[1] |
TAN Shuang, JIA Yan, HAN Weihong. Research and Development of Data Integrity Proof in Cloud Storage[J]. Journal of Computer Science, 2015,38(1); 164-177.
|
|
谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1):164-177.
|
[2] |
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable Data Possession at Untrusted Stores[C] //ACM. The 14th ACM Conference on Computer and Communications Security, October 28-31, 2007, Alexandria, Virginia, USA. New York: ACM, 2007: 598-609.
|
[3] |
ATENIESE G, BURNS R, CURTMOLA R, et al. Remote Data Checking Using Provable Data Possession[J]. ACM Transactions on Information and System Security (TISSEC), 2011,14(1):1-34.
|
[4] |
ERWAY C C, KUPCU A, PAPAMANTHOU C, et al. Dynamic Provable Data Possession[J]. ACM Transactions on Information and System Security (TISSEC), 2015,17(4):213-222.
|
[5] |
BARSOUM A F, HASAN M A. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems[J]. IEEE Transactions on Information Forensics and Security, 2014,10(3):485-497.
|
[6] |
SEBE F, DOMINGO-FERRER J, MARTINEZ-BALLESTE A, et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures[J]. IEEE Transactions on Knowledge and Data Engineering, 2008,20(8):1034-1038.
|
[7] |
ESINER E, KACHKEEV A, BRAUNFELD S, et al. Flexdpdp: Flexlist-based Optimized Dynamic Provable Data Possession[J]. ACM Transactions on Storage(TOS), 2016,12(4):1-44.
|
[8] |
FILHO D L G, BARRETO P S L M. Demonstrating Data Possession and Uncheatable Data Transfer[EB/OL]. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=10CE6343574E3365973B3A4313A22827?doi=10.1.1.61.8040&rep=rep1&type=pdf, 2020-01-20.
|
[9] |
HAO Zhuo, ZHONG Sheng, YU Nenghai. A Privacy-preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability[J]. IEEE Transactions on Knowledge and Data Engineering, 2011,23(9):1432-1437.
|
[10] |
SHACHAM H, WATERS B. Compact Proofs of Retrievability[EB/OL]. https://www.iacr.org/archive/asiacrypt2008/53500093/53500093.pdf, 2020-01-20.
|
[11] |
ZHU Yan, HU Hongxin, AHN G J, et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(12):2231-2244.
|
[12] |
WANG Boyang, LI Baochun, LI Hui, et al. Certificateless Public Auditing for Data Integrity in the Cloud[C] //IEEE. 2013 IEEE Conference on Communications and Network Security (CNS), October 14-16, 2013, National Harbor, MD, USA. NJ: IEEE, 2013: 136-144.
|
[13] |
WANG Huaqun. Proxy Provable Data Possession in Public Clouds[J]. IEEE Transactions on Services Computing, 2013,6(4):551-559.
|
[14] |
YANG Kan, JIA Xiaohua. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,24(9):1717-1726.
|
[15] |
ZHU Yan, AHN G J, HU Hongxin, et al. Dynamic Audit Services for Outsourced Storages in Clouds[J]. IEEE Transactions on Services Computing, 2011,6(2):227-238.
|
[16] |
WANG Huaqun. Identity-based Distributed Provable Data Possession in Multicloud Storage[J]. IEEE Transactions on Services Computing, 2014,8(2):328-340.
|