[1] FU Yingxun,LUO Shengmei,SHU Jiwu.Survey of secure cloud storage system and key technologies[J].Journal of Computer Research and Development,2013,50(1):136-145.(in Chinese) 傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1):136-145. [2] FENG Chaosheng,QIN Zhiguang,YUAN Ding.Techniques of secure storage for cloud data[J].Chinese Journal of Computers,2015,38(1):150-163.(in Chinese) 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,38(1):150-163. [3] ZHOU Yuezhi,ZHANG Di.Near-end cloud computing:opportunities and challenges in the post-cloud computing era[J].Chinese Journal of Computers,2019,42(4):677-700.(in Chinese) 周悦芝,张迪.近端云计算:后云计算时代的机遇与挑战[J].计算机学报,2019,42(4):677-700. [4] BUYYA R,RANJAN R,CALHEIROS R N.Inter-Cloud:utility oriented federation of cloud computing environments for scaling of application services[C]//Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing.Berlin,Germany:Springer,2010:13-31. [5] TSAMOURA E,GOUNARIS A,TSICHLAS K.Multi-objective optimization of data flows in a multi-cloud environment[C]//Proceedings of the 2nd Workshop on Data Analytics in the Cloud.New York,USA:ACM Press,2013:6-10. [6] SuperCloud Consortium.Welcome to SuperCloud[EB/OL].[2020-04-10].https://supercloud-project.eu. [7] PETRI I,DIAZ-MOINTES J,ZOU M,et al.Market models for federated clouds[J].IEEE Transactions on Cloud Computing,2015,3(3):398-410. [8] MATEUSE G,ALICJA G,PASCAL B,et al.Cloud brokering:current practices and upcoming challenges[J].IEEE Cloud Computing,2015,2(2):40-47. [9] SHI Peichang,WANG Huaimin,ZHENG Zibin,et al.Collaboration environment for JointCloud computing[J].SCIENTIA SINICA Informationis,2017,47(9):1129-1148. [10] KOTLA R,ALVISI L,DAHLIN M.SafeStore:a durable and practical storage system[C]//Proceedings of the 12th USENIX Annual Technical Conference.Berkeley,USA:USENIX Association,2007:129-142. [11] CHEN H C H,HU Y C,LEE P P C,et al.NCCloud:a network-coding-based storage system in a cloud-of-clouds[J].IEEE Transactions on Computers,2014,63(1):31-44. [12] DOBRE D,VIOTTI P,VUKOLIĆ M.Hybris:robust hybrid cloud storage[C]//Proceedings of ACM Symposium on Cloud Computing.New York,USA:ACM Press,2014:1-14. [13] HAO Z,RANMAN R,PAN H,et al.Optimizing information leakage in multicloud storage services[EB/OL].[2020-04-10]. https://www.researchgate.net/publication/323348778. [14] FU Yinjin,QIU Xiaofeng, WANG Jian.F2MC:enhancing data storage services with fog-to-MultiCloud hybrid computing[C]//Proceedings of the 38th IEEE International Conference Performance Computing and Communications.Piscataway,USA:IEEE Press,2019:1-6. [15] ABULIBDEH H,PRINCHHOUSE L,WEATHERSPOON H.RACS:a case for cloud storage diversity[C]//Proceedings of the 1st ACM Symposium on Cloud Computing.New York,USA:ACM Press,2010:453-467. [16] WU Z,BUTKIEWICZ M,PERKNS D,et al.SPANStore:cost-effective geo-replicated storage spanning multiple cloud services[J].ACM SIGCOMM Computer Communica-tion Review,2013,43(4):545-546. [17] BERMBACH D,KLEMS M,TAI S,et al.MetaStorage:a federated cloud storage system to manage consistency-latency tradeoffs[C]//Proceedings of the 4th IEEE International Conference on Cloud Computing.Piscataway,USA:IEEE Press,2011:452-459. [18] GHEMAWAT S,GOBIOFF H,LEUNG S T.The Google file system[J].ACM SIGOPS Operating Systems Review,2003,37(5):29-43. [19] BONVIN N,PAPAIOANNOU T G,ABERER K.A self-organized,fault-tolerant and scalable replication scheme for cloud storage[C]//Proceedings of the 1st ACM Conference on Cloud Computing.New York,USA:ACM Press,2010:205-216. [20] LIAO Bin,YU Jiong,SUN Hua,et al.A QoS-aware dynamic data replica deletion strategy for distributed storage systems under cloud computing environments[C]//Proceedings of the 2nd International Conference on Cloud and Green Computing.Piscataway,USA:IEEE Press,2012:219-225. [21] JIA Yaru,LIU Xiangyang,LIU Shengli.Decentralized secure distributed storage system[J].Computer Engineering,2012,38(3):126-129.