[1] ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Communications of the ACM, 2010, 53(4): 50-58. [2] GHEMAWAT S, GOBIOFF H, LEUNG S-T. The Google file system [C]// Proceeding of the 19th ACM Symposium on Operating Systems Principles. New York: ACM, 2003: 29-43. [3] MODI C, PATEL D, BORISANIYA B, et al. A survey on security issues and solutions at different layers of cloud computing [J]. The journal of supercomputing, 2013, 63(2): 561-592. [4] 杨健,汪海航,王剑,等.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479.(YANG J, WANG H H, WANG J, et al. Survey on some security issues of cloud computing [J]. Journal of Chinese computer systems, 2012, 33(3): 472-479.) [5] BHADAURIA R, CHAKI R, CHAKI N, et al. Security issues in cloud computing [J]. Acta technica corviniensis-bulletin of engineering, 2014, 7(4): 159. [6] WANG W, LI Z, OWENS R, et al. Secure and efficient access to outsourced data [C]// Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009: 55-66. [7] AGRAWAL R, KIERNAN J, BLUNDO C, et al. Efficient key management for enforcing access control in outsourced scenarios [C]// Proceedings of the IFIP International Conference on Information Security. Berlin: Springer, 2009: 364-375. [8] ATALLAH M J, BLANTON M, FAZIO N, et al. Dynamic and efficient key management for access hierarchies [J]. ACM transactions on information and system security, 2009, 12(18): 1-43. [9] WALLNER D, HARDER E, AGEE R, et al. Key management for multicast: issues and architectures, RFC 2627 [S]. [S.l.]: IETF, 1999. [10] ZHOU M, MU Y, SUSILO W, et al. Privacy enhanced data outsourcing in the cloud [J]. Journal of network and computer applications, 2012, 35(4): 1367-1373. [11] DAMIANI E, JAJODIA S, FORESTI S, et al. Key management for multi-user encrypted databases [C]// Proceedings of the 2005 ACM Workshop on Storage Security and Survivability. New York: ACM, 2005: 74-83. [12] KALLAHALLA M, RIEDEL E, SWAMINATHAN R, et al. Plutus: scalable secure file sharing on untrusted storage [C]// Proceedings of the 2nd USENIX Conference on File and Storage Technologies. Berkeley, CA: USENIX Association, 2003: 29-42. [13] GOH E J, SHACHAM H, MODADUGU N, et al. SiRiUS: securing remote untrusted storage [C]// Proceedings of the 2003 Symposium on Network and Distributed System Security. Reston, VA: The Internet Society, 2003: 131-145. [14] VIMERCATI S, FORESTI S, JAJODIA S, et al. Over-encryption: management of access control evolution on outsourced data [C]// Proceedings of the 33rd International Conference on Very Large Data Bases. New York: ACM, 2007: 123-134. [15] CHEN T, HUANG J. A novel key management scheme for dynamic access control in a user hierarchy [J]. Applied mathematics and computation, 2005, 162(1): 339-351. |