[1] |
GANTZ J,REINSEL D. The Digital Universe in 2020: Big Data,Bigger Digital Shadows,Biggest Growth in the Far East[EB/OL]..
|
[2] |
HALEVI S,HARNIK D,PINKAS B,et al.Proofs of Ownership in Remote Storage Systems[C]// ACM. 18th ACM conference on Computer and communications security,October 17-21,2011,Chicago,Illinois,USA. New YorK: ACM,2011: 491-500.
|
[3] |
DI P R,SORNIOTTI A.Boosting Efficiency and Security in Proof of Ownership for Deduplication[C]// ACM. 7th ACM Symposium on Information,Computer and Communications Security,May 2-4,2012, Seoul,Korea. New York: ACM,2012: 81-82.
|
[4] |
ZHENG Q,XU S.Secure and Efficient Proof of Storage with Deduplication[C]// ACM. 2nd ACM conference on Data and Application Security and Privacy,February 7-9,2012, San Antonio,Texas,USA.New York:ACM,2012: 1-12.
|
[5] |
DU R,DENG L,CHEN J,et al.Proofs of Ownership and Retrievability in Cloud Storage[C]// IEEE. 2014 IEEE 13th International Conference on Trust,Security and Privacy in Computing and Communications,September 24-26, 2014,Beijing,China. New York:IEEE,2014: 328-335.
|
[6] |
DOUCEUR J R,ADYA A, BOLOSKY W J,et al.Reclaiming Space from Duplicate files in a Serverless Distributed File System[C]// IEEE. 22nd International Conference on Distributed Computing Systems,July 2-5,2002,Vienna,Austria. New York:IEEE,2002: 617-624.
|
[7] |
GONZALEZ M L,ORFILA A. An Efficient Confidentiality-preserving Proof of Ownership for Deduplication. Journal of Network and Computer Applications[J]. Journal of Network and Computer Applications,2015(50): 49-59.
|
[8] |
LI J,CHEN X,LI M,et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J]. IEEE Transactions on Parallel and Distributed Systems,2014,25(6): 1615-1625.
|
[9] |
BLASCO J,DI P R,ORFILA A,et al.A Tunable Proof of Ownership Scheme for Deduplication Using Bloom Filters[C]// IEEE. 2014 IEEE Conference on Communications and Network Security (CNS). October 29-31,2014,San Francisco,CA,USA. New York:IEEE, 2014: 481-489.
|
[10] |
杨超,张俊伟,董学文,等. 云存储加密数据去重删除所有权证明方法[J]. 计算机研究与发展,2015,52(1): 248-258.
|
[11] |
付安民,秦宁元,宋建业,等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案[J]. 计算机研究与发展,2015,52(10): 2353-2362.
|
[12] |
荣星,江荣. 一种基于混合属性的多授权中心云访问方案[J]. 信息网络安全,2016(11):6-11.
|
[13] |
黄龙霞,张功萱,付安民. 基于层次树的动态群组隐私保护公开审计方案[J]. 计算机研究与发展,2016,53(10): 2334-2342.
|
[14] |
王连印,魏颖昊,邢双秋,等. 面向智能终端的云安全管理服务研究与应用[J]. 信息网络安全,2016(10):15-20.
|