P. Mell and T. Grance, The NIST Definition of Cloud, p.50, 2009.

J. F. Gantz, C. Ghute, A. Manfrediz, S. Minton, D. Reinsel et al., The Diverse and Exploding Digital Universe: An updated forecast of world wide information growth through, pp.2-16, 2008.

J. Gantz and D. , The Digital Universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, 2012.

A. T. Biggar-h, Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations " , The Enterprise Strategy Group, pp.2-15, 2007.

N. Tolia, Using Content Addressable Techniques to Optimize Client-Server System, 2007.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems, pp.617-624, 2002.
DOI : 10.1109/ICDCS.2002.1022312

A. P. Sabzevar and J. P. Sousa, Authentication, authorisation and auditing for ubiquitous computing: a survey and vision, IJSSC, ser. DOI: 10.1504/IJSSC, 2011.
DOI : 10.1504/IJSSC.2011.039107

M. Yuriyama and T. Kushida, Integrated cloud computing environment with IT resources and sensor devices, IJSSC, ser. DOI: 10.1504/IJSSC, 2011.
DOI : 10.1504/IJSSC.2011.040342

J. Li, X. Chen, M. Li, P. P. Lee, and W. Lou, Secure Deduplication with Efficient and Reliable Convergent Key Management, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.6, pp.1615-1625, 2013.
DOI : 10.1109/TPDS.2013.284

W. J. Bolosky, S. Corbin, and D. Goebel, Single Instance Storage in Windows, proceedings of the 4th USENIX Windows Systems Symposium, pp.13-24, 2000.

A. Adya, W. J. Bolosky, and M. Castro, Federated, Available, and Reliable Storage for an Incompletely Trusted Environment, proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp.1-14, 2002.

C. Policroniades and L. Pratt, Alternative for Detecting Redundancy in Storage Systems Data, Proceedings of the 2004 USENIX Annual Technical Conference, pp.73-86, 2004.

M. O. Rabin, Fingerprinting by Random Polynomials, 1981.

V. Henson, An Analysis of Compare-by-hash, Proceedings of The 9th Workshop on Hot Topics in Operating Systems, pp.13-18, 2003.

C. Ungureanu, B. Atkin, and A. Aranya, A High-Throughput File System for the HYDRAstor Content- Addressable Storage System, Proceedings of the 8th USENIX Conference on File and Storage Technologies, pp.225-238, 2010.

A. T. Clements, I. Ahmad, and M. Vilayannur, Decentralized Deduplication in SAN Cluster File Systems, Proceedings of the 2009 USENIX Annual Technical Conference, pp.101-114, 2009.

Y. Fu, H. Jiang, and N. Xiao, AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment, 2011 IEEE International Conference on Cluster Computing, pp.112-120, 2011.
DOI : 10.1109/CLUSTER.2011.20

Y. Tan, D. Feng, and G. Zhou, DAM: A Data Ownership-Aware Multi-Layered De-duplication Scheme, proceedings of the 6th IEEE International Conference on Networking, Architecture and Stor- age, pp.403-411, 2006.
DOI : 10.1109/nas.2010.57

X. Li, J. Li, and F. Huang, A secure cloud storage system supporting privacy-preserving fuzzy deduplication, Soft Computing, vol.2, issue.3, pp.10-1007
DOI : 10.1007/s00500-015-1596-6

R. Pizzolante, B. Carpentieri, and A. Castiglione, A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, pp.387-392, 2013.
DOI : 10.1109/BWCCA.2013.68

R. Pizzolante, A. Castiglione, B. Carpentieri, D. Santis, A. Castiglione et al., Protection of Microscopy Images through Digital Watermarking Techniques, 2014 International Conference on Intelligent Networking and Collaborative Systems, pp.65-72, 2014.
DOI : 10.1109/INCoS.2014.116

M. Bellare, S. Keelveedhi, and T. Ristenpart, Message-Locked Encryption and Secure Deduplication, Proc. IACR Cryptology ePrint Archive, pp.296-312, 2012.
DOI : 10.1007/978-3-642-38348-9_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.252.8386

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute Based Encryption for Fine- Grained Access Conrol of Encrypted Data, ACM conference on Computer and Communications Security, pp.99-112, 2006.

R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.195-203, 2007.
DOI : 10.1145/1315245.1315270

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.8316

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-peleg, Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.491-500, 2011.
DOI : 10.1145/2046707.2046765