{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T05:49:32Z","timestamp":1773899372058,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972073"],"award-info":[{"award-number":["61972073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research Funds of Sichuan Province","award":["2020YFG0298"],"award-info":[{"award-number":["2020YFG0298"]}]},{"name":"Key Research Funds of Sichuan Province","award":["2021YFG0167"],"award-info":[{"award-number":["2021YFG0167"]}]},{"name":"Sichuan Science and Technology Program","award":["2020JDTD0007"],"award-info":[{"award-number":["2020JDTD0007"]}]},{"DOI":"10.13039\/501100010428","name":"Innovation and Technology Fund","doi-asserted-by":"publisher","award":["ITS\/315\/18FX"],"award-info":[{"award-number":["ITS\/315\/18FX"]}],"id":[{"id":"10.13039\/501100010428","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/tc.2021.3067326","type":"journal-article","created":{"date-parts":[[2021,3,18]],"date-time":"2021-03-18T19:48:31Z","timestamp":1616096911000},"page":"959-970","source":"Crossref","is-referenced-by-count":14,"title":["Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8457-0454","authenticated-orcid":false,"given":"Jingwei","family":"Li","sequence":"first","affiliation":[{"name":"Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Suyu","family":"Huang","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yanjing","family":"Ren","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6915-7100","authenticated-orcid":false,"given":"Zuoru","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4501-4364","authenticated-orcid":false,"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-1412","authenticated-orcid":false,"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yao","family":"Hao","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813630"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref7","first-page":"179","article-title":"DupLESS: Server-aided encryption for deduplicated storage,","volume-title":"Proc. 22nd USENIX Conf. Secur.","author":"Bellare"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"ref10","first-page":"85","article-title":"Compare-by-hash: A reasoned analysis,","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Black"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1210596.1210599"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670991"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664169"},{"key":"ref16","article-title":"A framework for analyzing and improving content-based chunking algorithms,","author":"Eshghi","year":"2005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"ref19","first-page":"1","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation,","volume-title":"Proc. Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Islam"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref21","article-title":"Bimodal content defined chunking for backup streams,","volume-title":"Proc. 8th USENIX Conf. File Storage Technol.","author":"Kruus"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.284"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2019.00007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387531"},{"key":"ref25","first-page":"111","article-title":"CDStore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal,","volume-title":"Proc. USENIX Conf. Usenix Annu. Tech. Conf.","author":"Li"},{"key":"ref26","first-page":"111","article-title":"Sparse indexing: Large scale, inline deduplication using sampling and locality,","volume-title":"Proc. 7th Conf. File Storage Technol.","author":"Lillibridge"},{"key":"ref27","article-title":"Metadata considered harmful \u2026 to deduplication,","volume-title":"Proc. 7th USENIX Conf. Hot Topics Storage File Syst.","author":"Lin"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2010.37"},{"key":"ref29","first-page":"315","article-title":"Using hints to improve inline block-layer deduplication,","volume-title":"Proc. 14th USENIX Conf. File Storage Technol.","author":"Mandal"},{"key":"ref30","first-page":"175","article-title":"File recipe compression in data deduplication systems,","volume-title":"Proc. 11th USENIX Conf. File Storage Technol.","author":"Meister"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"ref32","article-title":"Dark clouds on the horizon: Using cloud storage as attack vector and online slack space,","volume-title":"Proc. 20th USENIX Conf. Secur.","author":"Mulazzani"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3032966"},{"key":"ref34","article-title":"Fingerprinting by random polynomials,","author":"Rabin","year":"1981"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1987816.1987837"},{"key":"ref36","first-page":"333","article-title":"Lamassu: Storage-efficient host-side encryption,","volume-title":"Proc. USENIX Conf. Usenix Annu. Tech. Conf.","author":"Shah"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3183890"},{"key":"ref39","article-title":"Characteristics of backup workloads in production systems,","volume-title":"Proc. 10th USENIX Conf. File Storage Technol.","author":"Wallace"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2571298"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208297"},{"key":"ref42","article-title":"Avoiding the disk bottleneck in the data domain deduplication file system,","volume-title":"Proc. 6th USENIX Conf. File Storage Technol.","author":"Zhu"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/9732510\/09381688.pdf?arnumber=9381688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:39:06Z","timestamp":1704843546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9381688\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":38,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tc.2021.3067326","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}