(in Chinese) 贾亚茹,刘向阳,刘胜利.去中心化的安全分布式存储系统[J].计算机工程,2012,38(3):126-129. [22] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]//Proceedings of ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:146-157. [23] SHACHAM H,WATERS B.Compact proofs of retrievability[J].Journal of Cryptology,2013,26(3):442-483. [24] CAO Ning,WANG Cong,LI Ming,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233. [25] WANG Liangmin,YANG Zhengdong,SONG Xiangmei,et al.SHAMC:a secure and highly available database system in multi-cloud environment[J].Future Generation Computer Systems,2017(105):873-883. [26] PRAVIN A,JACOB T P,NAGARAJAN G,et al.Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique[J].Journal of Ambient Intelligence and Humanized Computing,2019(17):1-8. [27] FAN Yijie,QIAO Zhen,XIAO Mingzhong,et al.One cloud:a secure and anonymous multi-cloud oblivious storage architecture[J].Applied Mechanics and Materials,2014(556):5591-5596. [28] BINDSCHAEDLER V,NAVEED M,PAN X,et al.Practicing oblivious access on cloud storage:the gap,the fallacy,and the new way forward[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2015:837-849. [29] LIU Zheli,LI Bo,HUANG Yanyu,et al.NewMCOS:towards a practical multi-cloud oblivious storage scheme[J].IEEE Transactions on Knowledge and Data Engineering,2020,32(4):714-727. [30] XUE Liang,YU Yong,LI Yannan,et al.Efficient attribute-based encryption with attribute revocation for assured data deletion[J].Information Sciences,2018(479):640-650. [31] VANITHA M,KAVITHA C.Secured data destruction in cloud based multi-tenant database architecture[C]//Proceedings of International Conference on Computer Communication and Informatics.Coimbatore,India:[s.n.],2014:1-6. [32] Google Cloud.Anthos:a modern application platform for your business[EB/OL].[2020-04-10].http://cloud.google.com/anthos. [33] IBM Corporation.IBM Cloud Pak for multicloud management[EB/OL].[2020-04-10]. https://www.ibm.com/support/knowledgecenter/SSFC4F/product_welcome_cloud_pak.html. [34] MultCloud Corp.MultCloud-focus on transferring across clouds[EB/OL].[2020-04-10].https://www.multcloud.com. [35] Xingyun Blooming Technology Co.,Ltd.Cloud steward cloud management platform[EB/OL].[2020-04-10].https://www.cloudbility.com.(in Chinese) 行云绽放科技有限公司.行云管家云管理平台[EB/OL].[2020-04-10].https://www.cloudbility.com. [36] FIT2CLOUD Information Technology Co.,Ltd.FIT2CLOUD[EB/OL].[2020-04-10].https://www.fit2cloud.com.(in Chinese) 飞致云信息科技有限公司.FIT2CLOUD[EB/OL].[2020-04-10].https://www.fit2cloud.com. [37] Bespin Global Technology Co.,Ltd.BESPIN GLOBAL[EB/OL].[2020-04-10].https://www.bespinglobal.cn.(in Chinese) 贝斯平云科技有限公司.BESPIN GLOBAL[EB/OL].[2020-04-10].https://www.bespinglobal.cn. [38] ZHENG Liming,LI Xiaodong.Low-cost multi-node failure repair method for erasure codes[J].Computer Engineering,2017,43(7):110-118,123.(in Chinese) 郑力明,李晓冬.面向纠删码的低成本多节点失效修复方法[J].