The NIST Definition of Cloud, p.50, 2009. ,
The Diverse and Exploding Digital Universe: An updated forecast of world wide information growth through, pp.2-16, 2008. ,
The Digital Universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, 2012. ,
Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations " , The Enterprise Strategy Group, pp.2-15, 2007. ,
Using Content Addressable Techniques to Optimize Client-Server System, 2007. ,
Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems, pp.617-624, 2002. ,
DOI : 10.1109/ICDCS.2002.1022312
Authentication, authorisation and auditing for ubiquitous computing: a survey and vision, IJSSC, ser. DOI: 10.1504/IJSSC, 2011. ,
DOI : 10.1504/IJSSC.2011.039107
Integrated cloud computing environment with IT resources and sensor devices, IJSSC, ser. DOI: 10.1504/IJSSC, 2011. ,
DOI : 10.1504/IJSSC.2011.040342
Secure Deduplication with Efficient and Reliable Convergent Key Management, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.6, pp.1615-1625, 2013. ,
DOI : 10.1109/TPDS.2013.284
Single Instance Storage in Windows, proceedings of the 4th USENIX Windows Systems Symposium, pp.13-24, 2000. ,
Federated, Available, and Reliable Storage for an Incompletely Trusted Environment, proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp.1-14, 2002. ,
Alternative for Detecting Redundancy in Storage Systems Data, Proceedings of the 2004 USENIX Annual Technical Conference, pp.73-86, 2004. ,
Fingerprinting by Random Polynomials, 1981. ,
An Analysis of Compare-by-hash, Proceedings of The 9th Workshop on Hot Topics in Operating Systems, pp.13-18, 2003. ,
A High-Throughput File System for the HYDRAstor Content- Addressable Storage System, Proceedings of the 8th USENIX Conference on File and Storage Technologies, pp.225-238, 2010. ,
Decentralized Deduplication in SAN Cluster File Systems, Proceedings of the 2009 USENIX Annual Technical Conference, pp.101-114, 2009. ,
AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment, 2011 IEEE International Conference on Cluster Computing, pp.112-120, 2011. ,
DOI : 10.1109/CLUSTER.2011.20
DAM: A Data Ownership-Aware Multi-Layered De-duplication Scheme, proceedings of the 6th IEEE International Conference on Networking, Architecture and Stor- age, pp.403-411, 2006. ,
DOI : 10.1109/nas.2010.57
A secure cloud storage system supporting privacy-preserving fuzzy deduplication, Soft Computing, vol.2, issue.3, pp.10-1007 ,
DOI : 10.1007/s00500-015-1596-6
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, pp.387-392, 2013. ,
DOI : 10.1109/BWCCA.2013.68
Protection of Microscopy Images through Digital Watermarking Techniques, 2014 International Conference on Intelligent Networking and Collaborative Systems, pp.65-72, 2014. ,
DOI : 10.1109/INCoS.2014.116
Message-Locked Encryption and Secure Deduplication, Proc. IACR Cryptology ePrint Archive, pp.296-312, 2012. ,
DOI : 10.1007/978-3-642-38348-9_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.252.8386
Attribute Based Encryption for Fine- Grained Access Conrol of Encrypted Data, ACM conference on Computer and Communications Security, pp.99-112, 2006. ,
Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.195-203, 2007. ,
DOI : 10.1145/1315245.1315270
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.8316
Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.491-500, 2011. ,
DOI : 10.1145/2046707.2046765