{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T21:40:03Z","timestamp":1749764403014,"version":"3.41.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319500102"},{"type":"electronic","value":"9783319500119"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-50011-9_6","type":"book-chapter","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T07:10:32Z","timestamp":1479971432000},"page":"71-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds"],"prefix":"10.1007","author":[{"given":"Lei","family":"Lei","sequence":"first","affiliation":[]},{"given":"Quanwei","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,25]]},"reference":[{"key":"6_CR1","unstructured":"Amazon simple storage service. http:\/\/aws.amazon.com\/cn\/s3\/"},{"key":"6_CR2","unstructured":"Box. https:\/\/www.box.com\/"},{"key":"6_CR3","unstructured":"Debian security advisory. https:\/\/www.debian.org\/security\/2008\/dsa-1571"},{"key":"6_CR4","unstructured":"Dropbox. https:\/\/www.dropbox.com\/"},{"key":"6_CR5","unstructured":"Icloud. https:\/\/www.icloud.com\/"},{"key":"6_CR6","unstructured":"Microsoft azure. http:\/\/www.windowsazure.cn\/?fb=002"},{"key":"6_CR7","unstructured":"Openssl. https:\/\/www.openssl.org\/"},{"key":"6_CR8","unstructured":"These are not the certs youre looking for. http:\/\/dankaminsky.com\/2011\/08\/31\/notnotar\/"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., Youssef, F.: Transparent data deduplication in the cloud. In: The ACM SIGSAC Conference, pp. 886\u2013900 (2015)","DOI":"10.1145\/2810103.2813630"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song,\u00a0D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"1","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"6_CR12","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: USENIX Conference on Security, pp. 179\u2013194 (2013)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-38348-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Bellare","year":"2013","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296\u2013312. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38348-9_18"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998). doi:10.1007\/BFb0054122"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187\u2013198. ACM (2009)","DOI":"10.1145\/1653662.1653686"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Chen, B., Ammula, A.K., Curtmola, R.: Towards server-side repair for erasure coding-based distributed storage systems. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 281\u2013288. ACM (2015)","DOI":"10.1145\/2699026.2699122"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R.: Robust dynamic provable data possession. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 515\u2013525. IEEE (2012)","DOI":"10.1109\/ICDCSW.2012.57"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R.: Robust dynamic remote data checking for public clouds. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 1043\u20131045. ACM (2012)","DOI":"10.1145\/2382196.2382319"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R.: Towards self-repairing replication-based storage systems using untrusted clouds. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 377\u2013388. ACM (2013)","DOI":"10.1145\/2435349.2435402"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 31\u201342. ACM (2010)","DOI":"10.1145\/1866835.1866842"},{"issue":"SI","key":"6_CR21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1145\/844128.844155","volume":"36","author":"LP Cox","year":"2002","unstructured":"Cox, L.P., Murray, C.D., Noble, B.D.: Pastiche: making backup cheap and easy. ACM SIGOPS Oper. Syst. Rev. 36(SI), 285\u2013298 (2002)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: The 28th International Conference on Distributed Computing Systems, ICDCS 2008, pp. 411\u2013420. IEEE (2008)","DOI":"10.1109\/ICDCS.2008.68"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Dan, S., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: International Conference on Distributed Computing Systems, pp. 617\u2013624 (2002)","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Duan, Y.: Distributed key generation for encrypted deduplication: achieving the strongest privacy. In: CCSW, pp. 57\u201368 (2014)","DOI":"10.1145\/2664168.2664169"},{"issue":"4","key":"6_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 15 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: ACM Conference on Computer and Communications Security, pp. 491\u2013500. ACM (2011)","DOI":"10.1145\/2046707.2046765"},{"key":"6_CR27","unstructured":"Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: Network and Distributed System Security Symposium, NDSS 2003 (2003)"},{"key":"6_CR28","unstructured":"Killijian, M.O., Powell, D., Es, L.: A survey of cooperative backup mechanisms. Ubiquitous Computing (2006)"},{"key":"6_CR29","first-page":"1","volume":"1","author":"J Li","year":"2016","unstructured":"Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 1, 1 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"6_CR30","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615\u20131625 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"6_CR31","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","volume":"26","author":"J Li","year":"2015","unstructured":"Li, J., Li, Y.K., Chen, X., Lee, P.P.C., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206\u20131216 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Li, J., Qin, C., Lee, P.P.C., Li, J.: Rekeying for encrypted deduplication storage. In: IEEE\/IFIP International Conference on Dependable Systems and Networks (2016)","DOI":"10.1109\/DSN.2016.62"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 874\u2013885 (2015)","DOI":"10.1145\/2810103.2813623"},{"issue":"4","key":"6_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2078861.2078864","volume":"7","author":"DT Meyer","year":"2012","unstructured":"Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4), 1 (2012)","journal-title":"ACM Trans. Storage"},{"key":"6_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/BFb0052348","volume-title":"Fast Software Encryption","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210\u2013218. Springer, Heidelberg (1997). doi:10.1007\/BFb0052348"},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-662-45472-5_8","volume-title":"Financial Cryptography and Data Security","author":"J Stanek","year":"2014","unstructured":"Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 99\u2013118. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-45472-5_8"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Storer, M.W., Greenan, K., Long, D.D.E., Miller, E.L.: Secure data deduplication. In: ACM Workshop on Storage Security and Survivability, pp. 1\u201310 (2008)","DOI":"10.1145\/1456469.1456471"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Tang, H., Cui, Y., Guan, C., Wu, J., Weng, J., Ren, K.: Enabling ciphertext deduplication for secure cloud storage and access control. In: ACM on Asia Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2897845.2897846"},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04444-1_22"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 195\u2013206 (2013)","DOI":"10.1145\/2484313.2484340"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Wenjing, L.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM 2010, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462174"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50011-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T20:58:48Z","timestamp":1749761928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-50011-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319500102","9783319500119"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50011-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icics2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}