{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:08:19Z","timestamp":1761102499519,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s12652-022-03875-0","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T10:09:07Z","timestamp":1652782147000},"page":"89-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud"],"prefix":"10.1007","volume":"15","author":[{"given":"Waqas Ajmal","family":"Khan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6609-5928","authenticated-orcid":false,"given":"Fawad","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shahzaib","family":"Tahir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yinghui","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faisal","family":"Amjad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, pp 598\u2013609","key":"3875_CR1","DOI":"10.1145\/1315245.1315318"},{"doi-asserted-by":"crossref","unstructured":"Barak B, Dodis Y, Krawczyk H, Pereira O, Pietrzak K, Standaert F-X, Yu Y (2011) Leftover hash lemma, revisited. In: Annual cryptology conference. Springer, New York, pp 1\u201320","key":"3875_CR2","DOI":"10.1007\/978-3-642-22792-9_1"},{"doi-asserted-by":"crossref","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, New York, pp 296\u2013312","key":"3875_CR3","DOI":"10.1007\/978-3-642-38348-9_18"},{"issue":"1","key":"3875_CR4","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-015-9216-2","volume":"30","author":"D Cash","year":"2017","unstructured":"Cash D, K\u00fcp\u00fc A, Wichs D (2017) Dynamic proofs of retrievability via oblivious ram. J Cryptol 30(1):22\u201357","journal-title":"J Cryptol"},{"doi-asserted-by":"crossref","unstructured":"Chen L, Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) Report on post-quantum cryptography, vol 12. US Department of Commerce, National Institute of Standards and Technology","key":"3875_CR5","DOI":"10.6028\/NIST.IR.8105"},{"issue":"12","key":"3875_CR6","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1109\/TIFS.2015.2470221","volume":"10","author":"R Chen","year":"2015","unstructured":"Chen R, Mu Y, Yang G, Guo F (2015) Bl-mle: block-level message-locked encryption for secure large file deduplication. IEEE Trans Inf Forensics Security 10(12):2643\u20132652","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"1","key":"3875_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97\u2013139","journal-title":"SIAM J Comput"},{"doi-asserted-by":"crossref","unstructured":"Douceur JR, Adya A, William JB, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems. IEEE, pp 617\u2013624","key":"3875_CR8","DOI":"10.1109\/ICDCS.2002.1022312"},{"unstructured":"Douceur JR, Bolosky WJ, Theimer MM (2007) Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys, September\u00a04 . US Patent 7,266,689","key":"3875_CR9"},{"unstructured":"Dropbox (2011a) Dropship. dropbox api utilities. https:\/\/github.com\/driverdan\/dropship. Accessed 20 Aug 2021","key":"3875_CR10"},{"unstructured":"Dropbox (2011b) Dropbox left user accounts unlocked for 4 hours Sunday. https:\/\/www.wired.com\/2011\/06\/dropbox-4\/. Accessed 20 Aug 2021","key":"3875_CR11"},{"key":"3875_CR13","volume-title":"Foundations of cryptography: volume 2, basic applications","author":"O Goldreich","year":"2009","unstructured":"Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press, Cambridge"},{"issue":"2","key":"3875_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28(2):270\u2013299","journal-title":"J Comput Syst Sci"},{"doi-asserted-by":"crossref","unstructured":"Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security, pp 491\u2013500","key":"3875_CR15","DOI":"10.1145\/2046707.2046765"},{"issue":"4","key":"3875_CR16","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1007\/s11036-019-01504-3","volume":"26","author":"Y He","year":"2021","unstructured":"He Y, Xian H, Wang L, Zhang S (2021) Secure encrypted data deduplication based on data popularity. Mobile Netw Appl 26(4):1686\u20131695","journal-title":"Mobile Netw Appl"},{"issue":"2012","key":"3875_CR12","first-page":"1","volume":"2007","author":"G John","year":"2012","unstructured":"John G, David R (2012) The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. IDC iView IDC Analyze Future 