{"id":"https://openalex.org/W3131653338","doi":"https://doi.org/10.1109/comsnets51098.2021.9352742","title":"Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage","display_name":"Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage","publication_year":2021,"publication_date":"2021-01-05","ids":{"openalex":"https://openalex.org/W3131653338","doi":"https://doi.org/10.1109/comsnets51098.2021.9352742","mag":"3131653338"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets51098.2021.9352742","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets51098.2021.9352742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057874814","display_name":"Hardik Gajera","orcid":"https://orcid.org/0009-0000-8734-7776"},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Hardik Gajera","raw_affiliation_strings":["DA-IICT, Gandhinagar, India"],"affiliations":[{"raw_affiliation_string":"DA-IICT, Gandhinagar, India","institution_ids":["https://openalex.org/I98389781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059137133","display_name":"Manik Lal Das","orcid":"https://orcid.org/0000-0002-1218-4041"},"institutions":[{"id":"https://openalex.org/I98389781","display_name":"Dhirubhai Ambani Institute of Information and Communication Technology","ror":"https://ror.org/02d5b7g69","country_code":"IN","type":"education","lineage":["https://openalex.org/I98389781"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manik Lal Das","raw_affiliation_strings":["DA-IICT, Gandhinagar, India"],"affiliations":[{"raw_affiliation_string":"DA-IICT, Gandhinagar, India","institution_ids":["https://openalex.org/I98389781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057874814"],"corresponding_institution_ids":["https://openalex.org/I98389781"],"apc_list":null,"apc_paid":null,"fwci":0.5508,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70074082,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"237","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9225999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.8791002631187439},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7981281280517578},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.7719534635543823},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6744771599769592},{"id":"https://openalex.org/keywords/retrievability","display_name":"Retrievability","score":0.5528714060783386},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5421387553215027},{"id":"https://openalex.org/keywords/file-server","display_name":"File server","score":0.48571500182151794},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46579062938690186},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.42239224910736084},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4170783460140228},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38364356756210327},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3732011914253235},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2426305115222931},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1182977557182312}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.8791002631187439},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7981281280517578},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.7719534635543823},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6744771599769592},{"id":"https://openalex.org/C191072391","wikidata":"https://www.wikidata.org/wiki/Q17043235","display_name":"Retrievability","level":3,"score":0.5528714060783386},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5421387553215027},{"id":"https://openalex.org/C4373008","wikidata":"https://www.wikidata.org/wiki/Q513349","display_name":"File server","level":2,"score":0.48571500182151794},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46579062938690186},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.42239224910736084},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4170783460140228},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38364356756210327},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3732011914253235},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2426305115222931},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1182977557182312},{"id":"https://openalex.org/C161156560","wikidata":"https://www.wikidata.org/wiki/Q1638872","display_name":"Document retrieval","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets51098.2021.9352742","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets51098.2021.9352742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W37027385","https://openalex.org/W1519809459","https://openalex.org/W1675372141","https://openalex.org/W1728378095","https://openalex.org/W1981186310","https://openalex.org/W1991352533","https://openalex.org/W2009191935","https://openalex.org/W2058406610","https://openalex.org/W2095763432","https://openalex.org/W2102881299","https://openalex.org/W2137502482","https://openalex.org/W2157240622","https://openalex.org/W2165257856","https://openalex.org/W2292320942","https://openalex.org/W2317570624","https://openalex.org/W2343041492","https://openalex.org/W2346827671","https://openalex.org/W2515262050","https://openalex.org/W2540126579","https://openalex.org/W2540724729","https://openalex.org/W2578477031","https://openalex.org/W2732623392","https://openalex.org/W2741986284","https://openalex.org/W2789429590","https://openalex.org/W2805132824","https://openalex.org/W2809795430","https://openalex.org/W2966753209","https://openalex.org/W2971417566","https://openalex.org/W2972472007","https://openalex.org/W3039635909","https://openalex.org/W6630994405","https://openalex.org/W6675339306","https://openalex.org/W6684333879","https://openalex.org/W6696959813","https://openalex.org/W6740766377","https://openalex.org/W6752240770","https://openalex.org/W6766415068","https://openalex.org/W6767242043"],"related_works":["https://openalex.org/W7485291","https://openalex.org/W6847055","https://openalex.org/W11085978","https://openalex.org/W1371721","https://openalex.org/W6851591","https://openalex.org/W8939198","https://openalex.org/W2466218","https://openalex.org/W13579647","https://openalex.org/W2012468","https://openalex.org/W8425571"],"abstract_inverted_index":{"Verification":[0],"of":[1,4,52,56,61,89,102,146,163,183],"the":[2,5,23,26,66,76,80,86,153,164,177,184],"integrity":[3],"data":[6,37,57,77,90,105,126,150,165],"stored":[7,38,78],"on":[8],"a":[9,14,40,72,99],"public":[10,161],"cloud":[11,27,41],"server":[12,81],"is":[13,168,190],"challenging":[15],"research":[16],"problem.":[17],"While":[18],"providing":[19],"on-demand":[20],"service":[21,24,28],"to":[22,32,124,194],"consumer,":[25],"provider":[29],"also":[30],"requires":[31],"ensure":[33],"minimizing":[34],"error":[35],"in":[36,39,65,79,192],"storage":[42,53,95,103,147],"server.":[43],"To":[44],"address":[45],"this":[46,139],"issue,":[47],"many":[48],"schemes":[49,113,132],"like":[50],"proof":[51,55,60,101,145],"(POS),":[54],"possession":[58],"(PDP),":[59],"retrievability":[62],"(POR)":[63],"exist":[64],"literature.":[67],"However,":[68],"for":[69,92,135],"practical":[70],"purpose,":[71],"scheme":[73,148,186],"which":[74,155],"verifies":[75],"should":[82],"be":[83],"compatible":[84],"with":[85,104,149],"standard":[87,178],"practice":[88],"deduplication":[91,106,151],"an":[93,143],"efficient":[94,144,191],"system.":[96],"There":[97],"are":[98,122,133],"few":[100],"(POSD)":[107],"schemes.":[108,196],"We":[109],"observe":[110],"that":[111,188],"these":[112],"do":[114],"not":[115],"consider":[116],"stronger":[117],"tag":[118],"consistency":[119],"properties":[120],"and":[121,174],"vulnerable":[123],"duplicate":[125,171],"faking":[127,172],"attacks.":[128],"Moreover,":[129],"existing":[130],"POSD":[131],"inefficient":[134],"real-world":[136],"applications.":[137],"In":[138],"paper,":[140],"we":[141],"present":[142],"at":[152],"block-level":[154],"allows":[156],"private":[157],"as":[158,160],"well":[159],"verification":[162],"stored.":[166],"DPoS":[167,185],"secure":[169],"against":[170],"attacks":[173],"unforgeable":[175],"under":[176],"assumption.":[179],"The":[180],"theoretical":[181],"analysis":[182],"shows":[187],"it":[189],"comparison":[193],"related":[195]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
