[1] 顾启超,刘晓洁,李涛,等.一种多点容灾系统的设计与实现[J].计算机应用研究,2008,25(8):2427-2429. [2] 陈鹏,杨频,赵奎,等.远程容灾系统的设计与实现[J].计算机工程与设计,2011,32(10):3247-3250. [3] HOTS S,METER R V,FINN G.Internet protocols for network attached peripherals[C]//Proceedings of the 6th IEEE/NASA Conference on Mass Storage Systems and Technologies.Washington D.C.,USA:IEEE Press,1998:1-15. [4] WATSON R W.High performance storage system scalability:architecture,implementation and experience[C]//Proceedings of IEEE Conference on Mass Storage Systems and Technologies.Washington D.C.,USA:IEEE Press,2005:145-159. [5] WOOD T,CECCHETT E,RAMAKRISHNAN K K.Disaster recovery as a cloud service:economic benefits and deployment challenges[C]//Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing.Boston,USA:USENIX,2010:8-15. [6] WOOD T,LAGAR-CAVILLA H A,RAMAKRISHNAN K K.PipeCloud:using causality to overcome speed-of-light delays in cloud-based disaster recovery[C]//Proceedings of the 2nd ACM Symposium on Cloud Computing.New York,USA:ACM Press,2011. [7] VRABLE M,SAVAGE S,VOELKER G M.Cumulus:filesystem backup to the cloud[J].ACM Transactions on Storage,2009,5(4):l-28. [8] KHAN J I,TAHBOUB O Y.Peer-to-peer enterprise data backup over a Ren cloud[C]//Proceedings of International Conference on Information Technology:New Generations.New York,USA:ACM Press,2011:959-964. [9] HE Dian,LIANG Ying,HANG Zhi,et al.Replicate distribution method of minimum cost in cloud storage for Internet of things[C]//Proceedings of International Conference on Network Computing and Information Security.Guilin,China:[s.n.],2011:89-92. [10] BENET J.IPFS-content addressed,versioned,P2P file system[EB/OL].[2018-12-26].https://arxiv.org/pdf/1407.3561.pdf. [11] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2018-12-26].https://bitcoincash.org/bitcoin.pdf. [12] 邵奇峰,张召,朱燕超,等.企业级区块链技术综述[J/OL].软件学报:1-22[2019-08-20].https://doi.org/10.13328/j.cnki.jos.005775. [13] 张亮,刘百祥,张如意,等.区块链技术综述[J].计算机工程,2019,45(5):1-12. [14] KRAFT D.Difficulty control for blockchain-based consensus systems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413. [15] WATANABE H,FUJIMURA S,NAKADAIRA A,et al.Blockchain contract:a complete consensus using blockchain[C]//Proceedings of the 4th Global Conference on Consumer Electronics.Washington D.C.,USA:IEEE Press,2016:577-578. [16] ZHENG Zibin,XIE Shaoan,DAI Hongning,et al.An overview of blockchain technology:architecture,consensus,and future trends[C]//Proceedings of IEEE International Congress on Big Data.Washington D.C.,USA:IEEE Press,2017. [17] MERKLE R C.A digital signature based on a conventional encryption function[C]//Proceedings of CRYPTO'87.Berlin,Germany:Springer,1987:369-378. [18] RIVEST R L.All-or-nothing encryption and the package transform[C]//Proceedings of 1997 Fast Software Encryption Workshop.Haifa,Israel:[s.n.],1997:210-218. [19] PAGH R,RODLER F F.Cuckoo hashing[C]//Proceedings of European Symposium on Algorithms.Aarhus,Denmark:[s.n.],2001:121-133. |