[1]ZHOU E, LI Z, GUO H, et al.An improved data integrity verification scheme in cloud storage system [J]. Acta Electronica Sinica, 2014,42(1):150-154.(周恩光,李舟军,郭华,等.一个改进的云存储数据完整性验证方案[J].电子学报,2014,42(1):150-154.)
[2]FU Y, LUO S, SHU J. Survey of secure cloud storage system and key technologies [J]. Journal of Computer Research and Development, 2013,50(1):136-145.(傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1):136-145.)
[3]WILLIANMS D, JAMJOOM H, LIU Y, et al.Overdriver: handling memory overload in an oversubscribed cloud [C]// Proceedings of the 2011 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York: ACM, 2011: 205-216.
[4]WANG N, YANG Y, MENG K, et al.A customer experience-based cost minimization strategy of storing data in cloud computing [J]. Acta Electronica Sinica, 2014,42(1):20-27.(王宁,杨扬,孟坤,等.云计算环境下基于用户体验的成本最优存储策略研究[J].电子学报,2014,42(1):20-27.)
[5]WU J, FU J, PING L, et al.Study on the P2P cloud storage system [J]. Acta Electronica Sinica, 2011,39(5):1100-1107.(吴吉义,傅建庆,平玲娣,等.一种对等结构的云存储系统研究[J].电子学报,2011,39(5):1100-1107.)
[6]HONG C, ZHANG M, FENG D. Achieving efficient dynamic cryptographic access control in cloud storage [J]. Journal on Communications, 2011,32(7):125-132.( 洪澄,张敏,冯登国.面向云存储的高效动态密文访问控制方法[J].通信学报,2011,32(7):125-132.)
[7]XU X, ZHOU J, YANG G. Data privacy protection mechanism for cloud storage based on data partition and classification [J]. Computer Science, 2013,40(2):98-102.(徐小龙,周静岚,杨庚.一种基于数据分割与分级的云存储数据隐私保护机制[J].计算机科学,2013,40(2):98-102.)
[8]BERALDI R, MASSRI K, ALNUWEIRI H. Erasure-coding based dissemination protocol for mobile clouds [C]// 3PGCIC: 2013 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Piscataway: IEEE Press, 2013:416-421.
[9]STEFANOV E, VAN D, JUELS A, et al.Iris: a scalable cloud file system with efficient integrity checks [C]// Proceedings of the 28th Annual Computer Security Applications Conference. New York: ACM, 2012:229-238.
[10]JONES M. Anatomy of Linux journaling file systems [J]. IBM developerWorks, 2008,32(5):412-418.
[11]LEUNG A, PASUPATHY S, GOODSON G, et al.Measurement and analysis of large-scale network file system workloads [C]// ATC 08: USENIX 2008 Annual Technical Conference on Annual Technical Conference. Berkeley: USENIX Association, 2008:213-226.
[12]HUANG C, SIMITCI H, XU Y, et al.Erasure coding in windows azure storage [C]// Proceedings of the 2012 USENIX conference on Annual Technical Conference. Berkeley: USENIX Association, 2012:82-96.
[13]JEDDELOH J, KEETH B. Hybrid memory cube new DRAM architecture increases density and performance [C]// Proceedings of the 2012 Symposium on VLSI Technology. Piscataway: IEEE Press, 2012:87-88.
[14]JIN P, OU Y, HARDER T, et al.AD-LRU: an efficient buffer replacement algorithm for flash-based databases [J]. Data and Knowledge Engineering, 2012,7(2):83-102.
[15]FERNNDEZ-CARDEOSA G, TORRE-DIEZ I, LPEZ-CORONADO M, et al.Analysis of cloud-based solutions on EHRs systems in different scenarios [J]. Journal of Medical Systems, 2012,36(6):3777-3782. |