[1] |
ZHOU Guoan, LI Qiang, CHEN Xin, et al.Summary of Research on Mass Small File Storage Technology in Cloud Environment[J].Netinfo Security, 2014,14(6):11-17.
|
|
周国安,李强,陈新,等.云环境下海量小文件存储技术研究综述[J].信息网络安全,2014,14(6):11-17.
|
[2] |
WANG Yuding, YANG Jiahai, XU Cong, et al.Survey on Access Control Technologies for Cloud Computing[J].Journal of Software, 2015,26(5): 1129-1150.
|
|
王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150.
|
[3] |
LEI Lei, CAI Quanwei, JING Jiwu, et al.Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding[J]. Journal of Software, 2016, 27(6):1432-1450.
|
|
雷蕾,蔡权伟,荆继武,等.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450.
|
[4] |
WANG Longjiang, CHEN Yue, YAN Xincheng, et al.Differential Data Updating Scheme for Network Coding Cloud Storage System[J].Journal of Communications, 2017, 38(3): 154-164.
|
|
王龙江,陈越,严新成,等.网络编码云存储系统差分数据更新方案[J].通信学报,2017,38(3):154-164.
|
[5] |
GLAUBER Gonçalves, IDILIO Drago, ANA Paula Couto da Silva, et al. The Impact of Content Sharing on Cloud Storage Bandwidth Consumption[J]. IEEE Internet Computing, 2016, 20(4): 26-35.
|
[6] |
HE Fei, WANG Lei, JING Jiwu,et al.Design and Implementation of Cloud Storage Security Enhancement System[J]. Netinfo Security, 2012(3):38-41.
|
|
郝斐,王雷,荆继武,等.云存储安全增强系统的设计与实现[J].信息网络安全,2012(3):38-41.
|
[7] |
CUI Yong, LAI Zeqi, DAI Ningwei.A First Look At Mobile Cloud Storage Services: Architecture, Experimentation, and Challenges[J]. IEEE Network, 2016, 30(4): 16-21.
|
[8] |
LI Jianjiang, WU Jie, MA Zhanning.Frequency and Similarity-Aware Partitioning for Cloud Storage Based on Space-Time Utility Maximization Model[J]. Tsinghua Science and Technology, 2015, 20(3): 233-245.
|
[9] |
YU Chiamu, CHEN Chiyuan, CHAO Hanchieh.Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency[J]. IEEE Network, 2015, 29(2): 51-55.
|
[10] |
CHU Chengkang, ZHU Wentao, HAN Jin, et al.Security Concerns in Popular Cloud Storage Services[J]. IEEE Pervasive Computing, 2013, 12(4): 50-57.
|
[11] |
LI Ming, YU Shucheng, REN Kui, et al.Toward Privacy-assured and Searchable Cloud Data Storage Services[J]. IEEE Network, 2013, 27(4): 56-62.
|
[12] |
PITCHAI R, JAYASHRI S, RAJA J.Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing[J]. Wireless Personal Communications, 2016, 90(2): 947-960.
|
[13] |
HE Kai, HUANG Chuanhe, ZHOU Hao, et al.Public Auditing for Encrypted Data with Client-side Deduplication in Cloud Storage[J]. Wuhan University Journal of Natural Sciences, 2015, 20(4): 291-298.
|
[14] |
LI Chunta, LEE Chinwen, SHEN Jauji.An Extended Chaotic Maps-based Keyword Search Scheme Over Encrypted Data Resist Outside and Inside Keyword Guessing Attacks in Cloud Storage Services[J]. Nonlinear Dynamics, 2015, 80(3): 1601-1611.
|
[15] |
QIN Zhiguang, WU Shikun,Xiong Hu.Review of Data Integrity Audit Scheme in Cloud Storage Service[J]. Netinfo Security,2014,14(7):1-6.
|
|
秦志光,吴世坤,熊虎.云存储服务中数据完整性审计方案综述[J].信息网络安全,2014,14(7):1-6.
|
[16] |
CENGIZ Karakoyunlu, JOHN A Chandy.Exploiting User Metadata for Energy-aware Node Allocation in A Cloud Storage System[J]. Journal of Computer and System Sciences, 2016, 82(2): 282-309.
|