[1] Resch J K, Plank J S. AONT-RS: Blending Security and Performance in Dispersed Storage Systems[C]//Proc. of the 9th USENIX Conference on File and Storage Technologies. Berkeley, USA: USENIX Association, 2011. [2] Storer M, Greenan K, Miller E, et al. POTSHARDS——A Secure, Recoverable, Long-term Archival Storage System[J]. ACM Transactions on Storage, 2009, 5(2): 1-35. [3] Wang Qian, Ren Kui, Lou Wenjing, et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance[J]. ACM Transactions on Sensor Networks, 2011, 8(1): 954-962. [4] Wang Cong, Wang Qian, Ren Kui, et al. Towards Secure and Dependable Storage Services in Cloud Computing[J]. IEEE Transactions on Service Computing, 2012, 5(2): 220-230. [5] Juels A, Kaliski B. Pors: Proofs of Retrievability for Large Files[C]//Proc. of the 14th ACM Conference on Computer and Communications Security. Alexandria, USA: ACM Press, 2007: 584-597. [6] Erway C, Kupcu A, Papamanthou C, et al. Dynamic Provable Data Possession[C]//Proc. of the 16th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2009: 213-222. [7] Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//Proc. of the 29th Conference on Information Communications. Piscataway, USA: IEEE Press, 2010. [8] Ghemawat S, Gobioff H, Leung S, et al. The Google File System[C]//Proc. of the 19th ACM Symposium on Operating Systems Principles. New York, USA: ACM Press, 2003: 29-43. [9] Parakh A, Kak S. Space Efficient Secret Sharing for Implicit Data Security[J]. Information Sciences, 2011, 181(2): 335-341. [10] 唐春明. 防泄露的秘密共享方案及其在群身份认证协议中的应用[J]. 中国科学: 信息科学, 2012, 42(5): 634-647. 编辑 陆燕菲
|