{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:20:36Z","timestamp":1725736836662},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/bigdatacongress.2015.79","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:47:39Z","timestamp":1440107259000},"page":"499-505","source":"Crossref","is-referenced-by-count":5,"title":["Proof of Storage for Video Deduplication in the Cloud"],"prefix":"10.1109","author":[{"given":"Fatema","family":"Rashid","sequence":"first","affiliation":[]},{"given":"Ali","family":"Miri","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"ViDeDup: an application-aware framework for video de duplication","author":"katiyar","year":"2015","journal-title":"Proceedings of the 3rd USENIX Conference on Hot Topics in Storage and File Systems"},{"key":"ref11","first-page":"90","author":"shacham","year":"0","journal-title":"Compact Proofs of Retrievability Advances in Cryptology - ASIACRYPT 2008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133603"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245361"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2012.6543022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2015.15"},{"journal-title":"IBM-BigData","article-title":"What is Big Data","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc of the 14th ACM Conference on Computer and Communications Security (CCS &#x201C;07)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"PORS: proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"Proc of the 14th ACM Conference on Computer and Communications Security (CCS &#x201C;07)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1998.740527"},{"journal-title":"H 264 and MPEG-4 Video Compression Video Coding for Next-Generation Multimedia","year":"2004","author":"richardson","key":"ref7"},{"journal-title":"The StorageSavvy Blog Can you compress and dedupe? it depends","year":"2015","key":"ref2"},{"journal-title":"The Guardian","article-title":"Study: less than 1% of the world's data is analysed, over 80% is unprotected","year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISVC.2010.5656206"}],"event":{"name":"2015 IEEE International Congress on Big Data (BigData Congress)","start":{"date-parts":[[2015,6,27]]},"location":"New York City, NY, USA","end":{"date-parts":[[2015,7,2]]}},"container-title":["2015 IEEE International Congress on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7194705\/7207183\/07207263.pdf?arnumber=7207263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:01:37Z","timestamp":1498240897000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7207263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/bigdatacongress.2015.79","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}