[1] 林闯, 苏文博, 孟坤, 等.云计算安全:架构、机制与模型评价[J]. 计算机学报, 2013, 36(9):1765-1784.(LIN C, SU W B, MENG K, et al. Cloud computing security:architecture, mechanism and modeling[J]. Chinese Journal of Computers, 2013, 36(9):1765-1784.) [2] 季正波, 白光伟, 沈航, 等.具有隐私保护功能的移动云服务接入控制[J].计算机应用, 2014, 34(7):1897-1901.(JI Z B, BAI G W, SHEN H, et al. Privacy-preserving access control for mobile cloud services[J]. Journal of Computer Applications, 2014, 34(7):1897-1901.) [3] 王素贞, 杜治娟. 基于移动Agent的移动云计算系统构建方法[J]. 计算机应用, 2013, 33(5):1276-1280.(WANG S Z, DU Z J. Construction method of mobile cloud computing system based on mobile Agent[J]. Journal of Computer Applications, 2013, 33(5):1276-1280.) [4] 李瑞轩, 董新华, 辜希武, 等.移动云服务的数据安全与隐私保护综述[J]. 通信学报, 2013, 34(12):158-166.(LI R X, DONG X H, GU X W, et al. Overview of the data security and privacy-preserving of mobile cloud services[J]. Journal on Communications, 2013, 34(12):158-166.) [5] 毛波, 叶阁焰, 蓝琰佳, 等. 一种基于重复数据删除技术的云中云存储系统[J]. 计算机研究与发展, 2015, 52(6):1278-1287.(MAO B, YE G Y, LAN Y J, et al. A data deduplication-based primary storage system in cloud-of-clouds[J]. Journal of Computer Reserch and Development, 2015, 52(6):1278-1287.) [6] 武思慧.粗糙集与聚类支持下的t-closeness隐私保护模型研究[D]. 临汾:山西师范大学, 2015:1-2.(WU S H. Research on t-closeness privacy protection model with the support of rough set and cluster[D]. Linfen:Shanxi Normal University, 2015:1-2.) [7] 丁滟, 王怀民, 史佩昌, 等.可信云服务[J]. 计算机学报, 2015, 38(1):133-149.(DING Y, WANG H M, SHI P C, et al. Trusted cloud service[J]. Chinese Journal of Computers, 2015, 38(1):133-149.) [8] 王希忠, 曲家兴, 马春光, 等. 一种适用于非结构化数据的改进细粒度加密方法[J]. 计算机应用研究, 2014, 31(9):2754-2758.(WANG X Z, QU J X, MA C G, et al. Unstructured data encryption using improved fine-grained method[J]. Application Research of Computers, 2014, 31(9):2754-2758.) [9] 谭鹏许, 陈越, 兰巨龙, 等. 用于云存储的安全容错编码[J]. 通信学报, 2014, 35(3):109-115.(TAN P X, CHEN Y, LAN J L, et al. Secure fault-tolerant code for cloud storage[J]. Journal on Communications, 2014, 35(3):109-115.) [10] 关志涛, 杨亭亭, 徐茹枝, 等. 面向云存储的基于属性加密的多授权中心访问控制方案[J]. 通信学报, 2015, 36(6):2015142-1-2015142-11.(GUAN Z T, YANG T T, XU R Z, et al. Multi-authority attribute-based encryption access control model for cloud storage[J]. Journal on Communications, 2011, 22(1):2015142-1-2015142-11.) [11] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1):71-83.(FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.) [12] 周彦伟, 吴振强, 杨波. 多样化的可控匿名通信系统[J]. 通信学报, 2015, 36(6):2015138-1-2015138-11.(ZHOU Y W, WU Z Q, YANG B. Diversity of controllable anonymous communication system[J]. Journal on Communications, 2015, 36(6):2015138-1-2015138-11.) [13] 傅颖勋, 罗圣美, 舒继武. 一种云存储环境下的安全网盘系统[J]. 软件学报, 2014, 25(8):1831-1843.(FU Y X, LUO S M, SHU J W. Secure online storage system based on cloud storage environment[J]. Journal of Software, 2014, 25(8):1831-1843.) [14] 刘婷婷. 面向云计算的数据安全保护关键技术研究[D]. 郑州:信息工程大学, 2013:28-38.(LIU T T. Research on key technologies of data security towards cloud computing[D]. Zhengzhou:Information Engineering University, 2013:28-38.) [15] 王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述. 软件学报, 2015, 26(5):1129-1150.(WANG Y D, YANG J H, XU C, et al. Survey on access control technologies for cloud computing[J]. Journal of Software, 2015, 26(5):1129-1150.) [16] da FONSECA N L S, BOUTABA R. Cloud Services, Networking, and Management[M]. New York:Wiley, 2015:153-190. [17] BHUTADA A P, MAGAR S L. Executing DES algorithm in cloud for data protection[J]. International Journal of Innovative Research in Engineering and Technology, 2015, 1(1):15-19. [18] 余能海, 郝卓, 徐甲甲, 等. 云安全研究进展综述[J]. 电子学报, 2013, 41(2):371-381.(YU N H, HAO Z, XU J J, et al. Review of cloud computing security[J]. Acta Electronica Sinica, 2013, 41(2):371-381.) [19] 余星, 胡德敏, 黄超. 细粒度云存储数据完整性检测方法[J]. 计算机应用, 2014, 34(1):27-30.(YU X, HU D M, HUANG C. Integrity check method for fine-grained cloud storage data[J]. Journal of Computer Applications, 2014, 34(1):27-30.) |