Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership

To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Ded...

Full description

Saved in:
Bibliographic Details
Main Authors: Yue CHEN, Chao-ling LI, Ju-long LAN, Kai-chun JIN, Zhong-hui WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/
Tags: Add Tag
No Tags, Be the first to tag this record!