[1] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011, 22(1):71-83. (FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.) [2] WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel & Distributed Systems, 2011, 22(5):847-859. [3] 田晖, 陈羽翔, 黄永峰, 等. 云数据持有性审计研究与进展[J]. 计算机科学, 2017, 44(6):8-16. (TIAN H, CHEN Y X, HUANG Y F, et al. Research and development of auditing techniques for cloud data possession[J]. Computer Science, 2017, 44(6):8-16.) [4] DESWARTE Y, QUISQUATER J J, SAIDANE A. Remote integrity checking[C]//Proceedings of the 6th Working Conferenceon Integrity and Internal Control in Information Systems. Berlin:Springer, 2003:1-11. [5] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM, 2007:598-609. [6] ATENIESE G, KAMARA S, KATZ J. Proofs of storage from homomorphic identification protocols[C]//Proceedings of the 2009 International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2009:319-333. [7] ATENIESE G, PIETRO R D, MANCINI L V, et al. Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Net-Works. New York:ACM, 2008:1-10. [8] ERWAY C, PAPAMANTHOU C, TAMASSIA R. Dynamic provable data possession[J]. ACM Transactions on Information and System Security, 2015, 17(4):1-29. [9] JUELS A, KALISKI B S. Pors:proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM, 2007:584-597. [10] DAN B, LYNN B, SHACHAM H. Short signatures from the Weil pairing[J]. Journal of Cryptology, 2004, 17(4):297-319. [11] SHACHAM H, WATERS B. Compact proofs of retrievability[C]//Proceedings of the 2008 International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2008:90-107. [12] WANG C, WANG Q, REN K, et al. Ensuring data storage security in cloud computing[C]//Proceedings of the 200917th International Workshop on Quality of Service. Piscataway, NJ:IEEE, 2009:1-9. [13] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]//Proceedings of the 29th IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2010:1-9. [14] ZHU Y, AHN G J, HU H, et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing, 2013, 6(2):227-238. [15] LIU C, CHEN J, YANG L T, et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(9):2234-2244. [16] LIU C, RANJAN R, YANG C, et al. MuR-DPA:top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud[J]. IEEE Transactions on Computers, 2015, 64(9):2609-2622. [17] van TILBORG, HENK C A, SUSHIL J. Secure hash algorithm[M]. Berlin:Springer, 2011:1116. [18] LIN S. Error control coding[J]. Principles of Mobile Communication, 1983, 44(2):607-610. [19] ADAM E. Pythia-pyrelic 1.0.1[EB/OL].[2018-02-10] https://github.com/ace0/pyrelic. [20] BARRETO P S L M, NAEHRIG M. Pairing-friendly elliptic curves of prime order[C]//Proceedings of the 2005 International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2005:319-331. [21] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM, 2007:598-609. [22] BARSOUM A F, HASAN M A. Provable multicopy dynamic data possession in cloud computing systems[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(3):485-497. |