{"id":"https://openalex.org/W3022503884","doi":"https://doi.org/10.1145/3342195.3387531","title":"Balancing storage efficiency and data confidentiality with tunable encrypted deduplication","display_name":"Balancing storage efficiency and data confidentiality with tunable encrypted deduplication","publication_year":2020,"publication_date":"2020-04-15","ids":{"openalex":"https://openalex.org/W3022503884","doi":"https://doi.org/10.1145/3342195.3387531","mag":"3022503884"},"language":"en","primary_location":{"id":"doi:10.1145/3342195.3387531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3342195.3387531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth European Conference on Computer Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034762138","display_name":"Jingwei Li","orcid":"https://orcid.org/0000-0001-8457-0454"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingwei Li","raw_affiliation_strings":["University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005434389","display_name":"Zuoru Yang","orcid":"https://orcid.org/0000-0001-6915-7100"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zuoru Yang","raw_affiliation_strings":["The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074141991","display_name":"Yanjing Ren","orcid":"https://orcid.org/0000-0001-8882-6293"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanjing Ren","raw_affiliation_strings":["University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012129385","display_name":"Patrick P. C. Lee","orcid":"https://orcid.org/0000-0002-4501-4364"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Patrick P. C. Lee","raw_affiliation_strings":["The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5034762138"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":7.5092,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.97275927,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.9197953939437866},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8539892435073853},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.853532075881958},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5216870307922363},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48497939109802246},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4633842706680298},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.4359200596809387},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43381163477897644},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.43243223428726196},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.39392611384391785},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28994685411453247},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.262745201587677}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.9197953939437866},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8539892435073853},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.853532075881958},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5216870307922363},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48497939109802246},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4633842706680298},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.4359200596809387},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43381163477897644},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.43243223428726196},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.39392611384391785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28994685411453247},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.262745201587677}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3342195.3387531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3342195.3387531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth European Conference on Computer Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W22807665","https://openalex.org/W37027385","https://openalex.org/W48174705","https://openalex.org/W66778775","https://openalex.org/W69510097","https://openalex.org/W120798314","https://openalex.org/W169466422","https://openalex.org/W200233886","https://openalex.org/W1445823765","https://openalex.org/W1454188553","https://openalex.org/W1519809459","https://openalex.org/W1545493325","https://openalex.org/W1570998442","https://openalex.org/W1892798954","https://openalex.org/W1965555277","https://openalex.org/W1969126835","https://openalex.org/W1969949656","https://openalex.org/W1971212200","https://openalex.org/W1975868314","https://openalex.org/W1979664098","https://openalex.org/W1999333545","https://openalex.org/W2009191935","https://openalex.org/W2019927367","https://openalex.org/W2020928798","https://openalex.org/W2063421119","https://openalex.org/W2074388704","https://openalex.org/W2079493184","https://openalex.org/W2080234606","https://openalex.org/W2092071682","https://openalex.org/W2098431880","https://openalex.org/W2102881299","https://openalex.org/W2103658959","https://openalex.org/W2104149336","https://openalex.org/W2110322986","https://openalex.org/W2121133177","https://openalex.org/W2124218043","https://openalex.org/W2132069633","https://openalex.org/W2137502482","https://openalex.org/W2138001464","https://openalex.org/W2148048154","https://openalex.org/W2157240622","https://openalex.org/W2165257856","https://openalex.org/W2267406438","https://openalex.org/W2281363974","https://openalex.org/W2296319761","https://openalex.org/W2491163338","https://openalex.org/W2536125594","https://openalex.org/W2545905260","https://openalex.org/W2602333238","https://openalex.org/W2603054666","https://openalex.org/W2606291150","https://openalex.org/W2639926268","https://openalex.org/W2752173704","https://openalex.org/W2783443550","https://openalex.org/W2789400187","https://openalex.org/W2793900539","https://openalex.org/W2820868167","https://openalex.org/W2887029421","https://openalex.org/W2889227180","https://openalex.org/W2913700460","https://openalex.org/W2950576097","https://openalex.org/W2982561007","https://openalex.org/W3121854121","https://openalex.org/W4243055721","https://openalex.org/W4254263397","https://openalex.org/W4254884627"],"related_works":["https://openalex.org/W2766145069","https://openalex.org/W3003602898","https://openalex.org/W2515214618","https://openalex.org/W2547510008","https://openalex.org/W2004039463","https://openalex.org/W3181110568","https://openalex.org/W4384519212","https://openalex.org/W2395781810","https://openalex.org/W4297294775","https://openalex.org/W2462413382"],"abstract_inverted_index":{"Conventional":[0],"encrypted":[1,41,90,128],"deduplication":[2,6,42,129],"approaches":[3],"retain":[4],"the":[5,16,21,51,74,79,111,149],"capability":[7],"on":[8,71,139],"duplicate":[9,82,87],"chunks":[10,88],"after":[11],"encryption":[12],"by":[13,91,115],"always":[14],"deriving":[15],"key":[17,67],"for":[18,49,121],"encryption/decryption":[19],"from":[20],"chunk":[22,75,83],"content,":[23],"but":[24,77],"such":[25,85],"a":[26,39,46,95,105],"deterministic":[27],"nature":[28],"causes":[29],"information":[30,112],"leakage":[31,113],"due":[32],"to":[33,103,132],"frequency":[34],"analysis.":[35],"We":[36,125],"present":[37],"TED,":[38],"tunable":[40,47],"primitive":[43],"that":[44,65,86,145],"provides":[45],"mechanism":[48],"balancing":[50],"tradeoff":[52],"between":[53,151],"storage":[54,106,152],"efficiency":[55,153],"and":[56,154],"data":[57,155],"confidentiality.":[58],"The":[59],"core":[60],"idea":[61],"of":[62,81],"TED":[63,100,134,146],"is":[64,69,119],"its":[66],"derivation":[68],"based":[70],"not":[72],"only":[73],"content":[76],"also":[78],"number":[80],"copies,":[84],"are":[89],"distinct":[92],"keys":[93],"in":[94,135],"controlled":[96],"manner.":[97],"In":[98],"particular,":[99],"allows":[101],"users":[102],"configure":[104],"blowup":[107],"factor,":[108],"under":[109],"which":[110],"quantified":[114],"an":[116,127],"information-theoretic":[117],"measure":[118],"minimized":[120],"any":[122],"input":[123],"workload.":[124],"implement":[126],"prototype":[130],"TEDStore":[131],"realize":[133],"networked":[136],"environments.":[137],"Evaluation":[138],"real-world":[140],"file":[141],"system":[142],"snapshots":[143],"shows":[144],"effectively":[147],"balances":[148],"trade-off":[150],"confidentiality,":[156],"with":[157],"small":[158],"performance":[159],"overhead.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
