[1] 熊金波,李凤华,王彦超,等.基于密钥学的云数据确定性删除研究进展[J].通信学报, 2016,37(8):168-184.(XIONG J B, LI F H, WANG Y C, et al. Research progress on cloud data assured deletion based on cryptography[J]. Journal on Communication, 2016, 37(8):168-184.) [2] TANG Q. Timed-Ephemerizer:make assured data appear and disappear[C]//Proceedings of the 2009 ACM Conference on Public Key Infrastructure, Services and Applications. Berlin:Springer, 2009:195-208. [3] TANG Y, LEE P, LUI J. Secure overlay cloud storage with access control and assured deletion[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6):903-916. [4] 张坤,杨超,马建峰,等.基于密文采样分片的云端数据确定性删除方法[J].通信学报,2015,36(11):108-117.(ZHANG K, YANG C, MA J F, et al. Novel cloud data assured deletion approach based on ciphertext sample slice[J]. Journal on Communications, 2015,36(11):108-117.) [5] 曹景源,李立新,李全良,等.云存储环境下生命周期可控的数据销毁模型[J].计算机应用,2017,37(5):1335-1340.(CAO J Y, LI L X, LI Q L, et al. Data destruction model for cloud storage based on lifecycle control[J]. Journal of Computer Applications, 2017, 37(5):1335-1340.) [6] XIONG J B, LI F H, MA J F, et al. A full lifecycle privacy protection scheme for sensitive data in cloud computing[J]. Peer-to-Peer Networking and Applications, 2015, 8(6):1025-1037. [7] GEAMBASU R, KOHNO T, LEVY A, et al. Vanish:increasing data privacy with self-destructing data[C]//Proceedings of the 2009 ACM Conference on USENIX Security Symposium. Berkeley, CA:USENIX Association, 2009:299-316. [8] ZENG L, SHI Z, XU S, et al. SafeVanish:an improved data self-destruction for protecting data privacy[C]//Proceedings of the 2010 IEEE International Conference on Cloud Computing Technology and Science. Piscataway, NJ:IEEE, 2010:521-528. [9] 王丽娜,任正伟,余荣威,等.一种适于云存储的数据确定性删除方法[J].电子学报,2012,40(2):266-272.(WANG L N, REN Z W, YU R W, et al. A data assured deletion approach adapted for cloud storage[J]. Acta Electronica Sinica, 2012, 40(2):266-272.) [10] LI C L, CHEN Y, ZHOU Y Z. A data assured deletion scheme in cloud storage[J]. China Communications, 2014, 11(4):98-110. [11] 熊金波,姚志强,马建峰,等.面向网络内容隐私的基于身份加密的安全自毁方案[J].计算机学报,2014,37(1):140-150.(XIONG J B, YAO Z Q, MA J F, et al. A secure self-destruction scheme with IBE for the Internet content privacy[J]. Chinese Journal of Computers, 2014, 37(1):140-150.) [12] 熊金波,姚志强,马建峰,等.基于属性加密组合文档安全自毁方案[J].电子学报,2014,42(2):366-376.(XIONG J B, YAO Z Q, MA J F, et al. A secure self-destruction scheme for composite document with attribute based encryption[J]. Acta Electronica Sinica, 2014, 42(2):366-376.) [13] WHITE T, CUTTING D. Hadoop:The Definitive Guide[M]. Sebastopol:O'reilly Media, 2009:44-67. [14] DABEK F. A distributed Hash table[D]. Boston:Massachusetts Institute of Technology, 2006:20-84. [15] RHEA S, GODFREY B, KARP B, et al. OpenDHT:a public DHT service and its uses[C]//Proceedings of the 2005 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York:ACM, 2005:73-84. [16] FALKNER J, PIATEK M, JOHN J P, et al. Profiling a million user DHT[C]//Proceedings of the 2007 ACM Conference on Internet Measurement. New York:ACM, 2007:129-134. [17] 彭巧,田有亮.基于多线性Diffie-Hellman问题的秘密共享方案[J].电子学报,2017,45(1):200-205.(PENG Q, TIAN Y L. A secret sharing scheme based on multilinear Diffie-Hellman problem[J]. Acta Electronica Sinica, 2017, 45(1):200-205.) [18] 窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583.(DOU W, WANG H M, JIA Y, et al. A recommendation-based Peer-to-Peer trust model[J]. Journal of Software, 2004, 15(4):571-583.) [19] 冯贵兰,谭良.基于信任度的云存储数据确定性删除方案[J].计算机科学,2014,41(6):108-112.(FENG G L, TAN L. Data assured deletion scheme based on trust value for cloud storage[J]. Computer Science, 2014, 41(6):108-112.) [20] GUO Y, RAO J, CHENG D, et al. IShuffle:improving Hadoop performance with shuffle-on-write[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 28(6):1649-1662. |