[1] 杨娜.云计算与云存储技术研究[J].黑龙江科学,2014(12):234-234.(YAN N. Research on cloud computing and cloud storage technology[J]. Heilongjiang Science, 2014(12):234-234.)
[2] SUN W, LIU X, LOU W, et al. Catch you if you lie to me:efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data[C]//Proceedings of the 2015 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE, 2015:2110-2118.
[3] LIU X, ZHANG Y, WANG B, et al. Mona:secure multiowner data sharing for dynamic groups in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6):1182-1191.
[4] 陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(s1):19-25.(CHEN L X, XU L. Research on data hold and recovery technology in cloud storage service[J]. Journal of Computer Research and Development, 2012, 49(s1):19-25.)
[5] LIU J, HUANG K, RONG H, et al. Privacy-preserving public auditing for regenerating-code-based cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7):1513-1528.
[6] XIANG T, LI X, CHEN F, et al. Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud[J]. Journal of Parallel and Distributed Computing, 2018, 112:97-107.
[7] 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.(TAN S, JIA Y, HAN W H, Research and development of data integrity proof in cloud storage[J]. Chinese Journal of Computers, 2015, 38(1):164-177.)
[8] SHEN W, QIN J, YU J, et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(2):331-346.
[9] ATENIESES G, BURNS R, CURTMOL R, et al. Provable data possession at untrusted stores[C]//Proceedings of the 2007 ACM Conference on Computer and Communications Security. New York:ACM, 2007:598-609.
[10] ZHU Y, HU H, AHN G J, et al. Cooperative provable data possession for integrity verification in multicloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12):2231-2244.
[11] 张毅.云存储服务中可证明数据持有及恢复技术分析[J].电子设计技术,2014(2):25-33.(ZHANG Y. Data storage and recovery technology analysis in cloud storage services[J]. Electronic Design Technology, 2014(2):25-33.)
[12] 徐葵.云存储环境下数据持有性审计技术研究与应用[D].长沙:湖南大学,2013:32-39.(XU K. Research and application of data holding audit technology in cloud storage environment[D]. Changsha:Hunan University, 2013:32-39.)
[13] YU Y, NI J, WU W, et al. Provable data possession supporting secure data transfer for cloud storage[C]//Proceedings of the 2016 International Conference on Broadband and Wireless Computing. Piscataway, NJ:IEEE, 2016:88-96.
[14] HAN J, SUSILO W, MU Y, et al. Attribute-based data transfer with filtering scheme in cloud computing[J]. Computer Journal, 2014, 57(4):579-591.
[15] KLONOWSKI M, PRZYKUCKI M, STRUMINSKI T. Data deletion with provable security[C]//WISA 2008:Proceedings of the 2008 International Workshop on Information Security Applications. Berlin:Springer, 2008:240-255.
[16] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.(FENG D G, ZHANG M, ZHANG Y, et al. Cloud computing security research[J]. Journal of Software, 2011, 22(1):71-83.)
[17] Wikipedia. Communication complexity[EB/OL].[2018-10-12]. http://en.wikipedia.org/wiki/Communicationcomplexity.
[18] CHEN F, XIANG T, YANG Y, et al. Secure cloud storage hits distributed string equality checking:more efficient, conceptually simpler, and provably secure[C]//Proceedings of the 2014 IEEE Conference on Computer Communications. Piscataway, NJ IEEE, 2014:2389-2397.
[19] XUE L, NI J, LI Y, et al. Provable data transfer from provable data possession and deletion in cloud storage[J]. Computer Standards and Interfaces, 2016, 54(1):46-54.
[20] WANG C, CHOW S S M, WANG Q, et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013, 62(2):362-375. |