Secure Storage with Deduplication.
John BestWayne HinemanSteven HetzlerGuerney HuntCharanjit S. JutlaPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- data storage
- storage and retrieval
- storage space
- security requirements
- record linkage
- covert channel
- relational databases
- remote server
- cryptographic protocols
- user authentication
- standard model
- key management
- security analysis
- sensitive data
- key exchange
- storage devices
- real time
- security issues
- file system
- electronic commerce
- response time
- data mining