{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:07:04Z","timestamp":1729645624371,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7906969","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T21:12:50Z","timestamp":1493068370000},"page":"239-246","source":"Crossref","is-referenced-by-count":0,"title":["CloudEFS: Efficient and secure file system for cloud storage"],"prefix":"10.1109","author":[{"given":"Clemens","family":"Zeidler","sequence":"first","affiliation":[]},{"given":"Muhammad Rizwan","family":"Asghar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/356989.357007","article-title":"OceanStore: An architecture for global-scale persistent storage","volume":"35","author":"kubiatowicz","year":"2000","journal-title":"SIGPLAN Not"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103783"},{"key":"ref31","first-page":"197","article-title":"NCryptfs: A secure and convenient cryptographic file system","author":"wright","year":"2003","journal-title":"Proc USENIX Annual Technical Conference"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"},{"key":"ref35","first-page":"24","article-title":"Security considerations when designing a distributed file system using object storage devices","author":"reed","year":"2002","journal-title":"Security in Storage Workshop 2002 Proceedings First International IEEE"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2014.24"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1145\/502059.502052","article-title":"A low-bandwidth network file system","volume":"35","author":"muthitacharoen","year":"2001","journal-title":"ACM SIGOPS Operating Systems Review"},{"journal-title":"Fingerprinting by random polynomials","year":"1981","author":"rabin","key":"ref12"},{"key":"ref13","first-page":"369","author":"merkle","year":"1988","journal-title":"A DigitalSignature Based on a Conventional Encryption Function"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.54"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"ref17","first-page":"89","article-title":"Venti: A new approach to archival storage","volume":"2","author":"quinlan","year":"2002","journal-title":"FAST"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522721"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.154"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2012.6297923"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462420"},{"key":"ref27","first-page":"296","author":"bellare","year":"2013","journal-title":"Message-Locked Encryption and Secure Deduplication"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27585-2_12"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484340"},{"key":"ref5","first-page":"2005","article-title":"A framework for analyzing and improving content-based chunking algorithms","volume":"30","author":"eshghi","year":"2005","journal-title":"Hewlett-packard Labs Technical Report TR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5220\/0005863602740281"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456417"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/1-4020-8070-0_5","article-title":"Ensuring the integrity of encrypted databases in the database-as-a-service model","volume":"142","author":"hacig\u00fcm\u00fc?","year":"2004","journal-title":"Data and Applications Security XVH ser IFIP International Federation for Information Processing S De Capitani di Vimercati"},{"journal-title":"SPARER Secure cloud-proof storage for e-health scenarios","year":"2016","author":"gheorghe","key":"ref9"},{"key":"ref1","first-page":"29","article-title":"Plutus: Scalabel secure file sharing on untrusted storage","volume":"3","author":"kallahalla","year":"2003","journal-title":"FAST"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2003.10000"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5220\/0005758601710180"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2011.46"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"ref26","first-page":"175","article-title":"File recipe compression in data deduplication systems","author":"meister","year":"2013","journal-title":"Presented as part of the 11th USENIX Conference on File and Storage Technologies (FAST 13)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5220\/0005924003600367"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2016,12,12]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07906969.pdf?arnumber=7906969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T19:54:48Z","timestamp":1569095688000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7906969","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}