[1] MELL P,GRANCE T.The NIST definition of cloud computing[EB/OL].[2019-09-20]. https://www.nist.gov/publications/nist-definition-cloud-computing?pub_id=909616. [2] ARMBRUST M,FOX A,GRIFFITH R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58. [3] TAN Shuang,JIA Yan,HAN Weihong.Research and development of provable data integrity in cloud storage[J].Chinese Journal of Computers,2015,38(1):164-177.(in Chinese)谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. [4] JIANG Xiaoqing,WANG Qinruo.Cold data storage technology in big data environment[J].Industrial Control Computer,2016,29(6):58-60.(in Chinese)姜晓青,王钦若.大数据环境下冷数据存储技术概述[J].工业控制计算机,2016,29(6):58-60. [5] MACHANAVAJJHALA A,KIFER D,GEHRKE J,et al.l-diversity:privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):34-46. [6] SWEENEY L.k-anonymity:a model for protecting privacy[J].International Journal on Uncertainty Fuzziness and Knowledge Based Systems,2002,10(5):557-570. [7] JUELS A,KALISKI B S.PORs:proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:584-597. [8] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:598-609. [9] SHAH M A,SWAMINATHAN R,BAKER M,et al.Privacy-preserving audit and extraction of digital contents:HPL-2008-32R1[R].Palo Alto,USA:HP Labs,2008. [10] DESWARTE Y,QUISQUATER J J,SAÏDANE A.Remote integrity checking[C]//Proceedings of Working Conference on Integrity and Internal Control in Information Systems.Berlin,Germany:Springer,2003:1-11. [11] SHACHAM H,WATERS B.Compact proofs of retrievability[C]//Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security.Melbourne,Australia:[s.n.],2008:90-107. [12] BONEH D,LYNN B,SHACHAM H.Short signatures from the Weil pairing[C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security.Gold Coast,Australia:[s.n.],2001:514-532. [13] ZHOU Rui,WANG Xiaoming.Integrity verifying algorithm for cloud data based on homomorphic hash function[J].Computer Engineering,2014,40(6):64-69.(in Chinese)周锐,王晓明.基于同态哈希函数的云数据完整性验证算法[J].计算机工程,2014,40(6):64-69. [14] ATENIESE G,PIETRO R,MANCINI L V,et al.Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York,USA:ACM Press,2008:1-10. [15] GARG N,BAWA S.RITS-MHT:relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing[J].Journal of Network and Computer Applications,2017,84:1-13. [16] WANG Huaqun.Proxy provable data possession in public clouds[J].IEEE Transactions on Services Computing,2013,6(4):551-559. [17] ERWAY C,KÜPCV A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:213-222. [18] LI Yong,YAO Ge,LEI Linan,et al.LBT-based cloud data integrity verification scheme[J].Journal of Tsinghua University(Science and Technology),2016,56(5):504-510.(in Chinese)李勇,姚戈,雷丽楠,等.基于多分支路径树的云存储数据完整性验证机制[J].清华大学学报(自然科学版),2016,56(5):504-510. [19] WU Yinghao,LING Jie.An improved data integrity verification method for cloud storage[J].Computer Engineering,2019,45(3):36-40.(in Chinese)吴颖豪,凌捷.一种改进的云存储数据完整性验证方法[J].计算机工程,2019,45(3):36-40. [20] ZHOU Yue,WANG Wei,SONG Hongbo,et al.Design of data integrity verification scheme under cloud platform[J].Netinfo Security,2018,18(11):57-65.(in Chinese)周悦,王威,宋红波,等.云平台下数据完整性验证方案设计[J].信息网络安全,2018,18(11):57-65. |