[1] HUANG K,ZHANG X,MU Y,et al. EVA:efficient versatile auditing scheme for IoT-based datamarket in jointcloud[J]. IEEE Internet Things Journal,2020,7(2):882-892. [2] 韩静, 李艳平, 禹勇, 等. 用户可动态撤销及数据可实时更新的云审计方案[J]. 软件学报,2020,31(2):578-596.(HAN J,LI Y P,YU Y,et al. Cloud auditing scheme with dynamic revocation of users and real-time updates of data[J]. Journal of Software, 2020,31(2):578-596.) [3] LI F,SHI Y,SHINDE A,et al. Enhanced cyber-physical security in internet of things through energy auditing[J]. IEEE Internet Things Journal,2019,6(3):5224-5231. [4] LIU M,WANG X,YANG C,et al. An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing[J]. International Journal of Distributed Sensor Networks,2017,13(1):1-11. [5] 黄领. 智能仪器仪表技术的运用及发展[J]. 化工设计通讯, 2019,45(10):77-79.(HUANG L. Application and development of intelligent instrumentation technology[J]. Chemical Engineering Design Communications,2019,45(10):77-79) [6] 付安民, 秦宁元, 宋建业, 等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案[J]. 计算机研究与发展,2015,52(10):2353-2362.(FU A M,QIN N Y,SONG J Y,et al. Privacypreserving public auditing for multiple managers shared data in the cloud[J]. Journal of Computer Research and Development,2015, 52(10):2353-2362.) [7] 王雪, 张莉. 中国仪器仪表工程科技2035发展趋势研究[J]. 中国工程科学, 2017,19(1):111-115.(WANG X,ZHANG L. Development trends for China's instrumentation engineering science and technology to 2035[J]. Chinese Journal of Engineering Science,2017,19(1):111-115.) [8] 金瑜, 蔡超, 何亨. 支持用户追溯和轻量的共享云数据审计方案[J]. 计算机应用,2017,37(12):3417-3422.(JIN Y,CAI C,HE H. Scheme of sharing cloud data audit supporting user traceability and lightweight[J]. Journal of Computer Applications,2017,37(12):3417-3422.) [9] LIU M,FAN K,KUMAR N,et al. Hash-balanced binary treebased public auditing in vehicular edge computing and networks[J/OL]. International Journal of Communication Systems,2019(Early Access):No. e4134[2020-03-12]. https://onlinelibrary.wiley.com/doi/abs/10.1002/dac.4134. [10] 邵必林, 李肖俊, 边根庆, 等. 云存储数据完整性审计技术研究综述[J]. 信息网络安全,2019,19(6):28-36.(SHAO B L,LI X J,BIAN G Q,et al. A survey on data integrity auditing technology in cloud storage[J]. Netinfo Security,2019,19(6):28-36.) [11] 王惠峰, 李战怀, 张晓, 等. 云存储中支持失效文件快速查询的批量审计方法[J]. 计算机学报,2017,40(10):2338-2351. (WANG H F, LI Z H, ZHANG X, et al. Batch auditing supporting fast searching invalid files in cloud storage[J]. Chinese Journal of Computers,2017,40(10):2338-2351.) [12] ZHAO J,XU C,CHEN K. Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxy[J]. Journal of Information Security and Applications,2019,47:39-49. [13] FAN K,LIU M,DONG G,et al. Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme[J]. The Journal of Supercomputing,2020,76(7):4857-4883. [14] BOTTA A,DE DONATO W,PERSICO V,et al. Integration of cloud computing and Internet of Things:a survey[J]. Future Generation Computer Systems,2016,56:684-700. [15] DIÍAZ M,MARTÍN C,RUBIO B. State-of-the-art,challenges, and open issues in the integration of internet of things and cloud computing[J]. Journal of Network and Computer Applications, 2016,67:99-117. [16] ATENIESE G,BURNS R,CURTMOLA R,et al. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM,2007:598-609. [17] JUELS A,KALISKI B S. PORs:proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM,2007:584-597. [18] WANG C,REN K,LOU W,et al. Toward publicly auditable secure cloud data storage services[J]. IEEE Network,2010,24(4):19-24. [19] WANG Q,WANG C,REN K,et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859. [20] WANG C,CHOW S S M,WANG Q,et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers,2013,62(2):362-375. [21] YANG K, JIA X. An efficient and secure dynamic auditing protocol for data storage in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems,2013,24(9):1717-1726. [22] LI Y,YU Y,YANG B,et al. Privacy preserving cloud data auditing with efficient key update[J]. Future Generation Computer Systems,2016,78(Pt 2):789-798. [23] ZHU Y,AHN G J,HU H,et al. Dynamic audit services for outsourced storages in clouds[J]. IEEE Transactions on Services Computing,2013,6(2):227-238. [24] LIU C,CHEN J,YANG L T,et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable finegrained updates[J]. IEEE Transactions on Parallel and Distributed Systems,2014,25(9):2234-2244. [25] TIAN H,CHEN Y,CHANG C C,et al. Dynamic-hash-table based public auditing for secure cloud storage[J]. IEEE Transactions on Services Computing,2017,10(5):701-714. [26] YU J,WANG H. Strong key-exposure resilient auditing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security,2017,12(8):1931-1940. [27] SHEN J,SHEN J,CHEN X,et al. An efficient public auditing protocol with novel dynamic structure for cloud data[J]. IEEE Transactions on Information Forensics and Security,2017,12(10):2402-2415. [28] LI J,ZHANG L,LIU J K,et al. Privacy-preserving public auditing protocol for low-performance end devices in cloud[J]. IEEE Transactions on Information Forensics and Security,2016, 11(11):2572-2583. [29] WANG H,HE D,TANG S. Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud[J]. IEEE Transactions on Information Forensics and Security,2016, 11(6):1165-1176. [30] SHEN W, YU J, XIA H, et al. Light-weight and privacypreserving secure cloud auditing scheme for group users via the third party medium[J]. Journal of Network and Computer Applications,2017,82:56-64. [31] ZHANG Y,XU C,LIANG X,et al. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation[J]. IEEE Transactions on Information Forensics and Security,2017,12(3):676-688. [32] RABANINEJAD R,AHMADIAN ATTARI M,ASSAR M R,et al. Comments on a lightweight cloud auditing scheme:security analysis and improvement[J]. Journal of Network and Computer Applications,2019,139:49-56. [33] YANG C, CHEN X, XIANG Y. Blockchain-based publicly verifiable data deletion scheme for cloud storage[J]. Journal of Network and Computer Applications,2018,103:185-193. [34] BLOOM B H. Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM,1970,13(7):422-426. [35] BAI P, ZHANG W, WANG X, et al. Homomorphic authentication based on rank-based Merkle hash tree[C]//Proceedings of the 2018 International Conference on Emerging Internetworking, Data and Web Technologies, LNDECT 17. Cham:Springer,2018:841-848. [36] FAN L,CAO P,ALMEIDA J,et al. Summary cache:a scalable wide-area Web cache sharing protocol[C]//Proceedings of the 1998 ACM SIGCOMM Conference on Applications,Technologies, Architectures,and Protocols for Computer Communication. New York:ACM,1998:254-265. |