Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Ded...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2015-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015175/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|