{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T16:11:01Z","timestamp":1765728661662,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS 1054754, DGE 1565478"],"award-info":[{"award-number":["CNS 1054754, DGE 1565478"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA\/AFRL","award":["A8650-15-C-7521"],"award-info":[{"award-number":["A8650-15-C-7521"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176315","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"13-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Secure Storage with Replication and Transparent Deduplication"],"prefix":"10.1145","author":[{"given":"Iraklis","family":"Leontiadis","sequence":"first","affiliation":[{"name":"Ecole Polytechnique Federale de Lausanne (EPFL) &amp; New Jersey Institute of Technology (NJIT), Lausanne, Switzerland"}]},{"given":"Reza","family":"Curtmola","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology (NJIT), Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"volume-title":"Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud Proc. of the 25th USENIX Security Symposium (USENIX Security '16)","author":"Armknecht Frederik","key":"e_1_3_2_1_1_1","unstructured":"Frederik Armknecht , Ludovic Barman , Jens-Matthias Bohli , and Ghassan O. Karame . 2016 a . Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud Proc. of the 25th USENIX Security Symposium (USENIX Security '16) . 1051--1068. Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, and Ghassan O. Karame. 2016 a. Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud Proc. of the 25th USENIX Security Symposium (USENIX Security '16). 1051--1068."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813630"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"volume-title":"Message-Locked Encryption and Secure Deduplication","author":"Bellare Mihir","key":"e_1_3_2_1_6_1","unstructured":"Mihir Bellare , Sriram Keelveedhi , and Thomas Ristenpart . 2013. Message-Locked Encryption and Secure Deduplication . Springer Berlin Heidelberg , Berlin, Heidelberg . Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. 2013. Message-Locked Encryption and Secure Deduplication. Springer Berlin Heidelberg, Berlin, Heidelberg."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046677"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435402"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-16868"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435353"},{"volume-title":"OOPS: Google \"loses\" your cloud data.","year":"2015","key":"e_1_3_2_1_14_1","unstructured":"http:\/\/www.computerworld.com\/. 2015 . OOPS: Google \"loses\" your cloud data. (2015). https:\/\/goo.gl\/zXRAdR http:\/\/www.computerworld.com\/. 2015. OOPS: Google \"loses\" your cloud data. (2015). https:\/\/goo.gl\/zXRAdR"},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/www.datacenterknowledge.com\/. 2012. Amazon Data Center Loses Power During Storm. (2012).  http:\/\/www.datacenterknowledge.com\/. 2012. Amazon Data Center Loses Power During Storm. (2012)."},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/www.infoworld.com\/. 2016. The dirty dozen: 12 cloud security threats. (2016). ttps:\/\/goo.gl\/i6tAsF  http:\/\/www.infoworld.com\/. 2016. The dirty dozen: 12 cloud security threats. (2016). ttps:\/\/goo.gl\/i6tAsF"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_18_1","unstructured":"Sriram Keelveedhi Mihir Bellare and Thomas Ristenpart. 2013. DupLESS: server-aided encryption for deduplicated storage Proc. of USENIX Security '13. 179--194.   Sriram Keelveedhi Mihir Bellare and Thomas Ristenpart. 2013. DupLESS: server-aided encryption for deduplicated storage Proc. of USENIX Security '13. 179--194."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"},{"volume-title":"Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST '11)","author":"Dutch","key":"e_1_3_2_1_20_1","unstructured":"Dutch T. Meyer and William J. Bolosky. 2011. A Study of Practical Deduplication . In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST '11) . 1--1. Dutch T. Meyer and William J. Bolosky. 2011. A Study of Practical Deduplication. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST '11). 1--1."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382227"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996433"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381926"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176315","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176315","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":24,"alternative-id":["10.1145\/3176258.3176315","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176315","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}