[1] |
FAN Yundong, WU Xiaoping, SHI Xiong.Research on Access Control Model Based on the Trust Value Assessment of Cloud Computing[J]. Netinfo Security, 2016, 16(7):71-77.
|
|
范运东,吴晓平,石雄. 基于信任值评估的云计算访问控制模型研究[J]. 信息网络安全,2016,16(7):71-77.
|
[2] |
FIVEASH K. AWS outage knocks Amazon, Netflix,Tinder and IMDb in MEGA data collapse[EB/OL].,2015-9-20.
|
[3] |
ZHANG Jinliang. Microsoft Azure Has Suffered a Massive Failure: It Has Now Been Restored[EB/OL]..
|
|
张金梁.微软Azure遭遇大面积故障:目前已恢复[EB/OL]..
|
[4] |
SOHU.AWS S3 Cloud Services Disappear Inexplicably: Major Websites and Docker Have Been Tricked[EB/OL]. , 2017-3-1.
|
|
搜狐. AWS S3 云服务莫名消失:各大网站和Docker纷纷中招[EB/OL]. .
|
[5] |
GHEMAWAT S, GOBIOFF H, LEUNG S T.The Google File System[J]. Acm Sigops Operating Systems Review, 2003, 37(5): 29-43.
|
[6] |
SHVACHKO K, KUANG H, RADIA S, et al.The Hadoop Distributed File System[C]//IEEE. 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), May 3-7,2010, Incline Village, NV, USA. NJ: IEEE, 2010: 1-10.
|
[7] |
WANG Yujue, WU Qianhong.A Survey on Cryptographic Technologies for Data Integrity Checking in Clouds[J]. Cyber Security, 2017, 2(3): 23-35.
|
|
王玉珏, 伍前红. 云存储完整性验证密码学技术研究进展[J]. 信息安全学报, 2017, 2(3): 23-35.
|
[8] |
WANG Qian, WANG Cong, LI Jin, et al.Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]//ESORICS. The 14th European Conference on Research in Computer Security, September 21 - 23, 2009, Saint-Malo, France. Heidelberg: Springer-Verlag Berlin, 2009:355-370.
|
[9] |
WANG Qian, WANG Cong, REN Kui, et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel & Distributed Systems, 2011, 22(5):847-859.
|
[10] |
YANG Kan, JIA Xiaohua.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing[J]. IEEE Transactions on Parallel & Distributed Systems, 2013, 24(9):1717-1726.
|
[11] |
NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[EB/OL]. , 2008-10-12.
|
[12] |
XIE Hui, WANG Jian.Study on Block Chain Technology and Its Applications[J]. Netinfo Security, 2016,16(9):192-195.
|
|
谢辉,王健. 区块链技术及其应用研究[J]. 信息网络安全,2016,16(9):192-195.
|
[13] |
SZABO N.Formalizing and Securing Relationships on Public Networks[EB/OL]. .
|
[14] |
JOSEPH P, THADDEUS D. The Bitcoin Lightning Network: Scalable Off-chain Instant Payments[EB/OL].,2015-9-15.
|
[15] |
WILKINSON S, BOSHEVSKI T. BRANDOF J, et al. Storj: A Peer-to-Peer Cloud Storage Network[EB/OL].,2017-11-12.
|
[16] |
VORICK D, CHAMPINE L. Sia: Simple Decentralized Storage[EB/OL].,2018-1-13.
|
[17] |
Protocol Labs. Technical Report: Filecoin: A Decentralized Storage Network [EB/OL]./,2018-2-20.
|
[18] |
BENET J.IPFS - Content Addressed,Versioned,P2P File System[EB/OL]..
|
[19] |
ZHU Yan, WANG Huaixi, HU Zexing, et al.Zero-knowledge Proofs of Retrievability[J]. Science China(Information Sciences), 2011, 54(8):1608-1617.
|
[20] |
Protocol Labs.Technical Report: Proof-of-Replication.[EB/OL]..
|
[21] |
BEN-SASSON E, CHIESA A, GENKIN D, et al.Snarks for C: Verifying Program Executions Succinctly and in Zero Knowledge[M]//Springer. Advances in Cryptology-CRYPTO 2013.Heidelberg :Springer Berlin Heidelberg,2013:90-108.
|
[22] |
BUTERIN V. Ethereum[EB/OL]. , 2017-9-5.
|
[23] |
Codius.Codius[EB/OL].,2018-4-6.
|
[24] |
Hyperledger.Hyperledger[EB/OL].,2018-4-6.
|