[1] |
冯登国,张敏,张妍等.云计算安全研究[J].软件学报,2011,22(1):71-83.
|
[2] |
Ateniese G., Burns R, Curtmola R, et al.Provable data possession at untrusted stores[C] // Proc.of CCS’07, 2007:598-609.
|
[3] |
Wang Q, Wang C, Li J, et al. Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing[C]// Proc. European Symposium on Research in Computer Security. 355-370. Springer-Verlag (2009).
|
[4] |
Wang Q, Wang C, Ren K, et al.Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(5): 847-859.
|
[5] |
Erway C, Kupcu A, Papamanthou C, et al.Dynamic Provable Data Possession[C] // Proc.ACM CCS, 2009: 213-222.
|
[6] |
毛剑,李坤,徐先栋.云计算环境下隐私保护方案[J].清华大学学报:自然科学版,2011(10):1357-1362.
|
[7] |
Wang C, Wang Q, Ren K,et al.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing[C]// Proc. IEEE INFOCOM. 2010: 525-533.
|
[8] |
Wang B, Li B, Li H. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud[EB/OL]. .
|
[9] |
Wang B, Li B, Li H. Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud[EB/OL]. .
|
[10] |
Wang C, Wang Q, Ren K,et al.Privacy-preserving public auditing for storage security in cloud computing[C] //Proc.of IEEE INFOCOM’10,March 2010.
|
[11] |
Boneh D, Lynn B, Shacham H.Short Signature from the Weil Pairing[C]// Proc. ASIACRYPT. Springer-Verlag, 2001: 514-532.
|
[12] |
Boneh D, Gentry C, Lynn B, et al.Aggregate and V erifiably Encrypted Signatures from Bilinear Maps[C]//Proc. EUROCRYPT. pp. 416-432. SpringerVerlag (2003).
|
[13] |
Boneh D, Boyen X, Shacham H.Short Group Signatures[C]// Proc. CRYPTO. Springer-Verlag, 2004:41-45.
|
[14] |
Chaum D, van Heyst E. Group Signatures[C]//Proc. EUROCR YPT. Springer-Verlag, 1991: 257-263.
|
[15] |
Hao Z, Zhong S, Yu N.A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability[J]. IEEE Transactions on Knowledge and Data Engineering , 2011,23(9): 1432-1437.
|
[16] |
Agrawal S, Boneh D.Homomorphic MACs: MAC-based Integrity for Network Coding[C]// Proc. ACNS. Springer-Verlag, 2009:292-305.
|
[17] |
Jia Xu, Ee-Chien Chang.Towards Efficient Pro ofs of Retrievability[C] // AsiaCCS'12: ACM Symp osium on Information,Computer and Communications Security, 2012.
|