参考文献 [1]李力,鄢田云.一种基于LT码的数据云存储方案[J].计算机工程,2014,40(4):7-13. [2]王浩.云存储与网络相互影响的研究[J].计算机工程,2013,39(10):24-30,36. [3]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. [4]Ateniese G,Burns R,Curtmola R,et al.Remote Data Checking Using Provable Data Possession[J].ACM Transactions on Information and System Security,2011,14(1):12-34. [5]谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. [6]柳妃妃.云计算环境下可证明数据持有技术研究[D].上海:上海交通大学,2011. [7]付伟,叶清,陈泽茂,等.云存储中的数据持有性证明研究综述[J].通信学报,2012,33(z2):201-206. [8]Ateniese G,di Pietro R,Mancini L V,et al.Scalable and Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York,USA:ACM Press,2008:1-10. [9]Zhu Yan,Hu Hongxin,Ahn G J,et al.Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244. [10]Zhu Yan,Ahn G J,Hu Hongxin,et al.Dynamic Audit Services for Outsourced Storages in Clouds[J].IEEE Transactions on Services Computing,2013,6(2):227-238. [11]Wang Boyang,Li Baochun,Li Hui.Oruta:Privacy-preserving Public Auditing for Shared Data in the Cloud[J].IEEE Transactions on Cloud Computing,2014,2(1):43-56. [12]Erway C C,Küpü A,Papamanthou C,et al.Dynamic Provable Data Possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:213-222. [13]Wang Cong,Chow S,Wang Q,et al.Privacy-preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375. 编辑金胡考 |