版权说明 操作指南
首页 > 成果 > 详情

TSS: A two-party secure server-aid chunking algorithm

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Tian, Wenlong;Li, Ruixuan;Xu, Zhiyong
通讯作者:
Li, Ruixuan(rxli@hust.edu.cn)
作者机构:
[Tian, Wenlong] Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.
[Li, Ruixuan] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Luoyu Rd, Wuhan 1037, Peoples R China.
[Xu, Zhiyong] Suffolk Univ, Math & Comp Sci Dept, Boston, MA 02114 USA.
[Xu, Zhiyong] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen, Peoples R China.
通讯机构:
[Ruixuan Li] S
School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China
语种:
英文
关键词:
metadata size encryption key number;secure chunking;secure deduplication;server-aid
期刊:
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
ISSN:
1532-0626
年:
2019
卷:
34
期:
12
页码:
e6577-
基金类别:
Hunan Province research foundation [19C1624]; Ministry of Education Humanities and Foundation on Humanities and Social Sciences of the Ministry of Education [20YJC880027]; South of China University research foundation [190XQD121]; Major Projects of the National Social Science Foundation [16ZDA092]; National Key Research and Development Program of China [2016QY01W0202, 2016YFB0800402]; National Natural Science Foundation of ChinaNational Natural Science Foundation of China (NSFC) [61433006, 61572221, U1401258, U1836204, U1936108]; National Science FoundationNational Science Foundation (NSF) [CNS 1526190]; Teaching Reform Foundation [2019YB-XJG30]; Natural Science Foundation of Hunan Province of ChinaNatural Science Foundation of Hunan Province [2021JJ40468]
机构署名:
本校为第一机构
院系归属:
计算机科学与技术学院
摘要:
Chunking is one of the most important processes in a secure deduplication system. It determines the deduplication ratio, metadata size, and the encryption key number. Existing chunking algorithms can be categorized as client-side chunking algorithm and the server-aid chunking algorithm. Although the former one can directly be applied into the secure deduplication, it ignores the management overhead caused by the metadata size and encryption key number. Thus, the conventional server-aid chunking algorithm is proposed. However, it is not secure b...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com