[1] |
FRANK F,MARCOS K.移动云计算:无线、移动和社交网络中分布式资源的开发利用[M]. 郎为民,译. 北京:机械工业出版社, 2015.
|
[2] |
郎为民. 大话云计算[M]. 北京: 人民邮电出版社, 2012.
|
[3] |
BOYEN X,WATERS B.Full-domain Subgroup Hiding and Constant-size Group Signatures[C]//IEEE. PKC 2007.10th International Conference on Practice and Theory in Public-Key Cryptography April 16-20,2007,Beijing,China.NJ:IEEE, 2007: 1-15.
|
[4] |
MAJI H K,PRABHAKARAN M,ROSULEK M.Attribute-ased Signatures[EB/OL]..
|
[5] |
DOIDS Y,YAMPOLSKIY A.A Verifiable Random Function with Short Proofs and Keys[C]//IEEE. PKC2005.8th International Workshop on Theory and Practice in Public Key Cryptography,January 23-26, 2005,Les Diablerets, Switzerland. NJ:IEEE, 416-431.
|
[6] |
SHACHAM H,WATEWRS . Compact Proofs of Retrievability[J].Journal of Cryptology, 2015, 28(3): 442-483.
|
[7] |
HAN J,WU S,MU Y,et al.Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption[J].IEEE Transactions on Information Forensics and Security, 2015, 10(03): 665-678.
|
[8] |
CHI P W,LEI C L.Audit-Free Cloud Storage via Deniable Attribute-based Encryption[J].IEEE Transactions on Cloud Computing, 2015, 21(7): 865-876.
|
[9] |
ZHOU Z B,HUANG D J,WANG Z .Efficient Privacy-Preserving Ciphertext-Policy Attribute-based Encryption and Broadcast Encryption[J].IEEE Transactions on Computers, 2015, 64(01): 126-138.
|
[10] |
LI C L,CHEN Y,TAN P,et al.An Efficient Provable Data Possession Scheme with Data Dynamics[C]//IEEE. CSSS.Proceedings of 2012 International Conference on Computer Science & Service System (CSSS),August 11-13,2012,Nanjing China.NJ:IEEE, 2012: 706-710.
|
[11] |
WANG J X,LI S L.Dynamic Provable Data Possession with Batch-update Verifiability[C]//IEEE. ICADE.Proceedings of 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment (ICADE).July 27-29,2012,Beijing,China.NJ:IEEE, 2012: 108-113.
|
[12] |
LIU F,GU D,LU H.An Improved Dynamic Provable Data Possession Model[C]//IEEE. CCIS.Proceedings of 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS),September 15-17,2011,Beijing,China.NJ:IEEE, 2011: 290-295.
|
[13] |
冯登国. 面向云存储的多副本文件完整性验证方案[J].计算机研究与发展,2014,51(7): 1410-1416.
|
[14] |
LIN H Y, ZENG W G.A Secure Erasure Code-based Cloud Storage System with Secure Data Forwarding[J]. IEEE Transaction on Parallel Distribution System, 2012, 23(6): 995-1003.
|
[15] |
LIN H Y, ZENG W G.A Decentralized Repair Mechanism for Decentralized Erasure Code Based Storage Systems[C]//IEEE. TrustCom'11. 10th IEEE International Conference of Trust, Security and Privacy in Computing and Communication (TrustCom'11),November 16-18 ,Changsha,China.NJ:IEEE, 2011: 613-620.
|
[16] |
JUELS A,KALISKI B S.Pors, Proofs of Retrievability for Large Files[C]//ACM. 14th ACM Conference of Computer and Communication Security (CCS'07),October 29-November 2,2007,Hilton Alexandria Mark Center,Alexandria,VA,USA.New York:ACM,2007:584-597.
|
[17] |
ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted tores[C]//ACM. 14th ACM Conference of Computer and Communication Security (CCS'07),October 29-November 2,2007,Hilton Alexandria Mark Center,Alexandria,VA,USA.New York:ACM,2007:598-609.
|
[18] |
ATENIESE G,BURNS R,CURTMOLA R,et al.Remote Data Checking Using Provable Data Possession[J]. ACM Transaction on Information System Security, 2011, 14(1):1201-1214.
|
[19] |
WANG H Q, ZHANG. On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage[J].IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 264-267.
|
[20] |
WANG H Q.Identity-based Distributed Provable Data Possession in Multicloud Storage[J].IEEE Transactions on Services Computing, 2015, 8(2): 328-340.
|
[21] |
ATENIESE G,KAMARA S,KATZ J.Proofs of Storage from Homomorphic Identification Protocols[C]//ASIACRYPT'15. 21th International Conference Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT'15),December 6-10, 2009,Tokyo, Japan.Berlin Heidelberg:Springer,2015: 319-333.
|
[22] |
CURTMOLA R,KHAN O,BURNS R.Robust Remote Data Checking[C]//ACM. 11th ACM Workshop Storage Security and Survivability (Storage SS' 15), 2015: 63-68.
|
[23] |
CHEN B, CURTMOLA R, ATENIESE G, et al. Remote data checking for network coding-based distributed storage systems [EB/OL]..
|
[24] |
ZHU Y,HU H,AHN G J,et al.Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage[J]. IEEE Transactions on Parallel Distribution System, 2015, 26(12): 2231-2244.
|
[25] |
WANG C,CHOW S M,WANG Q,et al.Privacy- Preserving Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on Computing, 2015, 64(2): 362-375.
|
[26] |
LIN H Y,ZENG W G.A Secure Decentralized Erasure Code for Distributed Networked Storage[J]. IEEE Transaction on Parallel Distribution System, 2010, 21(1): 1586-1594.
|