.. .. Background, Background Biochemistry, Vitamins, pp.67-93

. .. Secure-deduplication, Secure Deduplication for Cloud Storage, International Journal of Science and Research (IJSR), vol.4, issue.12, pp.440-443, 2015.

D. Vasilopoulos, M. Önen, K. Elkhiyaoui, and R. Molva, Message-Locked Proofs of Retrievability with Secure Deduplication, Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016.

. ;. Ml.keygen, Server-aided message-locked key generation

. Ml and . Por, Private-Compact-PoR: A message-locked PoR scheme based on linearly-homomorphic tags

.. .. Security,

K. Elkhiyaoui, M. Önen, D. Vasilopoulos, D. V. García, B. G. Crespo et al., TREDISEC Project, D2.2 Requirements Analysis and Consolidation, pp.2019-2024, 2015.

B. Beach, Amazon Machine Images, Pro Powershell for Amazon Web Services, pp.115-134, 2014.

D. Vohra, Apache HBase and HDFS, Apache HBase Primer, pp.9-43, 2016.

M. Xia, M. Saxena, M. Blaum, and D. A. Pease, A tale of two erasure codes in hdfs, Proceedings of the 13th USENIX Conference on File and Storage Technologies, ser. FAST'15, pp.213-226, 2015.

B. Calder, H. Simitci, J. Haridas, C. Uddaraju, H. Khatri et al., Windows Azure Storage, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11, 2011.

&. Hdfs-raid, , pp.2017-2025

R. Ross, M. Mcevilley, and J. Carrier-oren, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, 2016.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner et al., Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security - CCS '07, 2007.

A. Juels and B. S. Kaliski, Pors, Proceedings of the 14th ACM conference on Computer and communications security - CCS '07, 2007.

H. Shacham and B. Waters, Compact Proofs of Retrievability, Advances in Cryptology - ASIACRYPT 2008, pp.90-107, 2008.

G. Hogben and A. Pannetrat, Mutant Apples: A Critical Examination of Cloud SLA Availability Definitions, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, vol.1, 2013.

C. Xing and S. Ling, Coding Theory: A First Course, 2003.

J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2014.

S. Goldwasser and S. Micali, Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82, 1982.

M. Azraoui, K. Elkhiyaoui, R. Molva, and M. Önen, StealthGuard: Proofs of Retrievability with Hidden Watchdogs, Computer Security - ESORICS 2014, pp.239-256, 2014.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan et al., Remote data checking using provable data possession, ACM Transactions on Information and System Security, vol.14, issue.1, pp.1-34, 2011.

G. Ateniese, R. Di-pietro, L. V. Mancini, and G. Tsudik, Scalable and efficient provable data possession, Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08, 2008.

C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, Proceedings of the 16th ACM conference on Computer and communications security - CCS '09, 2009.

B. Chen and R. Curtmola, Robust dynamic remote data checking for public clouds, Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12, 2012.

J. Xu and E. Chang, Towards efficient proofs of retrievability, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12, 2012.

Y. Dodis, S. Vadhan, and D. Wichs, Proofs of Retrievability via Hardness Amplification, Theory of Cryptography, pp.109-127, 2009.

D. Cash, A. Küpçü, and D. Wichs, Dynamic Proofs of Retrievability Via Oblivious RAM, Journal of Cryptology, vol.30, issue.1, pp.22-57, 2015.

E. Shi, E. Stefanov, and C. Papamanthou, Practical dynamic proofs of retrievability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, 2013.

R. C. Merkle, A Digital Signature Based on a Conventional Encryption Function, Advances in Cryptology ? CRYPTO ?87, pp.369-378, 1988.

Y. Ren, J. Xu, J. Wang, and J. Kim, Designated-Verifier Provable Data Possession in Public Cloud Storage, International Journal of Security and Its Applications, vol.7, issue.6, pp.11-20, 2013.

S. Shen and W. Tzeng, Delegable Provable Data Possession for Remote Data in the Clouds, Information and Communications Security, pp.93-111, 2011.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Computer Security ? ESORICS 2009, pp.355-370, 2009.

, Computer Security ? ESORICS 2009, European Conference on Research in Computer Security, ser. ESORICS'09, 2009.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.5, pp.847-859, 2011.

C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, 2010 Proceedings IEEE INFOCOM, 2010.

F. Armknecht, J. Bohli, G. O. Karame, Z. Liu, and C. A. Reuter, Outsourced Proofs of Retrievability, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14, 2014.

K. D. Bowers, A. Juels, and A. Oprea, Proofs of retrievability, Proceedings of the 2009 ACM workshop on Cloud computing security - CCSW '09, 2009.

O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986.

E. Blass, R. Di-pietro, R. Molva, and M. Önen, PRISM ? Privacy-Preserving Search in MapReduce, Privacy Enhancing Technologies, pp.180-200, 2012.

J. Trostle and A. Parrish, Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups, Lecture Notes in Computer Science, pp.114-128, 2011.

B. Chen and R. Curtmola, Towards self-repairing replication-based storage systems using untrusted clouds, Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13, 2013.

B. Chen and R. Curtmola, Remote data integrity checking with server-side repair1, Journal of Computer Security, vol.25, issue.6, pp.537-584, 2017.

F. Armknecht, J. Bohli, G. O. Karame, and W. Li, Outsourcing Proofs of Retrievability, IEEE Transactions on Cloud Computing, pp.1-1, 2019.

R. Curtmola, O. Khan, R. Burns, and G. Ateniese, MR-PDP: Multiple-Replica Provable Data Possession, 2008 The 28th International Conference on Distributed Computing Systems, 2008.

