AbbasiKMUl HaqIKamran MalikA, et al. (2017) Data security in cloud as a service for access control among multilevel users. In: 2017 international conference on communication technologies (ComTech), Rawalpindi, Pakistan, 19–21 April, pp. 168–173. New York: IEEE.
2.
AhirwarPAgrawalJSharmaS (2017) A survey: Enhanced block level message locked encryption for data deduplication. International Research Journal of Engineering and Technology4(2): 643–646.
AlluYDouglisFKamatM, et al. (2017) Backup to the future: How workload and hardware changes continually redefine data domain file systems. Computer50(7): 64–72.
5.
BradnerSContrerasJ (2017) Intellectual property rights in IETF technology (No. RFC 8179).
6.
DakhanePMadanB (2017) Implementation of convergent encryption scheme to reduce cloud storage. International Journal of Engineering Science7(7): 13865–13868.
7.
Di PietroRSorniottiA (2012) Boosting efficiency and security in proof of ownership for deduplication. In: Proceedings of the 7th ACM symposium on information, computer and communications security (ASIACCS ‘12), Seoul, Korea, 2–4 May, pp. 81–82. New York, NY: Association for Computing Machinery.
8.
GuoBLeeF-SLinC-I, et al. (2020) A cloud integrated strategy for reconfigurable manufacturing systems. Concurrent Engineering28(4): 305–318.
9.
HaleviSHarnikDPinkasB, et al. (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM conference on computer and communications security (CCS ‘11), Chicago, IL, 17–21 October, pp. 491–500. New York, NY: Association for Computing Machinery.
10.
JungK-DMoonS-JKimJ (2016) Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage. Multimedia Tools and Applications76: 19983–19999.
11.
KaurRChanaIBhattacharyaJ (2018) Data deduplication techniques for efficient cloud storage management: A systematic review. The Journal of Supercomputing74(5): 2035–2085.
LillibridgeMEshghiKBhagwatD (2013) Improving restore speed for backup systems that use inline chunk-based deduplication. In: Proceedings of the 11th USENIX conference on file and storage technologies, San Jose, CA, 12–15 February, pp. 183–198. Washington, DC: USENIX Association.
14.
LiuCLiuXWanL (2013) Policy-based de-duplication in secure cloud storage. In: YuanYWuXLuY (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol. 320. Heidelberg: Springer, pp. 250–262.
15.
LiuJAsokanNPinkasB (2015) Secure deduplication of encrypted data without additional independent servers. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (CCS ‘15), Denver, CO, 12–16 October, pp. 874–885. New York, NY: Association for Computing Machinery.
16.
NgWKWenYZhuH (2012) Private data deduplication protocols in cloud storage. In: Proceedings of the 27th annual ACM symposium on applied computing (SAC ‘12), Trento, 26–30 March, pp. 441–446. New York, NY: Association for Computing Machinery.
17.
OuZSongMHwangZ-H, et al. (2018) Is cloud storage ready? Performance comparison of representative IP-based storage systems. Journal of Systems and Software138: 206–221.
18.
RiekkinenJ (2018) Piracy versus Netflix : Subscription video on demand dissatisfaction as an antecedent of piracy. In: Proceedings of the 51st Hawaii International Conference on System Sciences (HICSS 2018), pp. 3558–3567. University of Hawai’i at Manoa. Available at: http://hdl.handle.net/10125/50338
19.
ShinYKooDHurJ (2017) A survey of secure data deduplication schemes for cloud storage systems. ACM Computing Surveys49(4): 1–38.
20.
SingaramMFinney Daniel ShadrachSSathish KumarN, et al. (2014) Energy efficient self-scheduling algorithm for wireless sensor networks. International Journal of Scientific and Technology Research3(1): 75–78.
21.
SookhakMGaniAKhanK, et al. (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences380: 101–116.
22.
WallaceGDouglisFQianH, et al. (2012) Characteristics of backup workloads in production systems. In: Proceedings of USENIX conference on file and storage technologies, San Jose, CA, 14–17 February, p. 500.
23.
WenMOtaKLiH, et al. (2015) Secure data deduplication with reliable key management for dynamic updates in CPSS. IEEE Transactions on Computational Social Systems2(4): 137–147.
WuSLiK-CMaoB, et al. (2017) DAC: Improving storage availability with deduplication-assisted cloud-of-clouds. Future Generation Computer Systems74: 190–198.
26.
YanZWangMLiY, et al. (2016) Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing3(2): 28–35.
27.
YangCRenJMaJ (2015) Provable ownership of files in deduplication cloud storage. Security and Communication Networks8(14): 2457–2468.
28.
YangXLuRRaymond ChooK-K, et al. (2017) Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Transactions on Big Data. DOI: 10.1109/TBDATA.2017.2721444.
29.
ZadeARKondeSPatilP, et al. (2017) A survey on various techniques used to add watermark to multimedia data for digital copyrights protection. International Research Journal of Engineering and Technology4(3): 1635–1640.