{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:20:57Z","timestamp":1770222057347,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/infcomw.2018.8406888","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T22:35:01Z","timestamp":1532385301000},"page":"444-449","source":"Crossref","is-referenced-by-count":55,"title":["RARE: Defeating side channels based on data-deduplication in cloud storage"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Pooranian","sequence":"first","affiliation":[]},{"given":"Kang-Cheng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chia-Mu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.284"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2012.6386851"},{"key":"ref12","year":"0","journal-title":"Mozy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2015.08.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1159"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346829"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2571298"},{"key":"ref18","article-title":"FastCDC: a fast and efficient content-defined chunking approach for data deduplication","author":"xia","year":"2016","journal-title":"USENIX Annual Technical Conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2794542"},{"key":"ref4","year":"0","journal-title":"Enron Email Dataset"},{"key":"ref3","article-title":"Understanding data deduplication ratios","author":"dutch","year":"2008","journal-title":"Data Management Forum"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208705"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"ref8","article-title":"Dupless: Server-aided encryption for deduplicated storage","author":"keelveedhi","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"}],"event":{"name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Honolulu, HI","start":{"date-parts":[[2018,4,15]]},"end":{"date-parts":[[2018,4,19]]}},"container-title":["IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8401302\/8406774\/08406888.pdf?arnumber=8406888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T08:00:34Z","timestamp":1533024034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2018.8406888","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}