[1] CHAPMAN C, EMMERICH W, MARQUEZ F G, et al. Software architecture definition for on-demand cloud provisioning[J]. Cluster Computing, 2012, 15(2):79-100. [2] CHEN X, LI J, MA J, et al. New algorithms for secure outsourcing of modular exponentiations[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(9):2386-2396. [3] SHEN Z, TONG Q. The security of cloud computing system enabled by trusted computing technology[C]//ICSPS 2010:Proceedings of the 20102nd International Conference on Signal Processing Systems. Piscataway, NJ:IEEE, 2010:V2-11-V2-15. [4] REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1):69-73. [5] MEZGAR I, RAUSCHECKER U. The challenge of networked enterprises for cloud computing interoperability[J]. Computers in Industry, 2014, 65(4):657-674. [6] TAKABI H, JOSHI J B D, AHN G J. Security and privacy challenges in cloud computing environments[J]. IEEE Security & Privacy, 2010, 8(6):24-31. [7] GENNARO R, GENTRY C, PARNO B. Non-interactive verifiable computing:outsourcing computation to untrusted workers[C]//CRYPTO 2010:Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin:Springer, 2010:465-482. [8] CHEVALLIER-MAMES B, CORON J S, MCCULLAGH N, et al. Secure delegation of elliptic-curve pairing[M]//Smart Card Research and Advanced Application. Berlin:Springer, 2010:24-35. [9] CHEN X, SUSILO W, LI J, et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015, 562:112-121. [10] TIAN H, ZHANG F, REN K. Secure bilinear pairing outsourcing made more efficient and flexible[C]//Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2015:417-426. [11] WANG Y, WU Q, WONG D S, et al. Securely outsourcing exponentiations with single untrusted program for cloud storage[C]//ESORICS 2014:Proceedings of the 19th European Symposium on Research in Computer Security. Berlin:Springer, 2014:326-343. [12] 解理,任艳丽.隐藏访问结构的高效基于属性加密方案[J].西安电子科技大学学报,2015,42(3):97-102.(XIE L, REN Y L. Hidden access structure of efficient encryption scheme based on attribute[J]. Journal of Xidian University, 2015, 42(3):97-102.) [13] HOHENBERGER S, LYSYANSKAYA A. How to securely out-source cryptographic computations[C]//TCC 2005:Proceedings of the Second Theory of Cryptography Conference on Theory of Cryptography. Berlin:Springer, 2005:264-282. |