{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:00:46Z","timestamp":1756893646348,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319654812"},{"type":"electronic","value":"9783319654829"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65482-9_20","type":"book-chapter","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T18:08:09Z","timestamp":1502388489000},"page":"297-312","source":"Crossref","is-referenced-by-count":6,"title":["Secure Encrypted Data Deduplication with Ownership Proof and User Revocation"],"prefix":"10.1007","author":[{"given":"Wenxiu","family":"Ding","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2078861.2078864","volume":"7","author":"DT Meyer","year":"2012","unstructured":"Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4), 1\u201320 (2012)","journal-title":"ACM Trans. Storage"},{"key":"20_CR2","first-page":"1","volume":"99","author":"M Ali","year":"2015","unstructured":"Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 99, 1\u201310 (2015)","journal-title":"IEEE Syst. J."},{"key":"20_CR3","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","volume":"49","author":"C Liu","year":"2015","unstructured":"Liu, C., Yang, C., Zhang, X.Y., Chen, J.J.: External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener. Comput. Syst. 49, 58\u201367 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Puzio, P., Molva, R., Onen, M., Loureiro, S.: ClouDedup: secure deduplication with encrypted data for cloud storage. In: Proceedings of IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 363\u2013370. IEEE (2013)","DOI":"10.1109\/CloudCom.2013.54"},{"key":"20_CR5","unstructured":"Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of USENIX Security Symposium, p. 5 (2011)"},{"issue":"11","key":"20_CR6","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1109\/TKDE.2016.2580139","volume":"28","author":"J Hur","year":"2016","unstructured":"Hur, J., Koo, D., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113\u20133125 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"20_CR7","doi-asserted-by":"crossref","first-page":"5889","DOI":"10.1007\/s11042-015-2595-4","volume":"76","author":"H Kwon","year":"2017","unstructured":"Kwon, H., Hahn, C., Kim, D., Hur, J.: Secure deduplication for multimedia data with user revocation in cloud storage. Multimedia Tools Appl. 76(4), 5889\u20135903 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"20_CR8","unstructured":"Dropbox: A file-storage and sharing service. http:\/\/www.dropbox.com\/"},{"key":"20_CR9","unstructured":"Google Drive. http:\/\/drive.google.com"},{"key":"20_CR10","unstructured":"Mozy, Mozy: a file-storage and sharing service. http:\/\/mozy.com\/"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Sun, Z., Shen, J., Yong, J.M.: DeDu: building a deduplication storage system over cloud computing. In: IEEE International Conference on Computer Supported Cooperative Work in Design, pp. 348\u2013355. IEEE (2014)","DOI":"10.1109\/CSCWD.2011.5960097"},{"key":"20_CR12","unstructured":"Wallace, G., Douglis, F., Qian, H.W., Shilane, P., Smaldone, S., Chamness, M., Hsu, W.: Characteristics of backup workloads in production systems. In: Proceedings of USENIX Conference on File and Storage Technologies, p. 500 (2012)"},{"key":"20_CR13","unstructured":"Wilcox, Z.O.: Convergent encryption reconsidered (2011). http:\/\/www.mail-archive.com\/cryptography@metzdowd.com\/msg08949.html"},{"key":"20_CR14","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server aided encryption for deduplicated storage. In: Proceedings of 22nd USENIX Conference on Security, pp. 179\u2013194 (2013)"},{"issue":"4","key":"20_CR15","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/TCSS.2015.2514088","volume":"2","author":"M Wen","year":"2015","unstructured":"Wen, M., Ota, K., Li, H., Lei, J.S., Gu, C.H., Su, Z.: Secure data deduplication with reliable key management for dynamic updates in CPSS. IEEE Trans. Comput. Soc. Syst. 2(4), 137\u2013147 (2015)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 874\u2013885. ACM (2015)","DOI":"10.1145\/2810103.2813623"},{"issue":"2","key":"20_CR17","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCC.2016.29","volume":"3","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Wang, M.J., Li, Y.X., Vasilakos, A.V.: Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. 3(2), 28\u201335 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-319-27137-8_40","volume-title":"Algorithms and Architectures for Parallel Processing","author":"Z Yan","year":"2015","unstructured":"Yan, Z., Ding, W., Zhu, H.: A scheme to manage encrypted data storage with deduplication in cloud. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9530, pp. 547\u2013561. Springer, Cham (2015). doi: 10.1007\/978-3-319-27137-8_40"},{"issue":"2","key":"20_CR19","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/TBDATA.2016.2587659","volume":"2","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Ding, W.X., Yu, X.X., Zhu, H.Q., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2(2), 138\u2013150 (2016)","journal-title":"IEEE Trans. Big Data"},{"key":"20_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-35795-4_32","volume-title":"Trustworthy Computing and Services","author":"C Liu","year":"2013","unstructured":"Liu, C., Liu, X., Wan, L.: Policy-based de-duplication in secure cloud storage. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 250\u2013262. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35795-4_32"},{"key":"20_CR21","unstructured":"Lillibridge, M., Eshghi, K., Bhagwat, D.: Improving restore speed for backup systems that use inline chunk-based deduplication. In: Proceedings of USENIX Conference on File and Storae Technologies, pp. 183\u2013198 (2013)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 491\u2013500. ACM (2011)","DOI":"10.1145\/2046707.2046765"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Pietro, R.D., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 81\u201382. ACM (2012)","DOI":"10.1145\/2414456.2414504"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Ng, W.K., Wen, Y., Zhu, H.: Private data deduplication protocols in cloud storage. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 441\u2013446. ACM (2012)","DOI":"10.1145\/2245276.2245361"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Yang, C., Ren, J., Ma, J.F.: Provable ownership of file in de-duplication cloud storage. In: IEEE Global Communications Conference, pp. 695\u2013700. IEEE (2013)","DOI":"10.1109\/GLOCOM.2013.6831153"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-40061-5_3","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"E Bresson","year":"2003","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37\u201354. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-40061-5_3"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65482-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T21:48:34Z","timestamp":1750801714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65482-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319654812","9783319654829"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65482-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}