{"id":"https://openalex.org/W2772247108","doi":"https://doi.org/10.1145/3176258.3176315","title":"Secure Storage with Replication and Transparent Deduplication","display_name":"Secure Storage with Replication and Transparent Deduplication","publication_year":2018,"publication_date":"2018-03-13","ids":{"openalex":"https://openalex.org/W2772247108","doi":"https://doi.org/10.1145/3176258.3176315","mag":"2772247108"},"language":"en","primary_location":{"id":"doi:10.1145/3176258.3176315","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3176258.3176315","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176315","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176315","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089466442","display_name":"Iraklis Leontiadis","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]},{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["CH","US"],"is_corresponding":true,"raw_author_name":"Iraklis Leontiadis","raw_affiliation_strings":["Ecole Polytechnique Federale de Lausanne (EPFL) &amp; New Jersey Institute of Technology (NJIT), Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"Ecole Polytechnique Federale de Lausanne (EPFL) &amp; New Jersey Institute of Technology (NJIT), Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864","https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076193507","display_name":"Reza Curtmola","orcid":"https://orcid.org/0000-0002-7586-0932"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reza Curtmola","raw_affiliation_strings":["New Jersey Institute of Technology (NJIT), Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"New Jersey Institute of Technology (NJIT), Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089466442"],"corresponding_institution_ids":["https://openalex.org/I118118575","https://openalex.org/I5124864"],"apc_list":null,"apc_paid":null,"fwci":3.2887,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93386006,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9505000114440918,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.8471330404281616},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.8012979030609131},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7939256429672241},{"id":"https://openalex.org/keywords/replica","display_name":"Replica","score":0.7355689406394958},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.7206296324729919},{"id":"https://openalex.org/keywords/raid","display_name":"RAID","score":0.6946403980255127},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.6493486762046814},{"id":"https://openalex.org/keywords/file-server","display_name":"File server","score":0.6335597038269043},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5819953083992004},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.5485707521438599},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5326860547065735},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5247124433517456},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.49757030606269836},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4968748390674591},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.490263968706131},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4687647521495819},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3819881081581116},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21546423435211182}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.8471330404281616},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.8012979030609131},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7939256429672241},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.7355689406394958},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.7206296324729919},{"id":"https://openalex.org/C133320665","wikidata":"https://www.wikidata.org/wiki/Q179299","display_name":"RAID","level":2,"score":0.6946403980255127},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.6493486762046814},{"id":"https://openalex.org/C4373008","wikidata":"https://www.wikidata.org/wiki/Q513349","display_name":"File server","level":2,"score":0.6335597038269043},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5819953083992004},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.5485707521438599},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5326860547065735},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5247124433517456},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.49757030606269836},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4968748390674591},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.490263968706131},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4687647521495819},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3819881081581116},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21546423435211182},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3176258.3176315","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3176258.3176315","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176315","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:infoscience.epfl.ch:232893","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/232893","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1145/3176258.3176315","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3176258.3176315","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176315","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1313681611","display_name":"NJIT Secure Computing Initiative","funder_award_id":"1565478","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1761477925","display_name":"CSR: Medium: Mobile Distributed Computing in the Cloud","funder_award_id":"1409523","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1939874854","display_name":null,"funder_award_id":"CNS 1409523","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3161138361","display_name":null,"funder_award_id":"A8650-15-C-7521","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G3447540141","display_name":"CAREER: Secure and Reliable Outsourced Storage Systems Using Remote Data Checking","funder_award_id":"1054754","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3650120076","display_name":null,"funder_award_id":"CNS 1054754, DGE 1565478","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6700681963","display_name":null,"funder_award_id":"CNS 1054754","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8278351472","display_name":null,"funder_award_id":"A8650-15-C-7521","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"},{"id":"https://openalex.org/G8857599506","display_name":null,"funder_award_id":"DGE 1565478","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2772247108.pdf","grobid_xml":"https://content.openalex.org/works/W2772247108.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1519809459","https://openalex.org/W1610688607","https://openalex.org/W1999333545","https://openalex.org/W2058231031","https://openalex.org/W2062878368","https://openalex.org/W2063421119","https://openalex.org/W2067606564","https://openalex.org/W2069667482","https://openalex.org/W2079493184","https://openalex.org/W2083375560","https://openalex.org/W2102881299","https://openalex.org/W2110322986","https://openalex.org/W2129430465","https://openalex.org/W2132027883","https://openalex.org/W2165257856","https://openalex.org/W2169556792","https://openalex.org/W2464641818","https://openalex.org/W2540724729","https://openalex.org/W2574949648","https://openalex.org/W2664868350"],"related_works":["https://openalex.org/W2340838089","https://openalex.org/W1588783802","https://openalex.org/W1892538828","https://openalex.org/W3098509882","https://openalex.org/W2185747496","https://openalex.org/W3113693895","https://openalex.org/W3179902838","https://openalex.org/W3098351737","https://openalex.org/W2615003995","https://openalex.org/W2169841341"],"abstract_inverted_index":{"We":[0,79],"seek":[1],"to":[2,73,119,131],"answer":[3,16],"the":[4,57,75,102,144,149],"following":[5],"question:":[6],"To":[7,15],"what":[8],"extent":[9],"can":[10],"we":[11,19],"deduplicate":[12],"replicated":[13],"storage?":[14],"this":[17],"question,":[18],"design":[20],"ReDup,":[21],"a":[22,81,137],"secure":[23],"storage":[24,43,54,61,91,96,106],"system":[25],"that":[26,38,136],"provides":[27],"users":[28,100],"with":[29],"strong":[30,82],"integrity,":[31],"reliability,":[32],"and":[33,56,93,98],"transparency":[34],"guarantees":[35],"about":[36],"data":[37,51,58,68],"is":[39,63],"outsourced":[40],"at":[41,52,59],"cloud":[42,105],"providers.":[44],"Users":[45],"store":[46,110],"multiple":[47],"replicas":[48,112,142],"of":[49,77,101],"their":[50],"different":[53],"servers,":[55],"each":[60],"server":[62],"deduplicated":[64],"across":[65],"users.":[66,121,150],"Remote":[67],"integrity":[69,76],"mechanisms":[70],"are":[71,88],"used":[72],"check":[74],"replicas.":[78],"consider":[80],"adversarial":[83],"model,":[84],"in":[85],"which":[86],"collusions":[87],"allowed":[89],"between":[90,95],"servers":[92,97],"also":[94],"dishonest":[99,138],"system.":[103],"A":[104],"provider":[107],"(CSP)":[108],"could":[109],"less":[111],"than":[113],"agreed":[114],"upon":[115],"by":[116,127,148],"contract,":[117],"unbeknownst":[118],"honest":[120],"ReDup":[122],"defends":[123],"against":[124],"such":[125],"adversaries":[126],"making":[128],"replica":[129],"generation":[130],"be":[132],"time":[133],"consuming":[134],"so":[135],"CSP":[139],"cannot":[140],"generate":[141],"on":[143],"fly":[145],"when":[146],"challenged":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
