Research Article

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments

Algorithm 2

FindDuplicate.
Input: p, δi
Output: DuplicateFound, k
(1)Get the root node N0 of a D-tree ∆
(2)DuplicateFound ⟵ False
(3)k ⟵ 0
(4)whileNk ! = ⊥ do
(5) Get deduplication information δk assigned to Nk.
(6)if Test (δi, δk) = True then
(7)  DuplicateFound ⟵ True
(8)  break
(9)else
(10)  ifp[k] = = 0 then
(11)   Nc ⟵ GetChildNode(Nk, Left)
(12)  else
(13)   Nc ⟵ GetChildNode(Nk, Right)
(14)  end if
(15)  k ⟵ k + 1
(16)  Nk ⟵ Nc
(17)end if
(18)end while
(19)return (DuplicateFound, k)