[1]YUMEREFENDI A R, CHASE J S. Strong accountability for network storage [J]. ACM Transactions on Storage, 2007, 3(3): 6-6.[2]KUBIATOWICZ J, BINDEL D, CHEN Y, et al. OceanStore: An architecture for global-scale persistent storage [C]// Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems. New York: ACM Press, 2000: 190-201.[3]MAHESHWARI U, VINGRALEK R, SHAPIRO W. How to build a trusted database system on untrusted storage [C]// OSDI'00: Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation. Berkeley, CA: USENIX Association, 2000: 10-10.[4]ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores [C]// CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007: 598-609.[5]ATENIESE G, PIETRO R D, MANCINI L V, et al. Scalable and efficient provable data possession [C]// SecureComm'08: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York: ACM Press, 2008: 1-10.[6]ATENIESE G, KAMARA S, KATZ J. Proofs of storage from homomorphic identification protocols [C]// ASIACRYPT'09: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer-Verlag, 2009: 319-333.[7]CURTMOLA R, KHAN O, BURNS R, et al. MR-PDP: Multiple-replica provable data possession [C]// The 28th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2008: 411-420.[8]SHAH M A, BAKER M, MOGUL J C, et al. Auditing to keep online storage services honest [C]// HOTOS'07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems. Berkeley, CA: USENIX Association, 2007: 1-6.[9]ZHU Y, WANG H, HU Z, et al. Efficient provable data possession for hybrid clouds [C]// CCS'10: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM Press, 2010: 756-758.[10]GHEMAWAT S, GOBIOFF H, LEUNG S-T. The Google file system [C]// Proceedings of the 19th ACM Symposium on Operating Systems Principles. New York: ACM Press, 2003: 29-43.[11]刘鹏.云计算[M].北京:电子工业出版社,2010.[12]CHANG E-C, JIA X. Remote integrity check with dishonest storage server [C]// Proceedings of the 13th European Symposium on Research in Computer Security. Berlin: Springer-Verlag, 2008: 223-237.[13]BURROWS M, ABADI M, NEEDHAM R M. A logic of authentication [J]. ACM Transactions on Computer Systems, 1990, 8(1): 233-271.[14]SYVERSON P F, van OORSCHOT P C. On unifying some cryptographic protocol logics [C]// SP'94: Proceedings of the 1994 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1994: 14-28.[15]冯登国.安全协议——理论与实践[M].北京:清华大学出版社,2011.[16]赵晓明,孟庆超,刘军.基于SVO逻辑的X.509协议安全性分析[J].军事通信技术,2007,28(3):63-67.[17]EASTLAKE D, JONES P. RFC 3174: US Secure Hash Algorithm 1 (SHA1) [S], 2001.[18]DESWARTE Y, QUISQUATER J-J, SADANE A. Remote integrity checking: How to trust files stored on untrusted servers [C]// Proceedings of 2004 Conference on Integrity and Internal Control in Information Systems. Berlin: Springer-Verlag, 2004: 1-11. |