(下转第42页) (上接第36页) 参考文献 [1]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. [2]敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. [3]Dutch M,Freeman L.Understanding Data De-duplication Ratios[EB/OL].[2016-03-08].http://www.snia.org/. [4]杨超,张俊伟,董学文,等.云存储加密数据去重删除所有权证明方法[J].计算机研究与发展,2015,52(1):248-258. [5]Harnik D,Pinkas B,Shulman-Peleg A.Side Channels in Cloud Services:Deduplication in Cloud Storage[J].IEEE Security and Privacy,2010,8(6):40-47. [6]周锐,王晓明.基于同态哈希函数的云数据完整性验证算法[J].计算机工程,2014,40(6):64-69. [7]陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(l):19-25. [8]Halevi S,Harnik D,Pinkas B,et al.Proofs of Ownership in Remote Storage Systems[C]//Proceedings of CCS’11.Illinois,USA:[s.n.],2011:491-500. [9]Pietro R D,Sorniotti A.Boosting Efficiency and Security in Proof of Ownership for Deduplication[C]//Pro-ceedings of the 7th ACM Symposium on Information,Computer and Communications Security.Seoul,Korea:[s.n.],2012:81-82. [10]Yang Chao,Ren Jian,Ma Jianfeng.Provable Ownership of Files in Deduplication Cloud Storage[C]//Pro-ceedings of 2013 IEEE Global Communications Con-ference.Atlanta,USA:IEEE Press,2013:695-700. [11]Zheng Qingji,Xu Shouhuai.Secure and Efficient Proof of Storage with Deduplication[C]//Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy.San Antonio,USA:ACM Press,2012:1-12. [12]Ateniese G,Burns R C,Curtmola R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of CCS’07.Alexandria,USA:ACM Press,2007:598-609. [13]Juels A,Jr B S K.Pors:Proofs of Retrievability for Large Files[C]//Proceedings of CCS’07.Alexandria,USA:ACM Press,2007:584-597. [14]Shacham H,Waters B.Compact Proofs of Retrievabi-lity[C]//Proceedings of ASIACRYPT’08.Melbourne,Australia:Springer,2008:90-107. [15]Wang Cong,Sherman S M,Wang Qian Chow,et al.Privacy-preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375. 编辑索书志 |