References
- E. Bocchi, I. Drago, and M. Mellia, “Personal cloud storage benchmarks and comparison,” IEEE Trans. Cloud Comp., Vol. 5, no. 4, pp. 751–64, Dec 2017.
- D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Side channels in cloud services, the case of deduplication in cloud storage,” IEEE Secur. Priv. Mag., Vol. 8, no. 6, pp. 40–7, January 2011.
- J. Li, X. Chen, X. Huang, S. Tang, Y. Xiang, M. Mehedi Hassan, and A. Alelaiwi, “Secure distributed deduplication systems with improved reliability,” IEEE Trans. Comput., Vol. 64, no. 12, pp. 3569–79, 2015.
- J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure data deduplication with dynamic ownership management in cloud storage,” IEEE. Trans. Knowl. Data. Environ., Vol. 28, no. 1, pp. 3113–25, Jun 2016.
- H. Kwon, C. Hahn, D. Kim, and J. Hur, “Secure deduplication system for multimedia data with user revocation in cloud storage,” Multimed. Tools Appl., Vol. 76, no. 4, pp. 5889–903, 2017.
- R. N. S. Widodo, H. Lim, and M. Atiquzzaman, “SDM: smart deduplication for mobile cloud storage,” Future Gener. Comp. Sys., Vol. 70, pp. 64–73, 2017.
- S. Luo, G. Zhang, C. Wu, S. U. Khan, and K. Li, “Boafft: distributed deduplication for big data storage in the cloud,” IEEE Trans. Cloud Comp., Vol. 61, no. 11, pp. 1–13, Dec 2015.
- W. Xia, H. Jiang, D. Feng, and L. Tian, “DARE: A deduplication-aware resemblance detection and elimination scheme for data reduction with low overheads,” IEEE Trans. Comput., Vol. 65, no. 6, pp. 1692–705, 2016.
- A. Venish, and K. Sivasankar. “Study of Chunking algorithm in data deduplication,” in Proceedings of the International Conference on Soft Computing Systems, Adv. Intell. Syst., Vol. 398, pp. 13–20, Jan 2016.
- Y. Yang, X. Qin, G. Sun, Z. Yang, and Z. Zu, “Data deduplication in wireless multimedia monitoring network,” Int. J. Distrib. Sens., Vol. 12, 1–7, Dec 2013.
- X. Li, J. Li, and F. Huang, “A secure cloud storage supporting privacy preserving Fuzzy deduplication,” Soft Comput., Vol. 20, no. 4, pp. 1437–48, Jan 2015.
- J. R. Jane Rubel Angelina, S. Kambaraj, and V. Dharmarajan, “High-speed data deduplication using parallelized cuckoo hashing,” Turk. J. Electr. Eng. Co., Vol. 26, pp. 1417–29, Jun 2020.
- Y. Allu, F. Douglis, M. Kamat, P. Shilane, H. Patterson, and B. Zhu, “Backup to the future: How workload and hardware changes continually redefine data domain file systems,” Computer, Vol. 50, no. 07, pp. 64–72, Jul 2017.
- J. Li, X. Chen, M. Li, P. P. C. Lee, and W. Lou, “Secure deduplictaion with efficient and reliable convergent key management,” IEEE Trans. Parall. Distr., Vol. 25, no. 6, pp. 1615–25, Jun 2014.
- W. Xia, Y. Zhou, H. Jiang, D. Feng, Y. Hua, Y. Hu, W. Zhang, and Q. Liu. “FastCDC: a fast and efficient Content-defined chunking approach for data deduplication”, USENIX Annual Technical Conference (USENIC ATCí16), Denver, Co, USA, June 2016.
- R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: block-level message locked encryption for secure large file deduplication,” IEEE Trans. Inf. Foren. Sec., Vol. 10, no. 2, pp. 2643–52, Aug 2015.
- Y. Shin, and K. Kim, “Efficient and secure file deduplication in cloud storage,” IEICE Trans. Inf. Syst., Vol. E97-D, no. 2, pp. 184–97, Feb 2014.
