参考文献
[1] Verma S. Forecast: Consumer Digital Storage Needs, 2010- 2016[EB/OL]. (2013-01-20). http://www.gartner.com/Display Document?ref=clientFriendlyUrl&id=1953315.
[2] 艾瑞咨询集团. 市场分析: 云存储是云计算应用的突破 口[EB/OL]. (2013-01-20). http://service.iresearch.cn/cloud/ 20120918/181903.shtml.
[3] Wu Jiyi, Ping Lingdi, Ge Xiaoping, et al. Cloud Storage as the Infrastructure of Cloud Computing[C]//Proc. of International Conference on Intelligent Computing and Cognitive Informatics. Kuala Lumpur, Malaysia: IEEE Press, 2010.
[4] Zeng Wenying, Zhao Yuelong, Ou Kairi, et al. Research on Cloud Storage Architecture and Key Technologies[C]//Proc. of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. Seoul, Korea: ACM Press, 2009.
[5] Wang Guojun, Liu Qin, Wu Jie. Hierarchical Attribute-based Encryption for Fine-grained Access Control in Cloud Storage Services[C]//Proc. of the 17th ACM Conference on Computer and Communications Security. Chicago, USA: ACM Press, 2010.
[6] 林秦颖, 桂小林, 史德琴, 等. 面向云存储的安全存储策略研究[J]. 计算机研究与发展, 2011, 48(z1): 240-243.
[7] 侯清铧, 武永卫, 郑纬民, 等. 一种保护云存储平台上用户数据私密性的方法[J]. 计算机研究与发展, 2011, 48(7): 1146-1154.
[8] 洪 澄, 张 敏, 冯登国. AB-ACCS: 一种云存储密文访问控制方法[J]. 计算机研究与发展, 2010, 47(z1): 259-265.
[9] 黄格仕. 云存储安全技术的研究[D]. 广州: 华南理工大学, 2012.
[10] Bowers K D, Juels A, Oprea A. HAIL: A High-availability and Integrity Layer for Cloud Storage[C]//Proc. of the 16th ACM Conference on Computer and Communications. Chicago, USA: ACM Press, 2009.
[11] Bonvin N, Papaioannou T G, Aberer K. A Self-organized, Fault-tolerant and Scalable Replication Scheme for Cloud Storage[C]//Proc. of the 1st ACM Symposium on Cloud Computing. Indianapolis, USA: ACM Press, 2010.
[12] 陆小铭, 曹维华, 余勇昌. 电信运营商发展云存储业务的网络问题探讨[J]. 电信科学, 2010, (6): 71-75.
[13] Application-Layer Traffic Optimization[EB/OL]. (2013-03-25). http://datatracker.ietf.org/wg/alto/charter/.
编辑 索书志 |