[1] |
TAN Yuesheng,FAN Wenjie,WANG Jingyu.Privacy-preserving cloud data integrity verification scheme[J].Journal of Chinese Computer Systems,2017,38(12):2736-2740.(in Chinese)谭跃生,范文婕,王静宇.一种支持隐私保护的云数据完整性验证方案[J].小型微型计算机系统,2017,38(12):2736-2740.
|
[2] |
SHACHAM H,WATERS B.Compact proofs of retrievability[J].Journal of Cryptology,2013,26(3):442-483.
|
[3] |
HAO Zhuo,ZHONG Sheng,YU Nenghai.A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability[J].IEEE Transactions on Knowledge and Data Engineering,2011,23(9):1432-1437.
|
[4] |
WANG Cong,WANG Qian,REN Kui,et al.Toward secure and dependable storage services in cloud computing[J].IEEE Transactions on Services Computing,2012,5(2):220-232.
|
[5] |
WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
|
[6] |
HUANG Kun,XIAN Ming,FU Shaojing,et al.Securing the cloud storage audit service:defending against frame and collude attacks of third party auditor[J].IET Communications,2014,8(12):2106-2113.
|
[7] |
WANG Zhihao.Cloud storage data integrity verification scheme and its improvement[D].Chengdu:Southwest Jiaotong University,2018.(in Chinese)王志豪.云存储数据完整性验证方案及其改进[D].成都:西南交通大学,2018.
|
[8] |
ZHOU Enguang,LI Zhoujun,GUO Hua,et al.An improved data integrity verification scheme in cloud storage system[J].Acta Electronica Sinica,2014,42(1):150-154.(in Chinese)周恩光,李舟军,郭华,等.一个改进的云存储数据完整性验证方案[J].电子学报,2014,42(1):150-154.
|
[9] |
ZHA Yaxing,LUO Shoushan,LI Wei,et al.Dynamic group public auditing scheme for shared data on attribute-based threshold signature[J].Journal of Beijing University of Posts and Telecommunications,2017,40(5):43-49.(in Chinese)查雅行,罗守山,李伟,等.基于属性门限签名的动态群组共享数据公开审计方案[J].北京邮电大学学报,2017,40(5):43-49.
|
[10] |
HUANG Longxia,ZHANG Gongxuan,FU Anmin.Privacy-preserving public auditing for dynamic group based on hierarchical tree[J].Journal of Computer Research and Development,2016,53(10):2334-2342.(in Chinese)黄龙霞,张功萱,付安民.基于层次树的动态群组隐私保护公开审计方案[J].计算机研究与发展,2016,53(10):2334-2342.
|
[11] |
FU Anmin,QIN Ningyuan,SONG Jianye,et al.Privacy-preserving public auditing for multiple managers shared data in the cloud[J].Journal of Computer Research and Development,2015,52(10):2353-2362.(in Chinese)付安民,秦宁元,宋建业,等.云端多管理者群组共享数据中具有隐私保护的公开审计方案[J].计算机研究与发展,2015,52(10):2353-2362.
|
[12] |
DOMINGO F J,QIN B,WU Q,et al.Identity-based remote data possession checking in public clouds[J].IET Information Security,2014,8(2):114-121.
|
[13] |
TAN Shuang,JIA Yan.NaEPASC:a novel and efficient public auditing scheme for cloud data[J].Journal of Zhejiang University-Science C,2014,15(9):794-804.
|
[14] |
WANG Huaqun.Identity-based distributed provable data possession in multicloud storage[J].IEEE Transactions on Services Computing,2015,8(2):328-340.
|
[15] |
HUANG Longxia,ZHANG Gongxuan,FU Anmin.Privacy-preserving public auditing for non-manager group[C]//Proceedings of 2017 IEEE International Conference on Com-munications.Washington D.C.,USA:IEEE Press,2017:1-6.
|
[16] |
LIU Hongyu,MU Yi,ZHAO Jining,et al.Identity-based provable data possession revisited:security analysis and generic construction[J].Computer Standards and Interfaces,2017,54(1):10-19.
|
[17] |
ALRIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]//Proceedings of ASIACRYPT'03.Berlin,Germany:Springer,2003:452-473.
|
[18] |
WANG Boyang,LI Baochun,LI Hui,et al.Certificateless public auditing for data integrity in the cloud[C]//Proceedings of 2013 IEEE Conference on Communications and Network Security.Washington D.C.,USA:IEEE Press,2013:136-144.
|
[19] |
WU L,JING W,ZEADALLY S,et al.Privacy-preserving auditing scheme for shared data in public clouds[J].Journal of Supercomputing,2018,74(11):6156-6183.
|
[20] |
WANG Boyang,LI Baochun,LI Hui.Panda:public auditing for shared data with efficient user revocation in the cloud[J].IEEE Transactions on Services Computing,2015,8(1):92-106.
|