toncheva, A.: The diverse and exploding digital universe: an updated forecast of world wide information growth through 2010. IDC white paper, pp. 2\u201316, March 2008","key":"25_CR2"},{"unstructured":"Gantz, J., Reinsel, D.: The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the far east, December 2012. http:\/\/www.emc.com\/collateral\/analyst-reports\/idc-the-digital-universe-in-2020.pdf","key":"25_CR3"},{"unstructured":"Asaro, T., Biggar, H.: Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations, pp. 2\u201315. The Enterprise Strategy Group, July 2007","key":"25_CR4"},{"unstructured":"Tolia, N.: Using content addressable techniques to optimize client-server system. Doctoral thesis (2007)","key":"25_CR5"},{"doi-asserted-by":"crossref","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS, pp. 617\u2013624 (2002)","key":"25_CR6","DOI":"10.1109\/ICDCS.2002.1022312"},{"doi-asserted-by":"publisher","unstructured":"Sabzevar, A.P., Sousa, J.P.: Authentication, authorisation and auditing for ubiquitous computing: a survey and vision. In: IJSSC, ser (2014). doi: 10.1504\/IJSSC.2011.039107","key":"25_CR7","DOI":"10.1504\/IJSSC.2011.039107"},{"doi-asserted-by":"publisher","unstructured":"Yuriyama, M., Kushida, T.: Integrated cloud computing environment with it resources and sensor devices. In: IJSSC, ser (2014). doi: 10.1504\/IJSSC.2011.040342","key":"25_CR8","DOI":"10.1504\/IJSSC.2011.040342"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2013","unstructured":"Li, J., Chen, X., Li, M., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25, 1615\u20131625 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"unstructured":"Bolosky, W.J., Corbin, S., Goebel, D.: Single instance storage in windows 2000. In: Proceedings of the 4th USENIX Windows Systems Symposium, pp. 13\u201324. Seattle, WA, USA (2000)","key":"25_CR10"},{"doi-asserted-by":"crossref","unstructured":"Adya, A., Bolosky, W.J., Castro, M.: Federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp. 1\u201314. Boston, MA, USA (2002)","key":"25_CR11","DOI":"10.1145\/1060289.1060291"},{"unstructured":"EMC Centera: Content Addressed Storage System. EMC CORPORATION (2003)","key":"25_CR12"},{"unstructured":"Policroniades, C., Pratt, L.: Alternative for detecting redundancy in storage systems data. In: Proceedings of the 2004 USENIX Annual Technical Conference, pp. 73\u201386. Boston, MA, USA (2004)","key":"25_CR13"},{"unstructured":"Rabin, M.O.: Fingerprinting by random polynomials. Technical report, Center for Research in Computing Technology, Harvard University (1981)","key":"25_CR14"},{"unstructured":"Henson, V.: An analysis of compare-by-hash. In: Proceedings of The 9th Workshop on Hot Topics in Operating Systems, pp. 13\u201318. Lihue, Hawaii, USA (2003)","key":"25_CR15"},{"unstructured":"Ungureanu, C., Atkin, B., Aranya, A.: A high-throughput file system for the HYDRAstor content-addressable storage system. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, pp. 225\u2013238. San Jose, CA, USA (2010)","key":"25_CR16"},{"unstructured":"Clements, A.T., Ahmad, I., Vilayannur, M.: Decentralized deduplication in SAN cluster file systems. In: Proceedings of the 2009 USENIX Annual Technical Conference, pp. 101\u2013114. San Diego, CA, USA (2009)","key":"25_CR17"},{"doi-asserted-by":"crossref","unstructured":"Fu, Y., Jiang, H., Xiao, N.: AA-Dedupe: an application-aware source deduplication approach for cloud backup services in the personal computing environment. In: Proceedings of the 2011 IEEE International Conference on Cluster Computing, pp. 112\u2013120. Austin, TX, USA (2011)","key":"25_CR18","DOI":"10.1109\/CLUSTER.2011.20"},{"doi-asserted-by":"crossref","unstructured":"Tan, Y., Feng, D., Zhou, G.: DAM: a data ownership-aware multi-layered de-duplication scheme. In: Proceedings of the 6th IEEE International Conference on Networking. Architecture and Storage (NAS2010), pp. 403\u2013411. Macau, China (2006)","key":"25_CR19","DOI":"10.1109\/NAS.2010.57"},{"doi-asserted-by":"publisher","unstructured":"Li, X., Li, J., Huang, F.: A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Computing (2015). doi: 10.1007\/s00500-015-1596-6","key":"25_CR20","DOI":"10.1007\/s00500-015-1596-6"},{"doi-asserted-by":"crossref","unstructured":"Pizzolante, R., Carpentieri, B., Castiglione, A.: A secure low complexity approach for compression and transmission of 3-D medical images. In: Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 387\u2013392 (2013)","key":"25_CR21","DOI":"10.1109\/BWCCA.2013.68"},{"doi-asserted-by":"crossref","unstructured":"Pizzolante R., Castiglione A., Carpentieri B., De Santis A., Castiglione A.: Protection of microscopy images through digital watermarking techniques. In: Intelligent Networking and Collaborative Systems (INCoS), pp. 65\u201372 (2014)","key":"25_CR22","DOI":"10.1109\/INCoS.2014.116"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Proceedings of IACR Cryptology ePrint Archive, pp. 296\u2013312 (2012)","key":"25_CR23","DOI":"10.1007\/978-3-642-38348-9_18"},{"doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute based encryption for fine-grained access conrol of encrypted data. In: ACM conference on Computer and Communications Security, pp. 99\u2013112 (2006)","key":"25_CR24","DOI":"10.1145\/1180405.1180418"},{"doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: the 14th ACM Conference on Computer and Communications Security, pp. 195\u2013203 (2007)","key":"25_CR25","DOI":"10.1145\/1315245.1315270"},{"doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) Proceedings of ACM Conference on Computer and Communication Security, pp. 491\u2013500 (2011)","key":"25_CR26","DOI":"10.1145\/2046707.2046765"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:37:37Z","timestamp":1748644657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}