[1] |
ATENIESE G, BURNS R, CURTMOLA R, et al.Provable Data Possession at Untrusted Stores[C]// ACM. Proceedings of the 14th ACM Conference on Computer and Communication Security, October 29-November 2, 2007, Alexandria, Virginia, USA. New York: ACM, 2007: 598-609.
|
[2] |
ATENIESE G, DIPIETRO R, MANCINI L V, et al.Scalable and Efficient Provable Data Possession[C]//ACM. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, September 22-25, 2008, Istanbul, Turkey. New York: ACM, 2008: 114-123.
|
[3] |
ERWAY C C, KUPCU A, PAPAMANTHOU C, et al.Dynamic Provable Data Possession[J]. ACM Transactions on Information and System Security, 2009, 17(15): 213-222.
|
[4] |
SHACHAM H, WATERS B.Compact Proofs of Retrievability[J]. Journal of Cryptology, 2013, 26(3): 442-483.
|
[5] |
DOMINGO F J, QIN Bo, WU Qianghong, et al.Identity-Based Remote Data Possession Checking in Public Clouds[J]. IET Information Security, 2014, 8(2): 114-121.
|
[6] |
WANG Huaqun.Identity-Based Distributed Provable Data Possession in Multi-cloud Storage[J]. IEEE Transactions on Services Computing, 2015, 8(2): 328-340.
|
[7] |
YU Yong, XUE Liang, AU M H, et al.Cloud Data Integrity Checking with an Identity-Based Auditing Mechanism from RSA[J]. Future Generation Computer Systems, 2016, 62(C): 85-91.
|
[8] |
YU Yong, AU M H, ATENIESE G, et al.Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 767-778.
|
[9] |
AL-RIYAMI S S, PATERSON K G. Certificateless Public Key Cryptography[C]// Springer. International Conference on the Theory and Application of Cryptology and Information Security, November 30-December 4, 2003. Taipei, China. Heidelberg: Springer, 2003: 452-473.
|
[10] |
WANG Boyang, LI Bochun, LI Hui, et al.Certificateless Public Auditing for Data Integrity in the Cloud[C]// IEEE. Conference on Communications and Network Security, October 14-16, 2013, National Harbor, MD, USA. New Nork: IEEE, 2013: 136-144.
|
[11] |
HE Debiao, ZEADALLY S, WU Libing.Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks[J]. IEEE Systems Journal, 2018, 12(1): 64-73.
|
[12] |
HE Debiao, NEERAJ K, SHERALI Z, et al.Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems[J]. IEEE Transactions on Industrial Informatics, 2018, 14(3): 1232-1241
|
[13] |
HE Debiao, KUMAR N, WANG Huaqun, et al.Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud[J]. Applied Mathematics and Computation, 2017, 314(1): 31-43.
|
[14] |
YANG Anjia, XU Jia, WENG Jian, et al.Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Dynamics in Cloud Storage[J]. IEEE Transactions on Cloud Computing. 2018: 1-14
|
[15] |
SHEN Wenting, YU Jia, XIA Hui, et al.Light-Weight and Privacy-Preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium[J]. Journal of Network and Computer Applications, 2017, 82(3): 56-64.
|
[16] |
ZHANG Yue, YU Jia, HAO Rong, et al.Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(x): 1-13.
|