计算机工程,2017,43(7):110-118,123. [39] WANG Yijie,LI Sijun.Research and performance evaluation of data replication technology in distributed storage systems[J].Computers and Mathematics with Applications,2006,51(11):1625-1632. [40] PLANK J S,THOMASON M G.An exploration of non-asymptotic low-density,parity check erasure codes for wide-area storage applications[J].Parallel Processing Letters,2007,17(1):103-123. [41] WANG Yijie,XU Fangliang,PEI Xiaoqiang.Research on erasure code-based fault-tolerant technology for distributed storage[J].Chinese Journal of Computers,2017,40(1):236-255.(in Chinese) 王意洁,许方亮,裴晓强.分布式存储中的纠删码容错技术研究[J].计算机学报,2017,40(1):236-255. [42] SOLOMON I S R.Polynomial codes over certain finite fields[J].Journal of the Society for Industrial and Applied Mathematics,1960,8(2):300-304. [43] HU Y,YU C M,LI Y K,et al.NCFS:on the practicality and extensibility of a network-coding-based distributed file system[C]//Proceedings of 2011 International Symposium on Network Coding.Piscataway,USA:IEEE Press,2011:233-245. [44] BESSANI A,CORRIA M,QUARESMA B,et al.DEPSKY:dependable and secure storage in a cloud-of-clouds[J].ACM Transactions on Storage,2013,9(4):12. [45] BOEERS K D,JUELS A,OPREA A.HAIL:a high-availability and integrity layer for cloud storage[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:187-198. [46] AHLSWEDE R,CAI N,LI S Y R,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216. [47] TAN Shuang,JIA Yan,HAN Weihong.Research and development of provable data integrity in cloud storage[J].Chinese Journal of Computers,2015,38(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. [48] CURTMOLA R,KHAN O,BURNS R,et al.MR-PDP:multiple-replica provable data possession[C]//Proceedings of the 28th International Conference on Distributed Computing Systems.Piscataway,USA:IEEE Press,2008:411-420. [49] ERWAY C C,PAPAMANTHOU C,TAMASSIN R.Dynamic provable data possession[J].ACM Transactions on Information and System Security,2015,17(4):1-29. [50] WANG Cong,WANG Qian,REN Kui,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]//Proceedings of IEEE INFOCOM’10.Piscataway,USA:IEEE Press,2010:1-9. [51] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2007:598-609. [52] JUELS A,JR B S K.PORs:proofs of retrievability for large files[C]//Proceedings of ACM Conference on Computer & Communications Security.New York,USA:ACM Press,2007:108-119. [53] CHEN B,CURTMOLA R.Robust dynamic remote data checking for public clouds[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2012:1043-1045. [54] CAO Laicheng,HE Wenwen,LIU Yufei,et al.An integrity verification scheme of completeness and zero-knowledge for multi-cloud storage[J].International Journal of Communication Systems,2017,30(16):3324-3335. [55] PEI Xin,LIN Jiuchuan,JIN Bo,et al.Ensuring replication-based data integrity and availability in multicloud storage[C]//Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Piscataway,USA:IEEE Press,2016:687-692. [56] LEVY D.Zookeeper[C]//Proceedings of ACM SIGGRAPH Conference on Computer Animation Festival.New York,USA:ACM Press,2011:458-469. [57] DECANDIA G,HASTORUN D,JAMPANI M,et al.Dynamo:amazon’s highly available key-value store[J].ACM SIGOPS Operating Systems Review,2007,41(6):205-220. [58] PAPAIOANNOU T G,BONVIN N,ABERERK.Scalia:an adaptive scheme for efficient multi-cloud storage[C]//Proceedings of International Conference on High Performance Computing,Networking,Storage and Analysis.Piscataway,USA:IEEE Computer Society Press,2012:20-31. [59] E Jinlong,CUI Yong,WANG Peng,et al.Cocloud:enabling efficient cross-cloud file collaboration based on inefficient Web APIs[J].IEEE Transactions on Parallel and Distributed Systems,2017,29(1):56-69. [60] XIE Fei,YAN Jun,SHEN Jun.A bandwidth and latency based replica selection mechanism for data-intensive workflow applications in the multi-cloud environment[C]//Proceedings of Australasian Computer Science Week Multi-Conference.New York,USA:ACM Press,2020:1-8. [61] SHI Tao,MA Hui,CHEN Gang,et al.Location-aware and budget-constrained service deployment for composite applications in multi-cloud environment[J].IEEE Transactions on Parallel and Distributed Systems,2020,31(8):1954-1969. [62] FU Yinjin,XIAO Nong,LIU Fang.Research and development on key techniques of data deduplication[J].Journal of Computer Research and Development,2012,49(1):12-20.