[1] |
ARMBRUST M, FOX A, GRIFFITH R, et al.Above the Clouds: A Berkeley View of Cloud Computing[R]. USA: Electrical Engineering and Computer Sciences, University of California at Berkeley, TR UCB/EECS-2009-28, 2009.
|
[2] |
WANG Yujue, WU Qianhong.A Survey on Cryptographic Technologies for Data Integrity Checking in Clouds[J]. Journal of Cyber Security, 2017, 2(3): 23-35.
|
|
王玉珏,伍前红. 云存储完整性验证密码学技术研究进展[J]. 信息安全学报,2017,2(3):23-35.
|
[3] |
YU Nenghai, HAO Zhuo, XU Jiajia, et al.Review of Cloud Computing Security[J]. Acta Electronica Sinica, 2013, 41(2): 371-381.
|
|
俞能海,郝卓,徐甲甲,等. 云安全研究进展综述[J]. 电子学报,2013,41(2):371-381.
|
[4] |
ATENIESE G, BURNS R, CURTMOLA R, et al.Provable Data Possession at Untrusted Stores[C]//ACM. 14th ACM Conference on Computer and Communications Security, October 28-31, 2007, Alexandria, Virginia, USA. New York: ACM, 2007: 598-609.
|
[5] |
JUELS A, KALISKI JR B S. PORs: Proofs of Retrievability for Large Files[C]//ACM. 14th ACM Conference on Computer and Communications Security, October 28-31, 2007, Alexandria, Virginia, USA. New York: ACM, 2007: 584-597.
|
[6] |
SHACHAM H, WATERS B.Compact Proofs of Retrievability[J]. Journal of Cryptology, 2013, 26(3): 442-483.
|
[7] |
WANG Qian, WANG Cong, REN Kui, et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847-859.
|
[8] |
WANG Cong, Chow S S M, Wang Qian, et al. Privacy-preserving Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on Computers, 2013, 62(2): 362-275.
|
[9] |
ZHAO Yang, REN Huaqiang, XIONG Hu, et al.Cloud Data Integrity Verification Scheme without Bilinear Pairing[J]. Netinfo Security, 2015, 15(7): 7-12.
|
|
赵洋,任化强,熊虎,等. 无双线性对的云数据完整性验证方案[J]. 信息网络安全,2015,15(7):7-12.
|
[10] |
ZHANG Jianhong, LI Pengyan.An Efficient Data Integrity Verification Scheme for Cloud Storage[J]. Netinfo Security, 2017, 17(3): 1-5.
|
|
张键红,李鹏燕. 一种有效的云存储数据完整性验证方案[J]. 信息网络安全,2017,17(3):1-5.
|
[11] |
WANG Yujue, WU Qianhong, QIN Bo, et al.Identity-based Data Outsourcing with Comprehensive Auditing in Clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 940-952.
|
[12] |
WANG Huaqun, HE Debiao, TANG Shaohua.Identity-based Proxy-oriented Data Uploading and Remote Data Integrity Checking in Public Cloud[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1165-1176.
|
[13] |
WANG Boyang, CHOW S S M, Li Ming, et al. Storing Shared Data on the Cloud via Security-mediator[C]//IEEE. 33rd International Conference on Distributed Computing Systems, July 8-11, 2013, Philadelphia, Pennsylvania, USA. New Jersey: IEEE, 2013: 124-133.
|
[14] |
WANG Yujue, WU Qianhong, QIN Bo, et al.Ownership-hidden Group-oriented Proofs of Storage from Pre-homomorphic Signatures[J]. Peer-to-Peer Networking and Applications, 2018, 11(2): 235-251.
|
[15] |
WANG Yujue, WU Qianhong, QIN Bo, et al.Online/Offline Provable Data Possession[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(5): 1182-1194.
|
[16] |
WANG Yujue, WU Qianhong, WONG D S, et al.Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage[C]//Springer. 19th European Symposium on Research in Computer Security, September 7-11, 2014, Wroclaw, Poland. Heidelberg: Springer, 2014: 326-343.
|
[17] |
YU Yong, AU M H A, MU Yi, et al. Enhanced Privacy of a Remote Data Integrity-checking Protocol for Secure Cloud Storage[J]. International Journal of Information Security, 2015, 14(4): 307-318.
|
[18] |
YU Yong, AU M H A, ATENIESE G, et al. Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 767-778.
|
[19] |
CUI Hui, MU Yi, Au M H.Proof of Retrievability with Public Verifiability Resilient Against Related-key Attacks[J]. IET Information Security, 2015, 9(1): 43-49.
|
[20] |
WANG Huaqun.Proxy Provable Data Possession in Public Clouds[J]. IEEE Transactions on Services Computing, 2013, 6(4): 551-559.
|
[21] |
LU Xiuqing, XIAN Hequn.A Big Data Integrity Auditing Scheme Based on User Authorization in Cloud Storage[J]. Netinfo Security, 2018, 18(4): 32-37.
|
|
鲁秀青,咸鹤群. 云存储中基于用户授权的大数据完整性审计方案[J]. 信息网络安全,2018,18(4):32-37.
|
[22] |
REN Yongjun, XU Jiang, WANG Jin, et al.Designated-verifier Provable Data Possession in Public Cloud Storage[J]. International Journal of Security and Its Applications, 2013, 7(6): 11-20.
|