Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] P. Anderson and L. Zhang. “Fast and secure laptop backups with encrypted de-duplicationâ€. In Proc. of USENIX LISA, 2010. [2] M. Bellare, S. Keelveedhi, and T. Ristenpart. “Dupless: Server aided encryption for deduplicated storageâ€. In USENIX Security Symposium, 2013. [3] Pasqualo Puzio, Refik Molva ,MelekOnen ,â€CloudDedup: Secure Deduplication with Encrypted Data for Cloud Storageâ€, SecludIT and EURECOM,France. [4] Iuon –Chang Lin, Po-ching Chien ,â€Data Deduplication Scheme for Cloud Storage†International Journal of Computer and Control(IJ3C),Vol1,No.2(2012) [5] Shai Halevi, Danny Harnik, Benny Pinkas,â€Proof of Ownership in Remote Storage Systemâ€, IBM T.J.Watson Research Center, IBM Haifa Research Lab, Bar IIan University,2011. [6] M. Shyamala Devi, V.Vimal Khanna,Naveen Balaji â€Enhanced Dynamic Whole File De-Duplication(DWFD) for Space Optimization in Private Cloud Storage Backupâ€,IACSIT, August,2014. [7] Weak Leakage-Resilient Client –Side deduplication of Encrypted Data in Cloud Storage†Institute for Info Comm Research,Singapore,2013 [8] Tanupriya Chaudhari , Himanshu shrivastav, Vasudha Vashisht, â€A Secure Decentralized Cloud Computing Environment over Peer to Peerâ€,IJCSMC,April,2013 [9] Mihir Bellare, Sriram keelveedhi,Thomas Ristenart ,â€DupLESS: Server Aided Encryption for Deduplicated storage†University of California, San Diego2013. [10] Luna SA HSM. http://bit.ly/17CDPm1. [11] Opendedup. http://opendedup.org/. [12] Atul Adya, William J Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R Douceur, Jon Howell, Jacob R Lorch, Marvin Theimer, and Roger P Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. ACM SIGOPS Operating Systems Review, 36(SI):1–14, 2002. [13] Mihir Bellare, Alexandra Boldyreva, and Adam ONeill. Deterministic and efficiently searchable encryption. In Advances in Cryptology-CRYPTO 2007, pages 535–552. Springer, 2007. [14] Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. Dupless: Server-aided encryption for deduplicated storage. 2013. [15] Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. Message-locked encryption and secure deduplication. In Advances in Cryptology–EUROCRYPT 2013, pages 296–312. Springer, 2013. [16] Kevin D. Bowers, Ari Juels, and Alina Oprea. Hail: a highavailability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, CCS ’09, pages 187–198, New York, NY, USA, 2009. ACM. [17] Landon P Cox, Christopher D Murray, and Brian D Noble. Pastiche: Making backup cheap and easy. ACM SIGOPS Operating Systems Review, 36(SI):285–298, 2002. [18] John R Douceur, Atul Adya, William J Bolosky, P Simon, and Marvin Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, pages 617–624. IEEE, 2002. [19] Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage. Security & Privacy, IEEE, 8(6):40–47, 2010.
![]() | V2I803.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|