[1] 俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2013,41(2):371-381.(YU N H, HE Z, XU J J, et al. Review of cloud computing security[J]. Acta Electronica Sinica, 2013, 41(2):371-381.) [2] 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409.(LI H, SUN W H, LI F H, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7):1397-1409.) [3] BARSOUM A F, HASAN M A. Provable multicopy dynamic data possession in cloud computing systems[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(3):485-497. [4] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 2007 ACM Conference on Computer and Communications Security. New York:ACM, 2007:598-609. [5] ATENIESE G, PIETRO R D, MANCINI L V, et al. Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York:ACM, 2008:Article No. 9. [6] ERWAY C C, PAPAMANTHOU C, TAMASSIA R. Dynamic provable data possession[J]. ACM Transactions on Information & System Security, 2009, 17(4):213-222. [7] JUELS A, KALISKI B S. PORs:proofs of retrievability for large files[C]//Proceedings of the 2007 ACM Conference on Computer and Communications Security. New York:ACM, 2007:584-597. [8] SHACHAM H, WATERS B. Compact proofs of retrievability[C]//ASIACRYPT'08:Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology. Berlin:Springer, 2008:90-107. [9] WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel & Distributed Systems, 2011, 22(5):847-859. [10] 李勇,姚戈,雷丽楠,等.基于多分支路径树的云存储数据完整性验证机制[J].清华大学学报(自然科学版),2016,56(5):504-510.(LI Y, YAO G, LEI L N, et al. LBT-based cloud data integrity verification scheme[J]. Journal of Tsinghua University (Science and Technology), 2016, 56(5):504-510.) [11] WANG H. Identity-based distributed provable data possession in multicloud Storage[J]. IEEE Transactions on Services Computing, 2015, 8(2):328-340. [12] CHEN L. Using algebraic signatures to check data possession in cloud storage[J]. Future Generation Computer Systems, 2013, 29(7):1709-1715. [13] JENSEN C S, LIN D, OOI B C. Query and update efficient B+-tree based indexing of moving objects[C]//Proceedings of the Thirtieth International Conference on Very Large Data Bases. Amsterdam:Elsevier, 2004:768-779. [14] VAPNIK V N. The Nature of Statistical Learning Theory[M]. Berlin:Springer, 2000:988-999. [15] WANG H, ZHANG Y. On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage[J]. IEEE Transactions on Parallel & Distributed Systems, 2014, 25(1):264-267. [16] BARSOUM A F, HASAN M A. Provable multicopy dynamic data possession in cloud computing systems[J]. IEEE Transactions on Information Forensics & Security, 2015, 10(3):485-497. |