[1] M. Miller, Cloud computing: Web-based applications that change the way you work and collaborate online. Que publishing, 2008.
[2] J. Che, Y. Duan, T. Zhang, and J. Fan, “Study on the security models and strategies of cloud computing,” Procedia Eng., vol. 23, pp. 586–593, 2011.
[3] N. Park and D. J. Lilja, “Characterizing datasets for data deduplication in backup applications,” in Workload Characterization (IISWC), 2010 IEEE International Symposium on, 2010, pp. 1–10.
[4] P. C. Zikopoulos, C. Eaton, D. DeRoos, T. Deutsch, and G. Lapis, “Understanding big data,” New York al McGraw-Hill, vol. 5, no. 8, 2012.
[5] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Infocom, 2010 proceedings ieee, 2010, pp. 1–9.
[6] M. Wen, S. Yu, J. Li, H. Li, and K. Lu, “Big Data Storage Security,” in Big Data Concepts, Theories, and Applications, Springer, 2016, pp. 237–255.
[7] P. Puzio and S. Loureiro, “ClouDedup : Secure Deduplication with Encrypted Data for Cloud Storage,” pp. 363–370, 2013.
[8] V. Rabotka and M. Mannan, “An Evaluation of Recent Secure Deduplication Proposals, Journal of Information Security and Applications, 2016.
[9] Z. Yan, W. Ding, X. Yu, H. Zhu, and R. H. Deng, “Deduplication on encrypted big data in cloud,” IEEE Trans. big data, vol. 2, no. 2, pp. 138–150, 2016.
[10] Z. Yan, M. Wang, Y. Li, and A. V Vasilakos, “Encrypted data management with deduplication in cloud computing,” IEEE Cloud Comput., vol. 3, no. 2, pp. 28–35, 2016.
[11] J. Li, Y. K. Li, X. Chen, P. P. C. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206–1216, 2015.
[12] Z. Yan, W. Ding, and H. Zhu, “A scheme to manage encrypted data storage with deduplication in cloud,” in International Conference on Algorithms and Architectures for Parallel Processing, 2015, pp. 547–561.
[13] C.-I. Fan, S.-Y. Huang, and W.-C. Hsu, “Encrypted Data Deduplication in Cloud Storage,” in Information Security (AsiaJCIS), 2015 10th Asia Joint Conference on, 2015, pp. 18–25.
[14] M. Wen, K. Lu, J. Lei, F. Li, and J. Li, “BDO-SD: An efficient scheme for big data outsourcing with secure deduplication,” in Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on, 2015, pp. 214–219.
[15] J. Liu, N. Asokan, and B. Pinkas, “Secure deduplication of encrypted data without additional independent servers,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 874–885.
[16] A. Shamir, “Identity-based cryptosystems and signature schemes.,” in Crypto, 1984, vol. 84, pp. 47–53.
[17] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology—CRYPTO 2001, 2001, pp. 213–229.
[18] G. L. Kreps, “Strategic use of communication to market cancer prevention and control to vulnerable populations,” Health Mark. Q., vol. 25, no. 1–2, pp. 204–216, 2008.
[19] R. Sakai and M. Kasahara, “ID based Cryptosystems with Pairing on Elliptic Curve.,” IACR Cryptol. ePrint Arch., vol. 2003, p. 54, 2003.
[20] L. Chen and Z. Cheng, “Security proof of sakai-kasahara’s identity-based encryption scheme,” Lect. notes Comput. Sci., vol. 3796, p. 442, 2005.
[21] D. Boneh and X. Boyen, “Efficient selective-ID secure identity-based encryption without random oracles,” in International Conference on the Theory and Applications of Cryptographic Techniques, 2004, pp. 223–238.
[22] A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in Computers and communications (ISCC), 2011 IEEE Symposium on, 2011, pp. 850–855.
[23] K. Keerthana, C. S. Gnanadhas, and R. T. Kumar, “A SURVEY ON MANAGING CLOUD STORAGE USING SECURE DEDUPLICATION,” IIOAB J., vol. 7, no. 9, pp. 656–666, 2016.
[24] J. Stanek and L. Kencl, “Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage,” IEEE Trans. Dependable Secur. Comput., 2016.