2007(2012):1\u201316","journal-title":"IDC iView IDC Analyze Future"},{"unstructured":"Keelveedhi S, Bellare M, Ristenpart T (2013) $$\\{DupLESS\\}:\\{Server-Aided\\}$$ encryption for deduplicated storage. In: 22nd USENIX security symposium (USENIX security 13), pp 179\u2013194","key":"3875_CR17"},{"issue":"6","key":"3875_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2016.120","volume":"14","author":"N Koblitz","year":"2016","unstructured":"Koblitz N, Menezes A (2016) A riddle wrapped in an enigma. IEEE Security Privacy 14(6):34\u201342","journal-title":"IEEE Security Privacy"},{"issue":"6","key":"3875_CR19","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2013","unstructured":"Li J, Chen X, Mi Li J, Li PPC Lee, Lou W (2013) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"crossref","unstructured":"Mavroeidis V, Vishi K, Zych MD, J\u00f8sang AJ (2018) The impact of quantum computing on present cryptography. arXiv preprint arXiv:1804.00200","key":"3875_CR20","DOI":"10.14569\/IJACSA.2018.090354"},{"issue":"4","key":"3875_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2078861.2078864","volume":"7","author":"T Meyer Dutch","year":"2012","unstructured":"Meyer Dutch T, Bolosky William J (2012) A study of practical deduplication. ACM Trans Storage (ToS) 7(4):1\u201320","journal-title":"ACM Trans Storage (ToS)"},{"issue":"2","key":"3875_CR22","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10207-019-00455-w","volume":"19","author":"SK Nayak","year":"2020","unstructured":"Nayak SK, Tripathy S (2020) Seds: secure and efficient server-aided data deduplication scheme for cloud storage. Int J Inf Secur 19(2):229\u2013240","journal-title":"Int J Inf Secur"},{"unstructured":"NTRU (2012a) Ntru pkcs parameters. https:\/\/web.archive.org\/web\/20120606210107http:\/\/www.securityinnovation.com\/security-lab\/crypto\/155.html. Accessed 20 Aug 2021","key":"3875_CR23"},{"unstructured":"NTRU (2015) Ntru pkcs parameters. https:\/\/github.com\/Sapphirine\/ntru. Accessed 20 Aug 2021","key":"3875_CR24"},{"unstructured":"Pycrptodome (2021) Pycrptodome. https:\/\/github.com\/Legrandin\/pycryptodome. Accessed 20 Aug 2021","key":"3875_CR25"},{"doi-asserted-by":"crossref","unstructured":"Shacham H, Waters B (2008) Compact proofs of retrievability. In: International conference on the theory and application of cryptology and information security. Springer, pp 90\u2013107","key":"3875_CR26","DOI":"10.1007\/978-3-540-89255-7_7"},{"unstructured":"Twitter (2012) Twitter. tweet deck. https:\/\/money.cnn.com\/2012\/03\/30\/technology\/tweetdeck-bug-twitter\/index.htm. Accessed 20 Aug 2021","key":"3875_CR27"},{"doi-asserted-by":"crossref","unstructured":"Xu J, Chang E-C, Zhou J (2013) Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 195\u2013206","key":"3875_CR28","DOI":"10.1145\/2484313.2484340"},{"issue":"2","key":"3875_CR29","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/TCC.2018.2794542","volume":"8","author":"C-M Yu","year":"2018","unstructured":"Yu C-M, Gochhayat SP, Conti M, Lu C-S (2018) Privacy aware data deduplication for side channel in cloud storage. IEEE Trans Cloud Comput 8(2):597\u2013609","journal-title":"IEEE Trans Cloud Comput"},{"unstructured":"Yuan H, Chen X, Li J, Jiang T, Wang J, Deng R (2019) Secure cloud data deduplication with efficient re-encryption. IEEE Trans Services Comput","key":"3875_CR30"},{"doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S (2012) Secure and efficient proof of storage with deduplication. In: Proceedings of the second ACM conference on Data and application security and privacy, pp 1\u201312","key":"3875_CR31","DOI":"10.1145\/2133601.2133603"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-03875-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-03875-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-03875-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:19:56Z","timestamp":1708975196000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-03875-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["3875"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-03875-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"31 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}