References
[1]. Ateniese, G., Burns, R., Curtmola, R., Herring, J.,
Kissner, L., Peterson, Z., & Song, D. (2007, October).
Provable data possession at untrusted stores. In
Proceedings of the 14th ACM conference on Computer
and communications security (pp. 598-609). https://doi.
org/10.1145/1315245.1315318
[2]. Cui, H., Deng, R. H., Li, Y., & Wu, G. (2017). Attributebased
storage supporting secure deduplication of
encrypted data in cloud. IEEE Transactions on Big Data,
5(3), 330-342.
[3]. Ding, R., Zhong, H., Ma, J., Liu, X., & Ning, J. (2019).
Lightweight privacy-preserving identity-based verifiable
IoT-based health storage system. IEEE Internet of Things
Journal, 6(5), 8393-8405.
[4]. Douceur, J. R., Adya, A., Bolosky, W. J., Simon, P., &
Theimer, M. (2002, July). Reclaiming space from
duplicate files in a serverless distributed file system. In
Proceedings 22nd International Conference on
Distributed Computing Systems (pp. 617-624). IEEE.
[5]. Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J.
(2019). One secure data integrity verification scheme for
cloud storage. Future Generation Computer Systems, 96,
376-385. https://doi.org/10.1016/j.future.2019.01.054
[6]. Gantz, J., & Reinsel, D. (2012). The digital universe
decade–are you ready. Retrieved from http://www. emc.
com/collateral/analyst-reports/idcdigital-universe-areyou-
ready. pdf.
[7]. Ge, X., Yu, J., Zhang, H., Hu, C., Li, Z., Qin, Z., & Hao, R.
(2019). Towards achieving keyword search over dynamic
encrypted cloud data with symmetric-key based
verification. IEEE Transactions on Dependable and
Secure Computing.
[8]. Guo, W., Zhang, H., Qin, S., Gao, F., Jin, Z., Li, W., &
Wen, Q. (2019). Outsourced dynamic provable data
possession with batch update for secure cloud storage.
Future Generation Computer Systems, 95, 309-322.
https://doi.org/10.1016/j.future.2019.01.009
[9]. Halevi, S., Harnik, D., Pinkas, B., & Shulman-Peleg, A.
(2011, October). Proofs of ownership in remote storage
systems. In Proceedings of the 18th ACM Conference on
Computer and Communications Security (pp. 491-500).
https://doi.org/10.1145/2046707.2046765
[10]. Harnik, D., Pinkas, B., & Shulman-Peleg, A. (2010).
Side channels in cloud services: Deduplication in cloud
storage. IEEE Security & Privacy, 8(6), 40-47.
[11]. He, K., Chen, J., Yuan, Q., Ji, S., He, D., & Du, R.
(2019). Dynamic group-oriented provable data possession
in the cloud. IEEE Transactions on Dependable and
Secure Computing.
[12]. Hou, H., Yu, J., & Hao, R. (2019). Cloud storage
auditing with deduplication supporting different security
levels according to data popularity. Journal of Network
and Computer Applications, 134, 26-39. https://doi.org/
10.1016/j.jnca.2019.02.015
[13]. Keelveedhi, S., Bellare, M., & Ristenpart, T. (2013).
DupLESS: Server-aided encryption for deduplicated
storage. In 22nd {USENIX}Security Symposium ({USENIX}
Security 13) (pp. 179-194).
[14]. Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y.,
Hassan, M. M., & Alelaiwi, A. (2015a). Secure distributed
deduplication systems with improved reliability. IEEE
Transactions on Computers, 64(12), 3569-3579.
[15]. Li, J., Li, J., Xie, D., & Cai, Z. (2015b). Secure auditing
and deduplicating data in cloud. IEEE Transactions on
Computers, 65(8), 2386-2396.
[16]. Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., & Choo, K. K. R.
(2017). Fuzzy identity-based data integrity auditing for
reliable cloud storage systems. IEEE Transactions on
Dependable and Secure Computing, 16(1), 72-83.
[17]. Lynn, B. (2015). The pairing-based cryptographic
library. Retrieved from https://crypto.stanford.edu/pbc/
18]. Peng, S., Zhou, F., Li, J., Wang, Q., & Xu, Z. (2019).
Efficient, dynamic and identity-based remote data
integrity checking for multiple replicas. Journal of Network
and Computer Applications, 134, 72-88. https://doi.org/10.1016/j.jnca.2019.02.014
[19]. Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018).
Enabling identity-based integrity auditing and data
sharing with sensitive information hiding for secure cloud
storage. IEEE Transactions on Information Forensics and
Security, 14(2), 331-346.
[20]. Shen, W., Qin, J., Yu, J., Hao, R., Hu, J., & Ma, J.
(2019). Data integrity auditing without private key storage
for secure cloud storage. IEEE Transactions on Cloud
Computing.
[21]. Singh, P., Agarwal, N., & Raman, B. (2018). Secure
data deduplication using secret sharing schemes over
cloud. Future Generation Computer Systems, 88, 156-
167.
[22]. The Gnu Multiple Precision Arithmetic Library (n.d.).
What is GMP? Retrieved from http://gmplib.org/
[23]. Juels, A., & Kaliski Jr, B. S. (2007, October). PORs:
Proofs of retrievability for large files. In Proceedings of the
14th ACM Conference on Computer and Communications
Security (pp. 584-597). https://doi.org/10.1145/1315245.
1315317
[24]. Shacham, H., & Waters, B. (2008, December).
Compact proofs of retrievability. In International
Conference on the Theory and Application of Cryptology
and Information Security (pp. 90-107). Springer, Berlin,
Heidelberg.
[25]. Bellare, M., Keelveedhi, S., & Ristenpart, T. (2013,
May). Message-locked encr yption and secure
deduplication. In Annual International Conference on
the Theory and Applications of Cryptographic
Techniques (pp. 296-312). Springer, Berlin, Heidelberg.
https://doi.org/10.1007/978-3-642-38348-9_18
[26]. Liu, X., Sun, W., Lou, W., Pei, Q., & Zhang, Y. (2017,
May). One-tag checker: Message-locked integrity
auditing on encrypted cloud deduplication storage. In
IEEE INFOCOM 2017-IEEE Conference on Computer
Communications (pp. 1-9). IEEE.