[1]MELL P,GRANCE T.The nist definition of cloud computing[J].National Institute of Standards and Technology,2009,53(6):50-57.
[2]王文娟,杜学绘,王娜,等.云计算安全审计技术研究综述[J].计算机科学,2017,44(7):16-20,30.
[3]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:598-609.
[4]ATENIESE G,KAMARA S,KATZ J.Proofs of storage from homomorphic identification protocols[C]//Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security.New York,USA:ACM Press,2009:319-333.
[5]ERWAY C C,PAPAMANTHOU C,TAMASSIA R.Dynamic provable data possession[J].ACM Transactions on Information and System Security,2009,17(4):213-222.
[6]JUELS A,KALISKI B S.Pors:proofs of retrievability for large files[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:584-597.
[7]WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]//Proceedings of European Conference on Research in Computer Security.Berlin,Germany:Springer,2009:355-370.
[8]ZHU Y,HU H,AHN G J,et al.Efficient audit service outsourcing for data integrity in clouds[J].Journal of Systems and Software,2012,85(5):1083-1095.
[9]ZHU Y,HU H,AHN G J,et al.Cooperative provable data possession for integrity verification in multicloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244.
[10]谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.
[11]周锐,王晓明.基于同态哈希函数的云数据完整性验证算法[J].计算机工程,2014,40(6):64-69.
[12]杨小东,刘婷婷,杨平,等.基于代理重签名的云端数据完整性验证方案[J].计算机工程,2018,44(9):130-135.
[13]WANG H,ZHU L,WANG F,et al.An efficient provable data possession based on elliptic curves in cloud storage[J].International Journal of Security and Its Applications,2014,8(5):97-108.
[14]YANG K,JIA X.An efficient and secure dynamic auditing protocol for data storage in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(9):1717-1726.
[15]WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[EB/OL].[2017-10-10].http://www.aensiweb.net/AENSIWEB/anas/anas/2016/Special/118-121.pdf.
[16]何凯,黄传河,王小毛,等.云存储中数据完整性的聚合盲审计方法[J].通信学报,2015,36(10):119-132.
[17]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:598-609. |