{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T08:01:07Z","timestamp":1764403267339,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT)","award":["UIDB\/50021\/2020 (INESC-ID)","2020.05270.BD"],"award-info":[{"award-number":["UIDB\/50021\/2020 (INESC-ID)","2020.05270.BD"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,27]]},"DOI":"10.1145\/3555776.3577711","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:16:29Z","timestamp":1686158189000},"page":"143-151","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Deduplication vs Privacy Tradeoffs in Cloud Storage"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6719-3589","authenticated-orcid":false,"given":"Rodrigo","family":"Silva","sequence":"first","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior T\u00e9cnico, INESC-ID, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3082-1179","authenticated-orcid":false,"given":"Cl\u00e1udio","family":"Correia","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior T\u00e9cnico, INESC-ID, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior T\u00e9cnico, INESC-ID, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0313-6590","authenticated-orcid":false,"given":"Luis","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Instituto Superior T\u00e9cnico, INESC-ID, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Bellare Mihir","year":"2013","unstructured":"Mihir Bellare , Sriram Keelveedhi , and Thomas Ristenpart . 2013 . Message-locked encryption and secure deduplication . In International Conference on the Theory and Applications of Cryptographic Techniques . Athens, Greece. Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. 2013. Message-locked encryption and secure deduplication. In International Conference on the Theory and Applications of Cryptographic Techniques. Athens, Greece."},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Camenisch Jan","year":"2007","unstructured":"Jan Camenisch , Gregory Neven , and Abhi Shelat . 2007 . Simulatable adaptive oblivious transfer . In International Conference on the Theory and Applications of Cryptographic Techniques . Barcelona, Spain. Jan Camenisch, Gregory Neven, and Abhi Shelat. 2007. Simulatable adaptive oblivious transfer. In International Conference on the Theory and Applications of Cryptographic Techniques. Barcelona, Spain."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"Correia Cl\u00e1udio","year":"2020","unstructured":"Cl\u00e1udio Correia , Miguel Correia , and Lu\u00eds Rodrigues . 2020 . Omega: a secure event ordering service for the edge . In IEEE\/IFIP International Conference on Dependable Systems and Networks . Valencia, Spain. Cl\u00e1udio Correia, Miguel Correia, and Lu\u00eds Rodrigues. 2020. Omega: a secure event ordering service for the edge. In IEEE\/IFIP International Conference on Dependable Systems and Networks. Valencia, Spain."},{"key":"e_1_3_2_1_4_1","volume-title":"PraDa: Privacy-preserving Data-Deduplication-as-a-Service. In International Conference on Conference on Information and Knowledge Management","author":"Dong Boxiang","year":"2014","unstructured":"Boxiang Dong , Ruilin Liu , and Wendy Hui Wang . 2014 . PraDa: Privacy-preserving Data-Deduplication-as-a-Service. In International Conference on Conference on Information and Knowledge Management . Shanghai, China. Boxiang Dong, Ruilin Liu, and Wendy Hui Wang. 2014. PraDa: Privacy-preserving Data-Deduplication-as-a-Service. In International Conference on Conference on Information and Knowledge Management. Shanghai, China."},{"key":"e_1_3_2_1_5_1","unstructured":"Dropbox. 2008. Retrieved 2022-10-14 from https:\/\/dropbox.com\/  Dropbox. 2008. Retrieved 2022-10-14 from https:\/\/dropbox.com\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Morris Dworkin. 2010. SP 800-38E. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. Retrieved 2022-10-14 from https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=904691  Morris Dworkin. 2010. SP 800-38E. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices. Retrieved 2022-10-14 from https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=904691"},{"key":"e_1_3_2_1_7_1","volume-title":"Benchmarking the Second Generation of Intel SGX Hardware. In International Conference on Management of Data","author":"El-Hindi Muhammad","year":"2022","unstructured":"Muhammad El-Hindi , Tobias Ziegler , Matthias Heinrich , Adrian Lutsch , Zheguang Zhao , and Carsten Binnig . 2022 . Benchmarking the Second Generation of Intel SGX Hardware. In International Conference on Management of Data . Philadelphia, PA, USA. Muhammad El-Hindi, Tobias Ziegler, Matthias Heinrich, Adrian Lutsch, Zheguang Zhao, and Carsten Binnig. 2022. Benchmarking the Second Generation of Intel SGX Hardware. In International Conference on Management of Data. Philadelphia, PA, USA."},{"key":"e_1_3_2_1_8_1","unstructured":"Google Drive. 2012. Retrieved 2022-10-14 from https:\/\/www.google.com\/drive\/  Google Drive. 2012. Retrieved 2022-10-14 from https:\/\/www.google.com\/drive\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Quantifying Information Leakage of Deterministic Encryption. In International Conference on Cloud Computing Security Workshop","author":"Jurado Mireya","year":"2019","unstructured":"Mireya Jurado and Geoffrey Smith . 2019 . Quantifying Information Leakage of Deterministic Encryption. In International Conference on Cloud Computing Security Workshop . London, United Kingdom. Mireya Jurado and Geoffrey Smith. 2019. Quantifying Information Leakage of Deterministic Encryption. In International Conference on Cloud Computing Security Workshop. London, United Kingdom."