- E. Daniel, and N. A. Vasanthi, “LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment,” Cluster Comput., Vol. 22, 1–12, Nov 2017.
- R. N. S. Widodo, H. Lim, and M. Atiquzzaman, “A new content defined chunking algorithm for data deduplication in cloud storage,” Fut. Gener. Comp., Vol. 71, pp. 145–56, Jun 2017.
- B. Zhou, S. D. Zhang, Y. Zhang, and J. H. Tan, “A bit string content aware chunking strategy for reduced CPU energy on cloud storage,” J. Electr. Comput. Eng., Vol. 2015, 1–9, Aug 2015.
- S. Singhal, A. Kaushik, and P. Sharma, “A novel approach of data deduplication for distributed storage,” Int. J. Eng. Tech., Vol. 7, no. 2.4, pp. 46–52, Mar 2018.
- B. Mao, H. Jiang, S. Wu, and L. Tian, “Leveraging data deduplication to improve the performance of primary storage systems in the cloud,” IEEE Trans. Comput., Vol. 65, pp. 1775–1788, Jul 2015.
- X. Y. Xuan, X. Nong, L. Fang, S. Zhen, and H. W. Hui, “AR-Dedupe: an efficient deduplication approach for cluster deduplication system,” J. Shanghai Jiaot. Univ., Vol. 20, no. 1, pp. 76–81, Jan 2015.
- J. Xiong, Y. Zhang, X. Li, M. Lin, and Z. Yao, “RSE-PoW: a role symmetric encryption PoW scheme with authorized deduplication for multimedia data,” Mobile Netw. Appl., Vol. 23, no. 3, pp. 650–63, 2018.
- P. Zhang, P. Huang, X. He, H. Wang, and K. Zhou, “Resemblance and mergence based indexing for high performance data deduplication,” J. Syst. Softw., Vol. 128, pp. 11–24, Dec 2017.
- K. W. Su, J. S. Leu, M. C. Yu, Y. T. Wu, E. C. Lee, and T. Song, “Design and implementation of various file deduplication schemes on storage devices,” Mobile Netw. Appl., Vol. 22, no. 1, pp. 40–50, Jan 2017.
- B. Zhou, and J. T. Wen, “A data deduplication framework of disk images with adaptive block skipping,” J. Comput. Sci. Technol., Vol. 31, no. 4, pp. 820–35, Jul 2016.
- Z. Sun, J. Shen, and J. Yong, “A novel approach to data deduplication over the engineering-oriented cloud systems, University of Wollongong Australia,” Integr. Comput. Aid. E, Vol. 20, no. 1, pp. 45–57, Jan 2013.
- S. Waghmare, “Authorized deduplication: an approach for secure cloud environment,” Proc. Comput. Sci., Vol. 78, pp. 815–23, 2016.
- S. Jiang, T. Jiang, and L. Wang, “Secure and efficient cloud data deduplication with ownership management,” IEEE Trans. Serv. Comput., Vol. 13, 1–14, Nov 2017.
- X. Yang, R. Lu, K. K. Raymond Choo, F. Yin, and X. Tang, “Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud,” IEEE Trans. Big. Data, 1–12, Jun 2017.
- C. Yu, S. Prasad Gochhayat, M. Conti, and C. S. Lu, “Privacy aware data deduplication for side channel in cloud storage,” IEEE Trans. Cloud Comp., Vol. 8, 1–13, Jun 2018.
- Z. Yan, L. Zhang, W. Ding, and Q. Zheng, “Heterogeneous data storage management with deduplication in cloud computing,” IEEE. Trans. Big Data, Vol. 5, 1–15, May 2017.
- Y. Zhang, H. Su, M. Yang, D. Zheng, F. Ren, and Q. Zhao, “Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing,” Secur. Commun. Netw., Vol. 2018, 1–13, Sep 2018.
- B. K. Kim, S. J. Oh, S. B. Jang, and Y. W. Ko, “File similarity evaluation scheme for multimedia data using partial hash information,” Mob. Netw. Appl., Vol. 76, no. 19, pp. 19649–63, Feb 2017.