Computer Science ›› 2024, Vol. 51 ›› Issue (12): 352-360.doi: 10.11896/jsjkx.231100087
• Information Security • Previous Articles
ZHOU Yiteng, TANG Xin, JIN Luchao
CLC Number:
[1]WANG C,ZHANG B,REN K,et al.Privacy-assured outsour-cing of image reconstruction service in cloud[J].IEEE Transactions on Emerging Topics in Computing,2013,1(1):166-177. [2]TANG X,CHEN X,ZHOU R,et al.Marking based obfuscation strategy to resist side channel attack in cross-User deduplication for cloud storage[C]//Proceedings of the 21th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom).Wuhan,China,2022:547-555. [3]SHIN Y,KOO D,HUR J.A survey of secure data deduplication schemes for cloud storage systems[J].ACM Computing Surveys,2017,49(4):74. [4]AGARWALA A,SINGH P,ATREY P.Client side secure imagededuplication using DICE protocol[C]//Proceedings of 2018 IEEE Conference on Multimedia Information Processing and Retrieval(MIPR).Miami,USA,2018:412-417. [5]LI J,CHEN X,LI M,et al.Secure deduplication with efficient and reliable convergent key management[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(6):1615-1625. [6]LI D,YANG C,JIANG Q,et al.A client-based image fuzzy deduplication method supporting proof of ownership[J].Chinese Journal of Computers,2018,41(6):1267-1283. [7]TAKESHITA J,KARL R,JUNG T.Secure single-server nearly-identical image deduplication[C]//Proceedings of 2020 International Conference on Computer Communications and Networks(ICCCN).Honolulu,USA,2020:1-6. [8]JIANG T,YUAN X,CHEN Y,et al.FuzzyDedup:secure fuzzy deduplication for cloud storage[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2466-2483. [9]LIU X M,TANG X,JIN L C,et al.Secure cross-user fuzzy deduplication for images in cloud storage[C]//Proceedings of the 7th International Conference on Data Mining and Big Data(DMBD).Beijing,China,2022:291-302. [10]HARNIK D,PINKAS B,SHULMAN-PELEG A.Side channels in cloud services:deduplication in cloud storage[J].IEEE Security & Privacy,2010,8(6):40-47. [11]TANG X,ZHOU L N,SHAN W J,et al.Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack[J].Journal on Communications,2020,41(6):98-111. [12]TANG X,ZHOU L N.Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack[J].Journal of Computer Applications,2020,40(4):1085-1090. [13]YU C M,GOCHHAYAT S P,CONTI M,et al.Privacy aware data deduplication for side channel in cloud storage[J].IEEE Transactions on Cloud Computing,2020,8(2):597-609. [14]BELLARE M,KEELVEEDHIS,RISTENPART T.Message-locked encryption and secure deduplication[C]//Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT).Athens,2013:296-312. [15]STORER M W,GREENAN K,LONG D D,et al.Secure data deduplication[C]//Proceedings of the 2008 ACM Workshop on Storage Security and Survivability(StorageSS).Alexandria,2008:1-10. [16]POORANIAN Z,SHOJAFAR M,GARG S,et al.LEVER:secure deduplicated cloud storage with encrypted two-party interactions in cyber-physical systems[J].IEEE Transactions on Industrial Informatics,2021,17(8):5759-5768. [17]WANG Y M,HE W G.High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J].IEEE Transactions on Multimedia,2022,24(1):1288-1298. [18]LIU X M,TANG X,YANG S T,et al.Reed-Solomon coding based secure deduplication for cloud storage with resistance against side channel attack[J].Journal of Cyber Security,2022,7(6):80-93. [19]TANG X,LIU Z,SHAO Y,et al.Side channel attack resistant cross-user generalized deduplication for cloud storage[C]//Proceedings of the 56th IEEE International Conference on Communications(ICC).Seoul,South Korea,2022:998-1003. [20]TANG X,ZHOU Y T,CHENG Y X,et al.Weighted average-based complexity calculation in block selection oriented reversible data hiding[J].Security and Communication Networks,2022,2022:1-15. [21]TANG X,ZHOU L N,TANG G,et al.Improved fluctuation derived block selection strategy in pixel value ordering based reversible data hiding[C]//Proceedings of the 20th International Workshop on Digital-forensics and Watermarking(IWDW).Beijing,China,2021:163-177. [22]ZHANG X P.Reversible data hiding in encrypted image[J].IEEE Signal Processing Letters,2011,18(4):255-258. [23]HONG W,CHEN T S,WU H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202. [24]SIPI.The USC-SIPI image database[DB/OL].1977,http://sipi.usc.edu/database/. [25]Unsplash.The UNSPLASH image database[DB/OL].2013,https://www.unsplash.com/. |
[1] | YUE Meng, ZHU Shibo, HONG Xueting, DUAN Bingyan. Airborne Software Audit Method Based on Trusted Implicit Third Party [J]. Computer Science, 2024, 51(6A): 230400088-6. |
[2] | AN Ruicheng, WANG Huaqun. Proxy Provable Data Possession with Key-exposure Resilient [J]. Computer Science, 2024, 51(12): 310-316. |
[3] | YUE Meng, WEN Cheng, HONG Xueting, YAN Simin. Airborne Software Provable Data Possession for Cloud Storage [J]. Computer Science, 2024, 51(11A): 240400040-10. |
[4] | WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370. |
[5] | LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui. Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [J]. Computer Science, 2023, 50(8): 294-303. |
[6] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
[7] | HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze. Bi-histogram Shifting Reversible Data Hiding Method After Compressed Differences [J]. Computer Science, 2022, 49(9): 340-346. |
[8] | SHEN Zhen, ZHAO Cheng-gui. Storage Task Allocation Algorithm in Decentralized Cloud Storage Network [J]. Computer Science, 2022, 49(12): 17-21. |
[9] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[10] | MA Bin, HOU Jin-cheng, WANG Chun-peng, LI Jian, SHI Yun-qing. High Capacity Reversible Data Hiding Algorithm for Audio Files Based on Code Division Multiplexing [J]. Computer Science, 2021, 48(9): 298-305. |
[11] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[12] | LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338. |
[13] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[14] | ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309. |
[15] | LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261. |
|