(in Chinese) 付印金,肖侬,刘芳.重复数据删除关键技术研究进展[J].计算机研究与发展,2012,49(1):12-20. [63] XIONG Jinbo,ZHANG Yuanyuan,LI Fenghua,et al.Research progress on secure data deduplication in cloud[J].Journal on Communications,2016,37(11):169-180.(in Chinese) 熊金波,张媛媛,李凤华,等.云环境中数据安全去重研究进展[J].通信学报,2016,37(11):169-180. [64] MAO Bo,YE Geyan,LAN Yanjia,et al.A data deduplication-based primary storage system in cloud-of-clouds[J].Journal of Computer Research and Development,2015,52(6):1278-1287.(in Chinese) 毛波,叶阁焰,蓝琰佳,等.一种基于重复数据删除技术的云中云存储系统[J].计算机研究与发展,2015,52(6):1278-1287. [65] RADE P,BARKADE V M.A cost efficient multi-cloud data hosting using heuristic data placement algorithm[C]//Proceedings of the 2nd International Conference on Inventive Systems and Control.Piscataway,USA:IEEE Press,2018:403-407. [66] LIU Jian,ASOKAN N,PINKAS B.Secure deduplication of encrypted data without additional independent servers[C]//Proceedings of ACM SIGSAC Conference on Computer & Communications Security.New York,USA:ACM Press,2015:132-147. [67] LI Mingqiang,QIN Chuan,LI Jingwei,et al.CDStore:toward reliable,secure,and cost-efficient cloud storage via convergent dispersal[J].IEEE Internet Computing,2016,20(3):45-53. [68] SHEN Lu,FENG Shifang,SUN Jinjin,et al.CloudS:a multi-cloud storage system with multi-level security[J].IEICE Transactions on Information and Systems,2016,99(8):2036-2043. [69] LI Yandong,ZHU Lichuang,SHEN Meng,et al.CloudShare:towards a cost-efficient and privacy-preserving alliance cloud using permissioned blockchains[C]//Proceedings of International Conference on Mobile Networks and Manage-ment.Berlin,German:Springer,2017:339-352. [70] XIAO Liang,LI Qiangda,LIU Jinliang.Survey on secure cloud storage[J].Journal of Data Acquisition & Processing,2016,31(3):464-472.(in Chinese) 肖亮,李强达,刘金亮.云存储安全技术研究进展综述[J].数据采集与处理,2016,31(3):464-472. [71] SHI Weisong,SUN Hui,CAO Jie,et al.Edge computing-an emerging computing model for the internet of everything era[J].Journal of Computer Research and Development,2017,54(5):907-924.(in Chinese) 施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924. [72] ABDELBAKY M,DIAZ-MONTES J,PARASHAR M,et al.Docker containers across multiple clouds and data centers[C]//Proceedings of the 8th International Conference on Utility and Cloud Computing.Piscataway,USA:IEEE Press,2015:368-371. [73] BREWER E A.Towards robust distributed systems[C]//Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing.New York,USA:ACM Press,2000:768-779. [74] PRITCHETT D.Base:an acid alternative[J].Queue,2008,6(3):48-55. [75] LI Zhenhao.Design and implementation of cloud platform supporting multi-cloud collaboration[D].Beijing:Beijing University of Posts and Telecommunications,2019.(in Chinese) 李振豪.支持多云协作的云平台的设计与实现[D].