[1]GUPTA R.Above the clouds:a view of cloud computing[J].Asian Journal of Research in Social Sciences and Humanities,2012,2(6):84-110.
[2]冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,38(1):150-163.
[3]ATENIESE G,BUMS R,CURTMOLA R,et al.Remote data checking using provable data possession[J].ACM Transactions on Information and System Security,2011,14(1):12.
[4]WANG C,WANG Q,REN K,et al.Toward secure and dependable storage services in cloud computing[J].IEEE Transactions on Services Computing,2012,5(2):220-232.
[5]YU Y,XUE L,AU M H,et al.Cloud data integrity checking with an identity-based auditing mechanism from RSA[J].Future Generation Computer Systems,2016,62(1):85-91.
[6]王谦,熊书明.一种面向移动云存储的可验证访问控制方案[J].计算机工程,2016,42(5):35-41.
[7]SOOKHAK M,TALEBIAN H,AHMED E,et al.A review on remote data auditing in single cloud server:Taxonomy and open issues[J].Journal of Network and Computer Applications,2014,43(1):121-141.
[8]ZHANG Y,BLANTON M.Efficient dynamic provable possession of remote data via balanced update trees[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2013:183-194.
[9]袁多宝,王晓明.基于 MH 树的外包数据库查询验证方法[J].计算机工程,2010,36(4):115-117.
[10]BENABBAS S,GENNARO R,VAHLIS Y.Verifiable delegation of computation over large datasets[C]//Proceedings of Advances in Cryptology-CRYPTO’11.Washington D.C.,USA:IEEE Press,2011:111-131.
[11]CATALANO D,FIORE D.Vector commitments and their applications[C]//Proceedings of PKC’13.Berlin,Germany:Springer,2013:55-72.
[12]CHEN X,LI J,HUANG X,et al.New publicly verifiable databases with efficient updates[J].IEEE Transactions on Dependable and Secure Computing,2015,12(5):546-556.
[13]CHEN X,LI J,WENG J,et al.Verifiable computation over large database with incremental updates[J].IEEE Transactions on Computers,2016,65(10):3184-3195.
[14]JIANG T,CHEN X,MA J.Public integrity auditing for shared dynamic cloud data with group user revocation[J].IEEE Transactions on Computers,2016,65(8):2363-2373.
[15]WANG C,REN K,LOU W,et al.Toward publicly auditable secure cloud data storage services[J].IEEE Network,2010,24(4).
[16]ATENIESE G,FU K,GREEN M,et al.Improved proxy re-encryption schemes with applications to secure distributed storage[J].ACM Transactions on Infor-mation and System Security,2006,9(1):1-30.
|