{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T17:15:14Z","timestamp":1721063714505},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12083-020-00989-0","type":"journal-article","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T09:11:50Z","timestamp":1598605910000},"page":"2443-2451","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3381-4903","authenticated-orcid":false,"given":"Silambarasan Elkana","family":"Ebinazer","sequence":"first","affiliation":[]},{"given":"Nickolas","family":"Savarimuthu","sequence":"additional","affiliation":[]},{"given":"Mary Saira Bhanu","family":"S","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"989_CR1","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357\u2013383","journal-title":"Inf Sci"},{"key":"989_CR2","doi-asserted-by":"publisher","first-page":"75090","DOI":"10.1109\/ACCESS.2019.2920998","volume":"7","author":"J Xiong","year":"2019","unstructured":"Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090\u201375104","journal-title":"IEEE Access"},{"key":"989_CR3","unstructured":"Widjava I (2011) The 10 worst cloud outages: lessons learned. Cloud business review http:\/\/www.Cbrdigital.Com\/2011\/06\/30\/the-10-worstcloud-outages-lessons-learned.Html"},{"key":"989_CR4","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.future.2016.02.001","volume":"74","author":"S Wu","year":"2017","unstructured":"Wu S, Li K-C, Mao B, Liao M (2017) Dac: improving storage availability with deduplication-assisted cloud-of-clouds. Futur Gener Comput Syst 74:190\u2013198","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"989_CR5","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1504\/IJBDI.2017.085530","volume":"4","author":"Q Zhan","year":"2017","unstructured":"Zhan Q, Su J, Hu Y (2017) Research on encryption strategy in large data environment based on proxy re-encryption. Int J Big Data Intell 4(3):208\u2013215","journal-title":"Int J Big Data Intell"},{"key":"989_CR6","unstructured":"Singh P, Raman B, Agarwal N (2017a) Towards elncrypted video tampering detection and localization based on pob number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology (99):1\u20131"},{"key":"989_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ins.2016.09.005","volume":"387","author":"Y Li","year":"2017","unstructured":"Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103\u2013115","journal-title":"Inf Sci"},{"key":"989_CR8","doi-asserted-by":"crossref","unstructured":"Liu J, Wang J, Tao X, Shen J (2017) Secure similaritybased cloud data deduplication in ubiquitous city. Pervasive and Mobile computing, pp 231\u2013242","DOI":"10.1016\/j.pmcj.2017.03.010"},{"key":"989_CR9","doi-asserted-by":"crossref","unstructured":"Kamara S, Lauter KE et al (2010) Cryptographic cloud storage. In: financial cryptography workshops, volume 6054. Springer, pp 136\u2013149","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"989_CR10","unstructured":"Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In USENIX security symposium, volume 316"},{"key":"989_CR11","doi-asserted-by":"crossref","unstructured":"Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: distributed computing systems, 2002. Proceedings. 22nd international conference on, IEEE, pp 617\u2013624","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"989_CR12","doi-asserted-by":"crossref","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 296\u2013312","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"989_CR13","doi-asserted-by":"crossref","unstructured":"Di Pietro R, Sorniotti A (2012) Boosting efficiency and security in proof of ownership for deduplication. In: proceedings of the 7th ACM symposium on information, computer and communications security, ACM, pp 81\u201382","DOI":"10.1145\/2414456.2414504"},{"key":"989_CR14","doi-asserted-by":"crossref","unstructured":"Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In proceedings of the 27th annual ACM symposium on applied computing, ACM, pp 441\u2013446","DOI":"10.1145\/2245276.2245361"},{"key":"989_CR15","doi-asserted-by":"crossref","unstructured":"Leis V, Kemper A, Neumann T (2013) The adaptive radix tree: ARTful indexing for main-memory databases. In: 2013 IEEE 29th international conference on data engineering (ICDE) IEEE, pp 38-49","DOI":"10.1109\/ICDE.2013.6544812"},{"key":"989_CR16","doi-asserted-by":"crossref","unstructured":"Debnath B, Sengupta S, Li J, Lilja DJ, Du DH (2011) BloomFlash: bloom filter on flash-based storage. In 2011 31st international conference on distributed computing systems, IEEE, pp 635-644","DOI":"10.1109\/ICDCS.2011.44"},{"key":"989_CR17","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.future.2018.04.097","volume":"88","author":"P Singh","year":"2018","unstructured":"Singh P, Agarwal N, Raman B (2018) Secure data deduplication using secret sharing schemes over cloud. Futur Gener Comput Syst 88:156\u2013167","journal-title":"Futur Gener Comput Syst"},{"key":"989_CR18","doi-asserted-by":"publisher","unstructured":"N Krishnaraj, Mohamed Elhoseny, E Laxmi Lydia, K Shankar, Omar ALDabbas (2020) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Software: Practice and Experience. In press: https:\/\/doi.org\/10.1002\/spe.2834","DOI":"10.1002\/spe.2834"},{"key":"989_CR19","doi-asserted-by":"crossref","unstructured":"Sachi Nandan Mohanty, Ramya KC, Sheeba Rani S, Deepak Gupta, Shankar K, Lakshmanaprabu SK (2020) An efficient Lightweight integrated Block chain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027\u20131037","DOI":"10.1016\/j.future.2019.09.050"},{"issue":"10","key":"989_CR20","first-page":"1221","volume":"25","author":"K Shankar","year":"2019","unstructured":"Shankar K, Mohamed Elhoseny (2019) Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J Univers Comput Sci 25(10):1221\u20131239","journal-title":"J Univers Comput Sci"},{"key":"989_CR21","doi-asserted-by":"publisher","unstructured":"Mohamed Elhoseny, Shankar K (2019) Reliable data transmission model for mobile Ad Hoc network using signcryption technique. IEEE Transactions on Reliability:1\u201310. In Press. https:\/\/doi.org\/10.1109\/TR.2019.2915800","DOI":"10.1109\/TR.2019.2915800"},{"key":"989_CR22","doi-asserted-by":"publisher","unstructured":"Shankar K, Lakshmanaprabu SK, Deepak Gupta, Ashish Khanna, Victor Hugo C Albuquerque (2018) Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience. In press. https:\/\/doi.org\/10.1002\/cpe.5122","DOI":"10.1002\/cpe.5122"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00989-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00989-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00989-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:16:42Z","timestamp":1630109802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00989-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["989"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00989-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"26 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}