연구 과제 주관 기관 : Pukyong National University
- K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "Deypos: Deduplicatable Dynamic Proof of Storage for Multi-user Environments," IEEE Transactions on Computers, Vol. 65, No. 12, pp. 3631-3645, 2016. https://doi.org/10.1109/TC.2016.2560812
- T. Jiang, X. Chen, Q. Wu, J. Ma, W. Susilo, and W. Lou, "Secure and Efficient Cloud Data Deduplication With Randomized Tag," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 3, pp. 532-543, 2017. https://doi.org/10.1109/TIFS.2016.2622013
- Cisco Global Cloud Index: Forecast and Methodology, https://www.cisco.com/c/dam/m/en_us/service-provider/ ciscoknowledgenetwork/files/622_11_15-16-Cisco_GCI_CKN_2015-2020_AMER_EMEAR_NOV2016.pdf (accessed Jun., 18, 2018).
- C. Kim, D. Kim, H. Kim, Y. Kim, and D. Seo, "Torus Network Based Distributed Storage System for Massive Multimedia Contents," Journal of Korea Multimedia Society, Vol. 19, No. 8, pp. 1487-1497, 2016. https://doi.org/10.9717/kmms.2016.19.8.1487
- Z. Yan, W. Ding, and H. Zhu, "A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud," Proceeding of International Conference on Algorithms and Architectures for Parallel Processing, Vol. 9530, pp. 547-561, 2015.
- J. Hur, D. Koo, Y. Shin, and K. Kang, "Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage," IEEE Transactions on Knowledge and Data Engineering, Vol. 28, No. 11, pp. 3113-3125, 2016. https://doi.org/10.1109/TKDE.2016.2580139
- Z. Yan, W. Ding, X. Yu, H. Zhu, and R.H. Deng, "Deduplication on Encrypted Big Data in Cloud," IEEE Transactions on Big Data, Vol. 2, No. 2, pp. 138-150, 2016. https://doi.org/10.1109/TBDATA.2016.2587659
- C.M. Yu, XDedup: Efficient Provably-secure Cross-user Chunk-level Client-side Deduplicated Cloud Storage of Encrypted Data, International Association for Cryptologic Research Cryptology ePrint Archive: Report 2016/1041, 2016.
- D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side Channels in Cloud Services: Deduplication in Cloud Storage," IEEE Security and Privacy, Vol. 8, No. 6, pp. 40-47, 2010.
- S. Keelveedhi, M. Bellare, and T. Ristenpart, "DupLESS: Server-aided Encryption for Deduplicated Storage," Proceeding of the 22nd Unix Users Group Security Symposium, pp. 179-194, 2013.
- S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of Ownership in Remote Storage Systems," Proceeding of the 18th Association for Computing Machinery Conference on Computer and Communications Security, pp. 491-500, 2011.
- M.W. Storer, K. Greenan, D.D. Long, and E.L. Miller, "Secure Data Deduplication," Proceeding of the 4th Association for Computing Machinery International Workshop on Storage Security and Survivability, pp. 1-10, 2008.
- J. Liu, N. Asokan, and B. Pinkas, "Secure Deduplication of Encrypted Data without Additional Independent Servers," Proceeding of the 22nd Association for Computing Machinery Special Interest Group on Security, Audit and Control Conference on Computer and Communications Security, pp. 874-885, 2015.