参考文献
[1]彭小圣,邓迪元,程时杰,等.面向智能电网应用的电力大数据关键技术[J].中国电机工程学报,2015,35(3):503-511.
[2]吴凯峰,刘万涛,李彦虎,等.基于云计算的电力大数据分析技术与应用[J].中国电力,2015,48(2):111-116.
[3]杨旭昕,刘俊勇.电力系统云计算初探[J].四川电力技术,2010,33(3):71-76.
[4]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[5]刘雪艳,张强,李战明,等.智能电网信息安全研究综述[J].电力信息与通信技术,2014,12(4):56-60.
[6]Anthony R,Randy L.Security Technology for Smart Grid Networks[J].IEEE Transactions on Smart Grid,2010,1(1):99-107.
[7]Hu Bin,Hamid G.Smart Grid Mesh Network Security Using Dynamic Key Distribution with Merkle Tree 4-Way Handshaking[J].IEEE Transactions on Smart Grid,2014,5(2):550-558.
[8]谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.
[9]Ateniese G,Pietro R,Mancini L,et al.Scalable and Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York,USA:ACM Press,2008:1-10.
[10]Shacham H,Waters B.Compact Proofs of Retrievability[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Germany:Springer,2008:90-107.
[11]胡德敏,余星.一种基于同态标签的动态数据完整性验证方法[J].计算机应用研究,2014,31(5):1362-1365.
[12]刘刚.分布式存储网络中的数据完整性校验与恢复[D].上海:上海交通大学,2012.
[13]张强,刘雪艳,王维洲,等.基于CP-ABE的智能电网访问控制研究[J].计算机工程,2014,40(12):83-88.
[14]吴烈,杨云.一种面向电力云的细粒度数据完整性检验方法[J].重庆邮电大学学报(自然科学版),2012,24(6):703-707.
[15]Boneh D,Lynn B,Shacham H,et al.Short Signatures from the Weil Pairing[C]//Proceedings of Cryptology-ASIACRYPT’01.Berlin,Germany:Springer-Verlag,2001:514-532.
[16]江荣.智能电网安全与隐私保护相关问题研究[D].长沙:国防科学技术大学,2014.
[17]Jiang Rong,Lu Rongxing,Choo K K R.Achieving High Performance and Privacy-preserving Query over Encrypted Multidimensional Big Metering Data[EB/OL].(2016-05-12).https://doi.org/10.1016/j.future.2016.05.005.
[18]宋亚奇,周国亮,朱永利.智能电网大数据处理技术现状与挑战[J].电网技术,2013,37(4):927-935.
[19]Wang Qian,Wang Cong,Ren Kui,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859.
[20]Haeryong P,Cao Zhengjun,Liu Lihua,et al.Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC’05[C]//Proceedings of International Conference on Information Security & Cryptology.Berlin,Germany:Springer-Verlag,2006:1-12.
[21]Zhang Fanguo,Safavi-Naini R,Susilo W.An Efficient Signature Scheme from Bilinear Pairings and Its Applications[C]//Proceedings of PKC’04.Berlin,Germany:Springer-Verlag,2004:277-290.
[22]Wen Mi,Lu Rongxing,Lei Jingsheng,et al.SESA:An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing[J].Security and Communication Networks,2014,7(1):234-244.
[23]Wang Cong,Wang Qian,Ren Kui,et al.Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//Proceedings of IEEE INFOCOM’10.Washington D.C.,USA:IEEE Press,2010:525-533.
[24]吴羽,寿黎但,陈刚,等.CB-LSH基于压缩位图的高性能LSH索引算法[J].浙江大学学报(工学版),2012,46(3):377-385.
[25]Jeffrey D.Finding Similar Items Shingling Minhashing Locality-sensitive Hashing[EB/OL].(2013-01-15).http://i.stanford.edu/~ullman/cs246slides/LSH-1.pdf.
编辑金胡考 |