{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:54Z","timestamp":1740107874270,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:00:00Z","timestamp":1562889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:00:00Z","timestamp":1562889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61070164","61272415"],"award-info":[{"award-number":["61070164","61272415"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["S2012010008767"],"award-info":[{"award-number":["S2012010008767"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Science and Technology Planning Project of Guangdong Provience, China","award":["2013B010401015"],"award-info":[{"award-number":["2013B010401015"]}]},{"name":"the Zhuhai Top Discipline- Information Security"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00500-019-04215-9","type":"journal-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T14:02:58Z","timestamp":1562940178000},"page":"5671-5682","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure and efficient big data deduplication in fog computing"],"prefix":"10.1007","volume":"24","author":[{"given":"Jiajun","family":"Yan","sequence":"first","affiliation":[]},{"given":"Xiaoming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qingqing","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Suyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Daxin","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,12]]},"reference":[{"key":"4215_CR1","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B et al (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"4215_CR2","doi-asserted-by":"publisher","unstructured":"Cui H, Deng RH, Li Y et al (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TBDATA.2017.2656120","DOI":"10.1109\/TBDATA.2017.2656120"},{"key":"4215_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.comcom.2016.01.011","volume":"82","author":"R Di Pietro","year":"2016","unstructured":"Di Pietro R, Sorniotti A (2016) Proof of ownership for deduplication systems: a secure, scalable, and efficient solution. Comput Commun 82:71\u201382","journal-title":"Comput Commun"},{"key":"4215_CR4","doi-asserted-by":"crossref","unstructured":"Douceur JR, Adya A, Bolosky WJ et al (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems. IEEE, pp 617\u2013624","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"4215_CR5","doi-asserted-by":"publisher","unstructured":"Fu Y, Xiao N, Jiang H et al (2017) Application-aware big data deduplication in cloud environment. IEEE Trans Cloud Comput. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TCC.2017.2710043","DOI":"10.1109\/TCC.2017.2710043"},{"key":"4215_CR6","doi-asserted-by":"crossref","unstructured":"Gou Z, Yamaguchi S, Gupta BB (2017) Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity theft: breakthroughs in research and practice. IGI Global, pp 221\u2013247","DOI":"10.4018\/978-1-5225-0808-3.ch011"},{"issue":"7","key":"4215_CR7","doi-asserted-by":"publisher","first-page":"9203","DOI":"10.1007\/s11042-017-5301-x","volume":"77","author":"BB Gupta","year":"2018","unstructured":"Gupta BB, Yamaguchi S, Agrawal DP (2018) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multim Tools Appl 77(7):9203\u20139208","journal-title":"Multim Tools Appl"},{"key":"4215_CR8","doi-asserted-by":"crossref","unstructured":"Halevi S, Harnik D, Pinkas B et al (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security. ACM, pp 491\u2013500","DOI":"10.1145\/2046707.2046765"},{"issue":"3","key":"4215_CR9","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TIFS.2016.2622013","volume":"12","author":"T Jiang","year":"2017","unstructured":"Jiang T, Chen X, Wu Q et al (2017) Secure and efficient cloud data deduplication with randomized tag. IEEE Trans Inf Forensics Secur 12(3):532\u2013543","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4215_CR10","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1016\/j.future.2017.01.024","volume":"78","author":"D Koo","year":"2018","unstructured":"Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739\u2013752","journal-title":"Future Gener Comput Syst"},{"key":"4215_CR11","doi-asserted-by":"crossref","unstructured":"Koo D, Shin Y, Yun J et al (2016) A hybrid deduplication for secure and efficient data outsourcing in fog Computing. In: 2016 IEEE international conference on cloud computing technology and science (CloudCom). IEEE, pp 285\u2013293","DOI":"10.1109\/CloudCom.2016.0054"},{"issue":"4","key":"4215_CR12","doi-asserted-by":"publisher","first-page":"5889","DOI":"10.1007\/s11042-015-2595-4","volume":"76","author":"H Kwon","year":"2017","unstructured":"Kwon H, Hahn C, Kim D et al (2017) Secure deduplication for multimedia data with user revocation in cloud storage. Multim Tools Appl 76(4):5889\u20135903","journal-title":"Multim Tools Appl"},{"key":"4215_CR13","doi-asserted-by":"crossref","unstructured":"Mishra S, Singh S, Ali ST (2018) MPoWS: merged proof of ownership and storage for block level deduplication in cloud storage. In: 2018 9th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1\u20137","DOI":"10.1109\/ICCCNT.2018.8493976"},{"key":"4215_CR14","doi-asserted-by":"publisher","unstructured":"Ni J, Zhang K, Yu Y et al (2018) Providing task allocation and secure deduplication for mobile crowdsensing via fog computing[J]. IEEE Trans Dependable Secure Comput. