[1] |
LI Yannan, YU Yong, MIN Geyong, et al.Fuzzy Identity-based Data Integrity Auditing for Reliable Cloud Storage Systems[J]. IEEE Transactions on Dependable & Secure Computing, 2017(2):1.
|
[2] |
GREEN M.The Threat in the Cloud[J]. IEEE Security and Privacy, 2013,11(1) :86-89.
|
[3] |
JIANG Qi, KHAN M K, LU Xiang, et al.A Privacy Preserving Three-factor Authentication Protocol for e-Health Clouds[J]. Journal of Supercomputing, 2016, 72(10):3826-3849.
|
[4] |
SHACHAM H, WATERS B.Compact Proofs of Retrievability[J]. Journal of Cryptology , 2013,26(3):442-483.
|
[5] |
YU Jia, REN Kui, WANG Cong, et al.Enabling Cloud Storage Auditing With Key-exposure Resistance[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(6):1167-1179.
|
[6] |
YU Jia, REN Kui, WANG Cong.Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates[J]. IEEE Transactions on Information Forensics & Security, 2016, 11(6):1362-1375.
|
[7] |
YANG Guangyang, YU Jia, SHEN Wenting, et al.Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability[J]. Journal of Systems & Software,2016, 113(C):130-139.
|
[8] |
SHEN Wenting, YU Jia, XIA Hui, et al.Light-weight and Privacy-preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium[J]. Journal of Network & Computer Applications, 2017, 82:56-64.
|
[9] |
QIN Zhiguang, WU Shikun, XIONG Hu.A Review on Data Integrity Auditing Protocols for Data Storage in Cloud Computing[J].Netinfo Security,2014,14(7):1-6.
|
|
秦志光,吴世坤,熊虎. 云存储服务中数据完整性审计方案综述[J]. 信息网络安全, 2014,14(7): 1-6.
|
[10] |
WANG Cong, CHOW S S M, WANG Qian, et al. Privacy-preserving Public Auditing for Secure Cloud Storage[J]. IEEE Transactions on Computers, 2013, 62(2):362-375.
|
[11] |
WANG Cong, WANG Qian, REN Kui, et al.Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//IEEE. 2010 Proceedings IEEE INFOCOM, March 14-19, San Diego, CA, USA.NJ:IEEE, 2010:525-533.
|
[12] |
YU Jia, WANG Huaqun.Strong Key-exposure Resilient Auditing for Secure Cloud Storage[J]. IEEE Transactions on Information Forensics & Security, 2017, 12(8):1931-1940.
|
[13] |
YUAN Jiawei,YU Shucheng.Efficient Public Integrity Checking for Cloud Data Sharing with Multi-user Modification[C]// IEEE. 2014 IEEE Conference on Computer Communications, April 27-May 2, 2014, Toronto, ON, Canada.NJ:IEEE, 2013:2121-2129.
|
[14] |
ZHAO Yang, REN Huaqiang, XIONG Hu, et al.A Dynamic Cloud Data Audit Scheme Based on Update Tree[J].Netinfo Security,2015,15(12):1-7.
|
|
赵洋,任化强,熊虎,等. 基于更新树的动态云数据审计方案[J]. 信息网络安全, 2015,15(12): 1-7.
|
[15] |
YUAN Jiawei, YU Shucheng.Secure and Constant Cost Public Cloud Storage Auditing with Deduplication[C]// IEEE. 2013 IEEE Conference on Communications and Network Security (CNS), October 14-16,2013, National Harbor, MD, USA.NJ: IEEE, 2013:145-153.
|
[16] |
LI Jingwei, LI Jin, XIE Dongqing, et al.Secure Auditing and Deduplicating Data in Cloud[J] . IEEE Transactions on Computers, 2016, 65(8):2386-2396.
|
[17] |
HOU Huiying, YU Jia, HAO Rong.Research on an Integrity Auditing Scheme Based on Algebraic Signature in Cloud Storage[J].Netinfo Security,2017,17(10):69-74.
|
|
侯慧莹, 于佳, 郝蓉. 一种基于代数签名的云存储完整性审计方案研究[J]. 信息网络安全, 2017,17(10):69-74.
|
[18] |
WANG Cong, WANG Qian, REN Kui, et al.Toward Secure and Dependable Storage Services in Cloud Computing[J]. IEEE Transactions on Services Computing, 2012,5(2):220-232.
|
[19] |
SHEN Jian, LIU Dengzhi, SHEN Jun, et al.A Secure Cloud-assisted Urban Data Sharing Framework for Ubiquitous-cities[J] . Pervasive & Mobile Computing, 2017, 41:219-230.
|
[20] |
LITWIN W, SCHWARZ T.Algebraic Signatures for Scalable Distributed Data Structures[C]// IEEE. The 20th International Conference on Data Engineering, April 2, 2004 , Boston, MA, USA. NJ:IEEE, 2004:412-423.
|