[1] Deswarte Y, Quisquater J J, Saidane A. Remote Integrity Checking[C]//Proc. of IFIP International Federation for Information Processing. [S. l.]: Springer, 2004. [2] Ateniese G, Burns R, Curtmola R. Provable Data Possession at Untrusted Stores[C]//Proc. of ACM-CCS’07. Alexandria, USA: [s. n.], 2007. [3] Ateniese G, Kamara S, Katz J. Proofs of Storage from Homo- morphic Identification Protocols[C]//Proc. of ASIACRYPT’09. Tokyo, Japan: [s. n.], 2009. [4] Bowers K D, Juels A, Oprea A. HAIL: A High-availability and Integrity Layer for Cloud Storage[C]//Proc. of ACM-CCS’09. Chicago, USA: [s. n.], 2009. [5] Wang Boyang, Li Baochun, Li Hui. Oruta: Privacy-preserving Public Auditing for Shared Data in the Cloud[C]//Proc. of the 5th IEEE International Conference on Cloud Computing. [S. l.]: IEEE Press, 2012. [6] Erway C, Kupcu A, Papamanthou C, et al. Dynamic Provable Data Possession[C]//Proc. of ACM-CCS’09. Chicago, USA: [s. n.], 2009. [7] 陈兰香. 一种基于同态Hash的数据持有性证明方法[J]. 电子与信息学报, 2011, 33(9): 2201-2204. (下转第218页)[8] Wang Qian, Wang Cong, Li Jin, et al. Enabling Public Verifi- ability and Data Dynamics for Storage Security in Cloud Com- puting[C]//Proc. of the 14th European Conference on Research in Computer Security. Berlin, Germany: Springer-Verlag, 2009. [9] Wang Chong, Wang Qian, Ren Kui. Ensuring Data Storage Security in Cloud Computing[C]//Proc. of IWQoS’09. Charleston, USA: [s. n.], 2009. [10] Boneh D, Lynn B, Shacham H. Short Signatures from the Weil Pairing[J]. Journal of Cryptology, 2004, 17(4): 297-319. [11] Wang Qian, Ren Kui, Lou Wenjing, et al. Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//Proc. of INFOCOM’10. San Diego, USA: [S. l.]: IEEE Press, 2010. [12] Krohn M N, Freedman M J, Mazieres D. On-the-fly Verifi- cation of Rateless Erasure Codes for Efficient Content Distri- bution[C]//Proc. of IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 2004. 编辑 刘 冰 |