参考文献
[1]REN K,WANG C,WANG Q.Security Challenges for the Public Cloud[J].IEEE Internet Computing,2012,16(1):69-73.
[2]沈文婷,于佳,杨光洋,等.具有私钥可恢复能力的云存储完整性检测方案[J].软件学报,2016,27(6):1452-1462.
[3]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:598-609.
[4]JUELS A,KALISKI B S.RORs:Proofs of Retrievability for Large Files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:584-597.
[5]SHACHAM H,WATERS B.Compact Proofs of Retrievability[C]//Proceedings of ASIACRYPT’08.Berlin,Germany:Springer-Verlag,2008:90-107.
[6]BOWERS K D,JUELS A,OPREA A.Proofs of Retrie-vability:Theory and Implementation[C]//Proceedings of 2009 ACM Workshop on Cloud Computing Security.New York,USA:ACM Press,2009:43-54.
(下转第18页)
(上接第12页)
[7]WANG Q,WANG C,LI J,et al.Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]//Proceedings of the 14th European Conference on Research in Computer Security.Berlin,Grermany:Springer-Verlag,2009:355-370.
[8]WANG C,WANG Q,REN K,et al.Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing[C]//Proceedings of INFOCOM’09.New York,USA:ACM Press,2009:1-9.
[9]WANG C,CHOW S,WANG Q,et al.Privacy-preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[10]YUAN J,YU S.Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud[C]//Proceedings of 2013 International Workshop on Security in Cloud Computing.New York,USA:ACM Press,2013:19-26.
[11]YUAN J,YU S.Secure and Constant Cost Public Cloud Storage Auditing with Deduplication[C]//Proceedings of 2013 IEEE Conference on Communications and Network Security.New York,USA:ACM Press,2013:145-153.
[12]LIU C,CHEN J,YANG T.Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(9):2234-2244.
[13]WANG H,WU Q,QIN B,et al.Identity-based Remote Data Possession Checking in Public Clouds[J].IET Information Security,2014,8(2):114-121.
[14]王惠峰,李战怀,张晓,等.支持并发更新的云存储数据持有性审计方法[J].计算机工程,2016,42(2):15-20.
[15]刘婷婷,赵勇.一种隐私保护的多副本完整性验证方案[J].计算机工程,2013,39(7):55-58.
编辑金胡考 |