},{"key":"e_1_3_2_1_10_1","volume-title":"Security Symposium USENIX Security. Washington D.C., USA.","author":"Keelveedhi Sriram","year":"2013","unstructured":"Sriram Keelveedhi , Mihir Bellare , and Thomas Ristenpart . 2013 . DupLESS: Server-aided encryption for deduplicated storage . In Security Symposium USENIX Security. Washington D.C., USA. Sriram Keelveedhi, Mihir Bellare, and Thomas Ristenpart. 2013. DupLESS: Server-aided encryption for deduplicated storage. In Security Symposium USENIX Security. Washington D.C., USA."},{"key":"e_1_3_2_1_11_1","volume-title":"Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication. In European Conference on Computer Systems","author":"Li Jingwei","year":"2020","unstructured":"Jingwei Li , Zuoru Yang , Yanjing Ren , Patrick Lee , and Xiaosong Zhang . 2020 . Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication. In European Conference on Computer Systems . Heraklion, Greece. Jingwei Li, Zuoru Yang, Yanjing Ren, Patrick Lee, and Xiaosong Zhang. 2020. Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication. In European Conference on Computer Systems. Heraklion, Greece."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Systems and Storage","author":"Miranda Mariana","year":"2021","unstructured":"Mariana Miranda , T\u00e2nia Esteves , Bernardo Portela , and Jo\u00e3o Paulo . 2021 . S2Dedup: SGX-Enabled Secure Deduplication . In International Conference on Systems and Storage . Haifa, Israel. Mariana Miranda, T\u00e2nia Esteves, Bernardo Portela, and Jo\u00e3o Paulo. 2021. S2Dedup: SGX-Enabled Secure Deduplication. In International Conference on Systems and Storage. Haifa, Israel."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/972639.972643"},{"key":"e_1_3_2_1_15_1","unstructured":"Live Optics. 2022. Read and write ratio. Retrieved 2022-10-14 from https:\/\/support.liveoptics.com\/hc\/en-us\/articles\/229590547-Live-Optics-Basics-Read-Write-Ratio  Live Optics. 2022. Read and write ratio. Retrieved 2022-10-14 from https:\/\/support.liveoptics.com\/hc\/en-us\/articles\/229590547-Live-Optics-Basics-Read-Write-Ratio"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Annual Technical Conference. Remotely.","author":"Ren Yanjing","year":"2021","unstructured":"Yanjing Ren , Jingwei Li , Zuoru Yang , Patrick PC Lee , and Xiaosong Zhang . 2021 . Accelerating Encrypted Deduplication via SGX . In USENIX Annual Technical Conference. Remotely. Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick PC Lee, and Xiaosong Zhang. 2021. Accelerating Encrypted Deduplication via SGX. In USENIX Annual Technical Conference. Remotely."},{"key":"e_1_3_2_1_17_1","unstructured":"SGX101. 2019. Overview - SGX 101. Retrieved 2022-10-14 from http:\/\/sgx101.gitbook.io\/sgx101\/sgx-bootstrap\/overview  SGX101. 2019. Overview - SGX 101. Retrieved 2022-10-14 from http:\/\/sgx101.gitbook.io\/sgx101\/sgx-bootstrap\/overview"},{"key":"e_1_3_2_1_18_1","unstructured":"SPDK. 2015. Spdk github. Retrieved 2022-10-14 from https:\/\/github.com\/spdk\/spdk  SPDK. 2015. Spdk github. Retrieved 2022-10-14 from https:\/\/github.com\/spdk\/spdk"},{"key":"e_1_3_2_1_19_1","unstructured":"SPDK. 2017. Storage performance development kit. Retrieved 2022-10-14 from https:\/\/spdk.io\/  SPDK. 2017. Storage performance development kit. Retrieved 2022-10-14 from https:\/\/spdk.io\/"},{"key":"e_1_3_2_1_20_1","volume-title":"International conference on File and Storage Technologies","author":"Wallace Grant","year":"2012","unstructured":"Grant Wallace , Fred Douglis , Hangwei Qian , Philip Shilane , Stephen Smaldone , Mark Chamness , and Windsor Hsu . 2012 . Characteristics of backup workloads in production systems . In International conference on File and Storage Technologies . San Jose, CA, USA. Grant Wallace, Fred Douglis, Hangwei Qian, Philip Shilane, Stephen Smaldone, Mark Chamness, and Windsor Hsu. 2012. Characteristics of backup workloads in production systems. In International conference on File and Storage Technologies. San Jose, CA, USA."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Conference on File and Storage Technologies","author":"Wallace Grant","year":"2012","unstructured":"Grant Wallace , Fred Douglis , Hangwei Qian , Philip Shilane , Stephen Smaldone , Mark Chamness , and Windsor Hsu . 2012 . Characteristics of backup workloads in production systems .. In USENIX Conference on File and Storage Technologies . San Jose, CA, USA. Grant Wallace, Fred Douglis, Hangwei Qian, Philip Shilane, Stephen Smaldone, Mark Chamness, and Windsor Hsu. 2012. Characteristics of backup workloads in production systems.. In USENIX Conference on File and Storage Technologies. San Jose, CA, USA."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Annual Technical Conference","author":"Yang Zuoru","year":"2022","unstructured":"Zuoru Yang , Jingwei Li , and Patrick PC Lee . 2022 . Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption . In USENIX Annual Technical Conference . Carlsbad, CA, USA. Zuoru Yang, Jingwei Li, and Patrick PC Lee. 2022. Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption. In USENIX Annual Technical Conference. Carlsbad, CA, USA."}],"event":{"name":"SAC '23: 38th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Tallinn Estonia","acronym":"SAC '23"},"container-title":["Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555776.3577711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:24Z","timestamp":1750183704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":22,"alternative-id":["10.1145\/3555776.3577711","10.1145\/3555776"],"URL":"https:\/\/doi.org\/10.1145\/3555776.3577711","relation":{},"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}