[1]KHAN A N, KIAH M L M, KHAN S U. et al. Towards secure mobile cloud computing: a survey[EB/OL]. [2010-10-10]. http://sameekhan.org/pub/K_K_2012_FGCS.pdf.[2]DESWARTE Y, QUISQUATER J J, SAIDANE A. Remote integrity checking[C]// IICIS '03: Proceedings of Conference on Integrity and Internal Control in Information Systems. Berlin: Springer, 2003: 1-11.[3]FILHO D, BARRETO P. Demonstrating data possession and un-cheatable data transfer[EB/OL].[2010-10-10]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.8040&rep=rep1&type=pdf.[4]ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007: 598-609.[5]JUELS A, KALISKI B. Pors: proofs of retrievability for large files[C]// CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007: 584-597.[6]ATENIESE G, KAMARA S, KATZ J. Proofs of storage from homomorphic identification protocols[C]// ASIACRYPT '09: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2009: 319-333.[7]CHANG E C, XU J. Remote integrity check with dishonest storage server[C]// ESORICS '08: Proceedings of the 13th European Symposium on Research in Computer Security. Berlin: Springer, 2008: 223-237.[8]SHACHAM H, WATERS B. Compact proofs of retrievability[C]// ASIACRYPT '08: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2008: 90-107.[9]WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// INFOCOM '10: Proceedings of the 29th Conference on Computer Communications. Piscataway, NJ: IEEE Press, 2010: 1-9.[10]GOHEL M, GOHIL B. A new data integrity checking protocol with public verifiability in cloud storage[C]// IFIPTM '2012: Trust Management VI, IFIP Advances in Information and Communication Technology, LNCS 374. Berlin: Springer, 2012: 240-246.[11]HAO Z, ZHONG S, YU N H. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(9): 1432-1437.[12]WANG Q, WANG C, LI J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// ESORICS '09: Proceedings of the 14th European Symposium on Research in Computer Security. Berlin: Springer, 2009: 355-370.[13]QIAN W, CONG W, KUI R, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(5): 847-859.[14]WANG Q, WANG C, KUI R, et al. Toward secure and dependable storage services in cloud computing[J]. IEEE Transactions on Services Computing, 2012, 5(2): 220-232.[15]曹天杰, 张永平, 汪楚娇. 安全协议[M]. 北京: 北京邮电大学出版社, 2009. 129.[16]BAO F, DENG R, ZHU H. Variations of Diffie-Hellman problem[C]// ICICS '03: Proceedings of the 5th International Conference on Information and Communications Security. Berlin: Springer, 2003: 301-312.[17]ERWAY C, ALPTEKIN K, PAPAMANTHOU C, et al. Dynamic provable data possession [C]// CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: ACM Press, 2009: 213-222.[18]BOWERS K D, JUELS A, OPREA A. Proofs of retrievability: theory and implementation[C]// CCSW '09: Proceedings of 2009 ACM Workshop on Cloud Computing Security. New York: ACM Press, 2009: 43-53.[19]BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[C]// ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2001: 514-532.[20]BONEH D, GENTRY C. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Eurocrypt '03: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2003: 416-432. |