STATISTICS

Viewed183

Downloads138

Secure Deduplication Method with Blockchain-basedSmart Contract for Heterogeneous Cloud Servers
[1]JIANG Lin,LI Jiaxing,WU Jigang.Secure Deduplication Method with Blockchain-basedSmart Contract for Heterogeneous Cloud Servers[J].Journal of Zhengzhou University (Engineering Science),2024,45(05):95-102.[doi:10.13705/j.issn.1671-6833.2024.02.010]
Copy
References:
[1] LIU M Y, PAN L, LIU S J. Cost optimization for cloudstorage from user perspectives: recent advances, taxonomy, and survey[ J] . ACM Computing Surveys,2023, 55(13) :1-37.
[2] XIAO L, ZOU B J, ZHU C Z, et al. ESDedup: an efficient and secure deduplication scheme based on data similarity and blockchain for cloud-assisted medical storagesystems[ J] . The Journal of Supercomputing, 2023, 79(3) : 2932-2960.
[3] YUAN H R, CHEN X F, LI J, et al. Secure cloud datadeduplication with efficient re-encryption [ J ] . IEEETransactions on Services Computing, 2022, 15( 1) : 442-456.
[4] LI J X, WU J G, CHEN L. Block-secure: blockchainbased scheme for secure P2P cloud storage[ J] . Information Sciences, 2018, 465: 219-231.
[5] LI J X, WU J G, CHEN L, et al. Blockchain-based secure key management for mobile edge computing [ J ] .IEEE Transactions on Mobile Computing, 2023, 22( 1) :100-114.
[6] BELLARE M, KEELVEEDHI S, RISTENPART T. Message-locked encryption and secure deduplication [ C ] ∥Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer,2013: 296-312.
[7] QI S Y, WEI W, WANG J F, et al. Secure data deduplication with dynamic access control for mobile cloudstorage[EB / OL] . ( 2023 - 04 - 03) [ 2023 - 06 - 18] . https:∥ieeexplore. ieee. org / abstract / document / 10091139.
[8] PENG L, YAN Z, LIANG X Q, et al. SecDedup: securedata deduplication with dynamic auditing in the cloud[ J] . Information Sciences, 2023, 644: 119279.
[9] YU X X, BAI H, YAN Z, et al. VeriDedup: a verifiablecloud data deduplication scheme with integrity and duplication proof[ J] . IEEE Transactions on Dependable andSecure Computing, 2023, 20(1) : 680-694.
[10] DOUCEUR J R, ADYA A, BOLOSKY W J, et al. Reclaiming space from duplicate files in a serverless distributed file system [ C ] ∥ Proceedings 22nd InternationalConference on Distributed Computing Systems. Piscataway: IEEE, 2002: 617-624.
[11] CHEN R M, MU Y, YANG G M, et al. BL-MLE:block-level message-locked encryption for secure large filededuplication[ J] . IEEE Transactions on Information Forensics and Security, 2015, 10(12) : 2643-2652.
[12] DING W X, YAN Z, DENG R H. Secure encrypted datadeduplication with ownership proof and user revocation[C]∥International Conference on Algorithms and Architectures for Parallel Processing. Cham: Springer, 2017:297-312.
[13] CUI H, DENG R H, LI Y J, et al. Attribute-based storage supporting secure deduplication of encrypted data incloud[ J] . IEEE Transactions on Big Data, 2019, 5(3) :330-342.
[14] HE K, CHEN J, DU R Y, et al. DeyPoS: deduplicatable dynamic proof of storage for multi-user environments[ J] . IEEE Transactions on Computers, 2016, 65( 12) :3631-3645.
[15] 王捷, 葛丽娜, 张桂芬. 区块链的激励机制权益证明共识 算 法 改 进 方 案 [ J] . 郑 州 大 学 学 报 ( 工 学 版) ,2023, 44(5) : 62-68.
WANG J, GE L N, ZHANG G F. Improvement schemefor the proof of stake consensus of blockchain incentivemechanism[ J] . Journal of Zhengzhou University ( Engineering Science) , 2023, 44(5) : 62-68.
[16] HUANG L X, ZHANG G X, YU S, et al. SeShare: secure cloud data sharing based on blockchain and publicauditing[ J] . Concurrency and Computation: Practice andExperience, 2019, 31(22) : e4359.
[17] ZHANG G P, YANG Z G, XIE H R, et al. A secure authorized deduplication scheme for cloud data based onblockchain[ J] . Information Processing & Management,2021, 58(3) : 102510.
[18] HUANG H, CHEN Q S, ZHOU Y P, et al. Blockchainbased secure cloud data deduplication with traceability[C]∥International Conference on Blockchain and Trustworthy Systems. Berlin: Springer, 2020: 295-302.
[19] LIN C, HE D B, HUANG X Y, et al. BCPPA: a blockchain-based conditional privacy-preserving authenticationprotocol for vehicular ad hoc networks[ J] . IEEE Transactions on Intelligent Transportation Systems, 2021, 22(12) : 7408-7420.
[20] ZHOU X T, LUO M, VIJAYAKUMAR P, et al. Efficientcertificateless conditional privacy-preserving authentication for VANETs [ J ] . IEEE Transactions on VehicularTechnology, 2022, 71(7) : 7863-7875.
[21] 刘忆宁, 周元健, 蓝如师, 等. 基于区块链的云数据删除 验 证 协 议 [ J] . 计 算 机 研 究 与 发 展, 2018, 55(10) : 2199-2207.
LIU Y N, ZHOU Y J, LAN R S, et al. Blockchain-basedverification scheme for deletion operation in cloud [ J ] .Journal of Computer Research and Development, 2018,55(10) : 2199-2207.
[22] XIE Q Y, ZHANG C, JIA X H. Security-aware and efficient data deduplication for edge-assisted cloud storagesystems[ J] . IEEE Transactions on Services Computing,2023, 16(3) : 2191-2202.
Similar References:
Memo

-

Last Update: 2024-09-02
Copyright © 2023 Editorial Board of Journal of Zhengzhou University (Engineering Science)