{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:25:48Z","timestamp":1771698348188,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Open Research Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","award":["2019-MS-05"],"award-info":[{"award-number":["2019-MS-05"]}]},{"name":"National Key R&D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"name":"National Natural Science Foundation of China","award":["61972073 and 61602092"],"award-info":[{"award-number":["61972073 and 61602092"]}]},{"name":"Research Grants Council of Hong Kong","award":["CRF C7036-15G"],"award-info":[{"award-number":["CRF C7036-15G"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3342195.3387531","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:19:58Z","timestamp":1588576798000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Balancing storage efficiency and data confidentiality with tunable encrypted deduplication"],"prefix":"10.1145","author":[{"given":"Jingwei","family":"Li","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Zuoru","family":"Yang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Yanjing","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FSL traces and snapshots public archive. http:\/\/tracer.filesystems.org\/.  FSL traces and snapshots public archive. http:\/\/tracer.filesystems.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"LevelDB. https:\/\/github.com\/google\/leveldb.  LevelDB. https:\/\/github.com\/google\/leveldb."},{"key":"e_1_3_2_1_3_1","unstructured":"OpenSSL: Cryptography and SSL\/TLS toolkit. https:\/\/www.openssl.org\/.  OpenSSL: Cryptography and SSL\/TLS toolkit. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_21"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866801"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of USENIX ATC","author":"Amvrosiadis G.","year":"2015"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of USENIX LISA","author":"Anderson P.","year":"2010"},{"key":"e_1_3_2_1_9_1","unstructured":"A. Appleby. SMHasher. https:\/\/github.com\/aappleby\/smhasher.  A. Appleby. SMHasher. https:\/\/github.com\/aappleby\/smhasher."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813630"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053019"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_31"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of USENIX Security","author":"Bellare M.","year":"2013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236217"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of USENIX ATC","author":"Black J.","year":"2006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"key":"e_1_3_2_1_21_1","first-page":"21","volume-title":"Proc. of SEQUENCES","author":"Broder A. Z.","year":"1997"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of USENIX FAST","author":"Cao Z.","year":"2018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060316"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625127"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851884"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664169"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"e_1_3_2_1_33_1","volume-title":"Hard drive theft sees data of 1 million individuals exposed. https:\/\/www.hipaajoumal.com\/hard-drive-theft-sees-data-1-million-individuals-exposed-8859\/","author":"Journal IPAA","year":"2017"},{"key":"e_1_3_2_1_34_1","unstructured":"IDC. Data age 2025. https:\/\/www.seagate.com\/our-story\/data-age-2025\/.  IDC. Data age 2025. https:\/\/www.seagate.com\/our-story\/data-age-2025\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534540"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of USENIX FAST","author":"Kallahalla M.","year":"2003"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i1.277-313"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2019.00007"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.28"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. of USENIX ATC","author":"Li M.","year":"2015"},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of USENIX FAST","author":"Lillibridge M.","year":"2013"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of USENIX FAST","author":"Lillibridge M.","year":"2009"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76953-0_20"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. of USENIX FAST","author":"Lu L.","year":"2016"},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. of USENIX FAST","author":"Meister D.","year":"2013"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. of USENIX FAST","author":"Meyer D. T.","year":"2011"},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. of USENIX Security","author":"Mulazzani M.","year":"2011"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/972639.972643"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/322276.322287"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406888"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.54"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032966"},{"key":"e_1_3_2_1_60_1","volume-title":"Fingerprint by random polynomials","author":"Rabin M. C.","year":"1981"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996432"},{"key":"e_1_3_2_1_62_1","volume-title":"Proc. of USENIX ATC","author":"Shah P.","year":"2015"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2016.7897080"},{"key":"e_1_3_2_1_66_1","volume-title":"Proc. of USENIX FAST","author":"Wallace G.","year":"2012"},{"key":"e_1_3_2_1_67_1","unstructured":"Z. Wilcox-O'Hearn. Drew perttula and attacks on convergent encryption. https:\/\/tahoe-lafs.org\/hacktahoelafs\/drew_perttula.html.  Z. Wilcox-O'Hearn. Drew perttula and attacks on convergent encryption. https:\/\/tahoe-lafs.org\/hacktahoelafs\/drew_perttula.html."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456474"},{"key":"e_1_3_2_1_69_1","volume-title":"Proc. of USENIX ATC","author":"Xia W.","year":"2011"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053012"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208297"},{"key":"e_1_3_2_1_72_1","volume-title":"Proc. of USENIX FAST","author":"Zhu B.","year":"2008"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2018.00124"}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","location":"Heraklion Greece","acronym":"EuroSys '20","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Fifteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342195.3387531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:26Z","timestamp":1750207406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":72,"alternative-id":["10.1145\/3342195.3387531","10.1145\/3342195"],"URL":"https:\/\/doi.org\/10.1145\/3342195.3387531","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}