[1] MELL P, GRANCE T. The NIST definition of cloud computing[J]. Communications of the ACM, 2011, 53(6):50. [2] SHARMA R, TRIVEDI R K. Literature review:cloud computing-security issues, solution and technologies[J]. International Journal of Engineering Research, 2014, 3(4):221-225. [3] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. (FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.) [4] 金瑜,王凡,赵红武,等.云计算环境下信任机制综述[J].小型微型计算机系统,2016,37(1):1-11. (JIN Y, WANG F, ZHAO H W, et al. Survey on trust mechanisms in the environment of cloud computing[J]. Journal of Chinese Computer Systems, 2016, 37(1):1-11.) [5] 苏金树,曹丹,王小峰,等.属性基加密机制[J].软件学报,2011,22(6):1299-1315. (SU J S, CAO D, WANG X F, et.al. Attribute-based encryption schemes[J]. Journal of Software, 2011, 22(6):1299-1315.). [6] SAHAI A, WATERS B. Fuzzy identity-based encryption[C]//EUROCRYPT 2005:Proceedings of the 2005 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 3494. Berlin:Springer, 2005:457-473. [7] GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]//CCS'06:Proceedings of the 13th ACM Conference on Computer and Communications Security. New York:ACM, 2006:89-98. [8] BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//SP'07:Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 2007:321-334. [9] OKAMOTO T, TAKASHIMA K. Fully secure functional encryption with general relations from the decisional linear assumption[C]//CRYPTO 2010:Proceedings of the 2010 International Cryptology Conference on Advances in Cryptology, LNCS 6223. Berlin:Springer, 2010:191-208. [10] HOHENBERGER S, WATERS B. Attribute-based encryption with fast decryption[C]//PKC 2013:Proceedings of the 2013 Public-Key Cryptography, LNCS 7778. Berlin:Springer, 2013:162-179. [11] 施荣华,刘鑫,董健,等.云环境下一种基于数据分割的CP-ABE隐私保护方案[J].计算机应用研究,2015,32(2):521-523. (SHI R H, LIU X, DONG J, et al. Privacy protection scheme in cloud computing using CP-ABE based on data partition[J]. Application Research of Computers, 2015, 32(2):521-523.) [12] WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5):847-859. |