[1]SOOKHAK M,GANI A,KHAN M K,et al.Dynamic remote data auditing for securing big data storage in cloud computing[J].Information Sciences,2017,380:101-116.br/
[2]KUMARI M P,PAUL R K.A study for authentication and integrity of data files in cloud computing[J].International Journal of Science and Research,2017,2(9):1-8.br/
[3]ATENIESE G,BURNS R,CURTMOLA R.Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:598-609.br/
[4]ERWAY C,KUPCCU A,PAPAMATHOU C,et al.Dynamic provable data possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:213-222.br/
[5]WANG Qian,WANG Cong,LI Jin,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]//Proceedings of European Symposium on Research in Computer Security.Berlin,Germany:Springer,2009:355-370.br/
[6]李勇,姚戈,雷丽楠,等.基于多分支路径树的云存储数据完整性验证机制[J].清华大学学报(自然科学版),2016,56(5):504-510.br/
[7]WANG Cong,WANG Qian,REN Kui,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]//Proceedings of the 29th Conference on Information Communications.Berlin,Germany:Springer,2010:525-533.br/
[8]WANG Cong,CHOW S S M,WANG Qian,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375.br/
[9]WANG Cong,WANG Qian,REN Kui,et al.Toward secure and dependable storage services in cloud computing[J].IEEE Transactions on Services Computing,2013,5(2):220-232.br/
[10]ZHU Yan,AHN G J,HU Hongxin,et al.Dynamic audit services for outsourced storages in clouds[J].IEEE Transactions on Services Computing,2013,6(2):227-238.br/
[11]WANG Boyang,LI Baochun,LI Hui.Knox:privacy-preserving auditing for shared data with large groups in the cloud[C]//Proceedings of the 10th International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer,2012:507-525.br/
[12]WANG Boyang,LI Baochun,LI Hui.Panda:public auditing for shared data with efficient user revocation in the cloud[J].IEEE Transactions on Services Computing,2015,8(1):92-106.br/
[13]YU Y,NI J,AU M H,et al.Comments on a public auditing mechanism for shared cloud data service[J].IEEE Transactions on Services Computing,2015,8(6):998-999.br/
[14]张新鹏,许春香,张新颜,等.基于代理重签名的支持用户可撤销的云存储数据公共审计方案[J].计算机应用,2016,36(7):1816-1821.br/
[15]ATENIESE G,HOHENBERGER S.Proxy re-signatures:new definitions,algorithms,and applications[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2005:310-319.br/ |