A. F. Barsoum and A. A. Hasan, Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.12, pp.2375-2385, 2013.

A. F. Barsoum and M. A. Hasan, Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012.

, Provable multicopy dynamic data possession in cloud computing systems, IEEE Transactions on Information Forensics and Security, vol.10, 2015.

M. Etemad and A. Küpçü, Transparent, distributed, and replicated dynamic provable data possession, Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ser. ACNS'13, 2013.

M. Van-dijk, A. Juels, A. Oprea, R. L. Rivest, E. Stefanov et al., Hourglass schemes: How to prove that cloud files are encrypted, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12, 2012.

I. Leontiadis and R. Curtmola, Secure storage with replication and transparent deduplication, Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, ser. CODASPY '18, 2018.

K. D. Bowers, A. Juels, and A. Oprea, Hail: A high-availability and integrity layer for cloud storage, Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS '09, 2009.

B. Chen, A. K. Ammula, and R. Curtmola, Towards server-side repair for erasure coding-based distributed storage systems, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, ser. CODASPY '15, 2015.

B. Chen, R. Curtmola, G. Ateniese, and R. Burns, Remote data checking for network coding-based distributed storage systems, Proceedings of the 2010 ACM workshop on Cloud computing security workshop - CCSW '10, 2010.

A. Le and A. Markopoulou, NC-Audit: Auditing for network coding storage, 2012 International Symposium on Network Coding (NetCod), 2012.

, Locating byzantine attackers in intra-session network coding using spacemac, Proceedings of International Symposium on Network Coding, ser. NetCod '10, 2010.

T. P. Thao and K. Omote, ELAR, Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016.

K. D. Bowers, M. Van-dijk, A. Juels, A. Oprea, and R. L. Rivest, How to tell if your cloud files are vulnerable to drive crashes, Proceedings of the 18th ACM conference on Computer and communications security - CCS '11, 2011.

C. Suh and K. Ramchandran, Exact-Repair MDS Code Construction Using Interference Alignment, IEEE Transactions on Information Theory, vol.57, issue.3, pp.1425-1442, 2011.

M. Blaum, J. Brady, J. Bruck, and J. Menon, Evenodd: An optimal scheme for tolerating double disk failures in raid architectures, Proceedings of the 21st Annual International Symposium on Computer Architecture, ser. ISCA '94, 1994.

R. L. Rivest, A. Shamir, and D. A. Wagner, Time-lock puzzles and timed-release crypto, Tech. Rep, 1996.

J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems

D. T. Meyer and W. J. Bolosky, A study of practical deduplication, ACM Transactions on Storage, vol.7, issue.4, pp.1-20, 2012.

J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, A Secure Data Deduplication Scheme for Cloud Storage, Financial Cryptography and Data Security, pp.99-118, 2014.

P. Puzio, R. Molva, M. Önen, and S. Loureiro, PerfectDedup: Secure Data Deduplication, Lecture Notes in Computer Science, pp.150-166, 2016.

M. Bellare, S. Keelveedhi, and T. Ristenpart, Message-Locked Encryption and Secure Deduplication, Advances in Cryptology ? EUROCRYPT 2013, pp.296-312, 2013.

P. Puzio, R. Molva, M. Onen, and S. Loureiro, ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013.

D. Harnik, B. Pinkas, and A. Shulman-peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.40-47, 2010.

F. Armknecht, C. Boyd, G. T. Davies, K. Gjøsteen, and M. Toorani, Side Channels in Deduplication, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017.

R. Di-pietro and A. Sorniotti, Boosting efficiency and security in proof of ownership for deduplication, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12, 2012.

F. Armknecht, J. Bohli, G. O. Karame, and F. Youssef, Transparent Data Deduplication in the Cloud, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-peleg, Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security - CCS '11, 2011.

J. Camenisch, G. Neven, and A. Shelat, Simulatable Adaptive Oblivious Transfer, Advances in Cryptology - EUROCRYPT 2007, pp.573-590, 2007.

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Cryptology, 2002.

J. Liu, N. Asokan, and B. Pinkas, Secure Deduplication of Encrypted Data Without Additional Independent Servers, Proceedings of the 22nd ACM Conference on Computer and Communications Security , ser. CCS '15, 2015.

R. Chen, Y. Mu, G. Yang, and F. Guo, Bl-mle: Block-level message-locked encryption for secure large file deduplication, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, 2015.

Q. Zheng and S. Xu, Secure and efficient proof of storage with deduplication, Proceedings of the 2nd ACM conference on Data and Application Security and Privacy , ser. CODASPY '12, 2012.

Y. Shin, J. Hur, and K. Kim, Security weakness in the proof of storage with deduplication, Cryptology ePrint Archive, 2012.

F. Armknecht, J. Bohli, D. Froelicher, and G. Karame, Sharing proofs of retrievability across tenants, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ser. ASIACCS '17, 2017.

N. Koblitz and A. Menezes, Pairing-based cryptography at high security levels, Proceedings of the 10th International Conference on Cryptography and Coding, ser. IMA'05, 2005.

S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Appl. Math, vol.156, issue.16, 2008.

L. González-manzano and A. Orfila, An efficient confidentiality-preserving Proof of Ownership for deduplication, Journal of Network and Computer Applications, vol.50, pp.49-59, 2015.

C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder et al., Erasure coding in windows azure storage, Proceedings of the 2012 USENIX Conference on Annual Technical Conference, ser. USENIX ATC'12, 2012.

G. M. Kamath, N. Prakash, V. Lalitha, and P. V. Kumar, Codes with local regeneration and erasure correction, IEEE Trans. Information Theory, vol.60, issue.8, 2014.