北京:北京邮电大学,2019. [76] GRAY J,LAMPORT L.Consensus on transaction commit[J].ACM Transactions on Database Systems,2006,31(1):133-160. [77] LIU Y A,CHAND S,STOLLER S D.Moderately complex Paxos made simple:high-level executable specification of distributed algorithms[C]//Proceedings of the 21st International Symposium on Principles and Practice of Programming Languages.New York,USA:ACM Press,2019:15-29. [78] JUNQUEIRA F P,REED B C,SERAFINI M.Zab:high-performance broadcast for primary-backup systems[C]//Proceedings of IEEE/IFIP International Conference on Dependable Systems & Networks.Piscataway,USA:IEEE Press,2011:589-594. [79] ZHANG Chendong,GUO Jinwei,LIU Bozhong,et al.High availability implementation based on Raft[J].Journal of East China Normal University:Natural Science,2015,2015(5):172-184.(in Chinese) 张晨东,郭进伟,刘柏众,等.基于Raft一致性协议的高可用性实现[J].华东师范大学学报(自然科学版),2015(5):172-184. [80] LI Hui,SUN Wenhai,LI Fenghua,et al.Secure and privacy-preserving data storage service in public cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409. [81] KE Changbo,HUANG Zhiqiu.Privacy requirement description and checking method in cloud computing[J].Journal of Computer Research and Development,2015,52(4):879-888.(in Chinese) 柯昌博,黄志球.云计算环境下隐私需求的描述与检测方法[J].计算机研究与发展,2015,52(4):879-888. [82] KOLLER R,RANGASWAMI R.I/O deduplication:utilizing content similarity to improve I/O performance[J].ACM Transactions on Storage,2010,6(3):211-224. [83] CHEN Feng,LUO Tian,ZHANG Xiaodong.CAFTL:a content-aware flash translation layer enhancing the lifespan of flash memory based solid state drives[C]//Proceedings of the 9th USENIX Conference on File & Storage Technologies.Berkeley,USA:USENIX Association,2019:77-90. [84] LIU Yining,ZHOU Yuanjian,LAN Rushi,et al.Blockchain-based verification scheme for deletion operation in cloud[J].Journal of Computer Research and Development,2018,55(10):2199-2207.(in Chinese) 刘忆宁,周元健,蓝如师,等.基于区块链的云数据删除验证协议[J].计算机研究与发展,2018,55(10):2199-2207. [85] CHEN Weili,ZHENG Zibin.Blockchain data analysis:a review of status,trends and challenges[J].Journal of Computer Research and Development,2018,55(9):1853-1870.(in Chinese) 陈伟利,郑子彬.区块链数据分析:现状、趋势与挑战[J].计算机研究与发展,2018,55(9):1853-1870. [86] HE Haiwu,YAN An,CHEN Zehua.Survey of smart contract technology and application based on blockchain[J].Journal of Computer Research and Development,2018,55(11):2452-2466.(in Chinese)贺海武,延安,陈泽华.基于区块链的智能合约技术与应用综述[J].计算机研究与发展,2018,55(11):2452-2466. [87] WANG Binfeng,SU Jinshu,CHEN Lin.Review of the design of data center network for cloud computing[J].Journal of Computer Research and Development,2016,53(9):2085-2106.(in Chinese)王斌锋,苏金树,陈琳.云计算数据中心网络设计综述[J].计算机研究与发展,2016,53(9):2085-2106. [88] SHI Xuelin,XU Ke.Utility maximization model of virtual machine scheduling in cloud environment[J].Chinese Journal of Computers,2013,36(2):252-262.(in Chinese)师雪霖,徐恪.云虚拟机资源分配的效用最大化模型[J].计算机学报,2013,36(2):252-262. [89] KURDI H,ALSALAMAH S,ALATAWI A,et al.Healthybroker:a trustworthy blockchain-based multi-cloud broker for patient-centered ehealth services[J].Electronics,2019,8(6):1-17. [90] LI Zhiyong,CHEN Shaomiao,YANG Bo,et al.Multi-objective memetic algorithm for task scheduling on heterogeneous cloud[J].Chinese Journal of Computers,2016,39(2):377-390.(in Chinese)李智勇,陈少淼,杨波,等.异构云环境多目标Memetic优化任务调度方法[J].计算机学报,2016,39(2):377-390. [91] PAN Chen,LIU Zhiqiang,LIU Zhen,et al.Research on scalability of blockchain technology:problems and methods[J].Journal of Computer Research and Development,2018,55(10):2099-2110.(in Chinese)潘晨,刘志强,刘振,等.区块链可扩展性研究:问题与方法[J].计算机研究与发展,2018,55(10):2099-2110. [92] XU Ye,MENG Hong,CHENG Jiayu,et al.The stratagem of IBM’s smarter planet and china’s countermeasures[J].Forum on Science and Technology in China,2010(4):20-23.(in Chinese)许晔,孟弘,程家瑜,等.IBM"智慧地球"战略与我国的对策[J].中国科技论坛,2010(4):20-23. |