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TDSC.2018.2791432","DOI":"10.1109\/TDSC.2018.2791432"},{"key":"4215_CR15","doi-asserted-by":"crossref","unstructured":"Pooranian Z, Chen KC, Yu CM et al (2018) RARE: defeating side channels based on data-deduplication in cloud storage. In: IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 444\u2013449","DOI":"10.1109\/INFCOMW.2018.8406888"},{"issue":"19","key":"4215_CR16","doi-asserted-by":"publisher","first-page":"19363","DOI":"10.1007\/s11042-015-2956-z","volume":"76","author":"Y Shin","year":"2017","unstructured":"Shin Y, Koo D, Hur J et al (2017a) Secure proof of storage with deduplication for cloud storage systems. Multim Tools Appl 76(19):19363\u201319378","journal-title":"Multim Tools Appl"},{"key":"4215_CR17","doi-asserted-by":"publisher","unstructured":"Shin Y, Koo D, Yun J et al (2017b) Decentralized server-aided encryption for secure deduplication in cloud storage. IEEE Trans Serv Comput. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TSC.2017.2748594","DOI":"10.1109\/TSC.2017.2748594"},{"issue":"4","key":"4215_CR18","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/TDSC.2016.2603501","volume":"15","author":"J Stanek","year":"2018","unstructured":"Stanek J, Kencl L (2018) Enhanced secure thresholded data deduplication scheme for cloud storage. IEEE Trans Dependable Secure Comput 15(4):694\u2013707","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"4215_CR19","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou C, Psannis KE, Kim BG et al (2018a) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964\u2013975","journal-title":"Future Gener Comput Syst"},{"key":"4215_CR20","doi-asserted-by":"crossref","unstructured":"Stergiou C, Psannis KE, Xifilidis T et al (2018) Security and privacy of big data for social networking services in cloud. In:IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 438\u2013443","DOI":"10.1109\/INFCOMW.2018.8406831"},{"key":"4215_CR21","doi-asserted-by":"publisher","unstructured":"Xiong J, Zhang Y, Lin L et al (2017) ms-PoSW: a multi-server aided proof of shared ownership scheme for secure deduplication in cloud. Concurr Comput: Pract Exp. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1002\/cpe.4252","DOI":"10.1002\/cpe.4252"},{"key":"4215_CR22","doi-asserted-by":"publisher","unstructured":"Yang X, Lu R, Choo KKR et al (2017) Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Trans Big Data. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TBDATA.2017.2721444","DOI":"10.1109\/TBDATA.2017.2721444"},{"issue":"14","key":"4215_CR23","doi-asserted-by":"publisher","first-page":"18249","DOI":"10.1007\/s11042-017-5288-3","volume":"77","author":"Q Yaseen","year":"2018","unstructured":"Yaseen Q, Aldwairi M, Jararweh Y et al (2018) Collusion attacks mitigation in internet of things: a fog based model. Multim Tools Appl 77(14):18249\u201318268","journal-title":"Multim Tools Appl"},{"key":"4215_CR24","doi-asserted-by":"publisher","unstructured":"Yu CM, Gochhayat SP, Conti M et al (2018) Privacy aware data deduplication for side channel in cloud storage. IEEE Trans Cloud Comput. \nhttps:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TCC.2018.2794542","DOI":"10.1109\/TCC.2018.2794542"},{"issue":"9","key":"4215_CR25","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/TII.2018.2832251","volume":"14","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Xu C, Li H et al (2018) Healthdep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans Ind Inf 14(9):4101\u20134112","journal-title":"IEEE Trans Ind Inf"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04215-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s00500-019-04215-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04215-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T23:08:36Z","timestamp":1594422516000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/s00500-019-04215-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,12]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["4215"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s00500-019-04215-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2019,7,12]]},"assertion":[{"value":"12 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}