[1]WANG Y D,YANG J H,XU C,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,26(5):1129-1150.
[2]雷蕾,蔡权伟,荆继武,等.支持策略隐藏的加密云存储访问控制机制[J].软件学报,2016,27(6):1432-1450.
[3]王龙江,陈越,严新成,等.网络编码云存储系统差分数据更新方案[J].通信学报,2017,38(3):154-164.
[4]GONALVES G,DRAGO I,SILVA A P C D,et al.The impact of content sharing on cloud storage bandwidth consumption[J].IEEE Internet Computing,2016,20(4):26-35.
[5]CUI Y,LAI Z,DAI N.A first look at mobile cloud storage services:architecture,experimentation,and challenges[M].Washington D.C.,USA:IEEE Press,2016.
[6]LI Jianjiang,WU Jie,MA Zhanning.Frequency and similarity-aware partitioning for cloud storage based on space-time utility maximization model[J].Tsinghua Science and Technology,2015,20(3):233-245.
[7]YU C M,CHEN C Y,CHAO H C.Proof of ownership in deduplicated cloud storage with mobile device efficiency[J].IEEE Network,2015,29(2):51-55.
[8]CHU Chengkang,ZHU Wentao,HAN Jin,et al.Security concerns in popular cloud storage services[J].IEEE Pervasive Computing,2013,12(4):50-57.
[9]LI Ming,YU Shucheng,REN Kui,et al.Toward privacy-assured and searchable cloud data storage services[J].IEEE Network,2013,27(4):56-62.
[10]TAMEEM E,CHO G.Providing privacy and access control in cloud storage services using a KPABE system with secret attributes[J].Arabian Journal for Science and Engineering,2014,39(11):7877-7884.
[11]HE Kai,HUANG Chuanhe,ZHOU Hao,et al.Public auditing for encrypted data with client-side deduplication in cloud storage[J].Wuhan University Journal of Natural Sciences,2015,20(4):291-298.
[12]JOGDAND R M,GOUDAR R H,SAYED G B,et al.Enabling public verifiability and availability for secure data storage in cloud computing[J].Evolving Systems,2015,6(1):55-65.
[13]LI C T,LEE C W,SHEN J J.An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services[J].Nonlinear Dynamics,2015,80(3):1601-1611.
[14]KARAKOYUNLU C,CHANDY J A.Exploiting user metadata for energy-aware node allocation in a cloud storage system[J].Journal of Computer and System Sciences,2016,82(2):282-309.
[15]PITCHAI R,JAYASHRI S,RAJA J.Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing[J].Wireless Personal Communications,2016,90(2):947-960. |