[1] LIU S, JIANG Y, STRIEGEL A. Face-to-face proximity estimationusing bluetooth on smartphones[J]. IEEE Transactions on Mobile Computing, 2014, 13(4):811-823. [2] CHU C K, CHOW S S M, TZENG W G, et al. Key-aggregate cryptosystem for scalable data sharing in cloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2):468-477. [3] FU Y, JIANG H, XIAO N, et al. Application-aware local-global source deduplication for cloud backup services of personal storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(5):1155-1165. [4] YANG K, JIA X. Expressive, efficient, and revocable data access control for multi-authority cloud storage[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(7):1735-1744. [5] NARULA S, JAIN A. Cloud computing security:Amazon Web service[C]//Proceedings of the 20155th International Conference on Advanced Computing & Communication Technologies. Piscataway, NJ:IEEE, 2015:501-505. [6] 吴昊, 范九伦, 刘建华, 等. 基于指纹魔方算法的云存储数据保护机制[J]. 电信科学, 2014, 30(11):110-114.(WU H, FAN J L, LIU J H, et al. Cloud storage data protection mechanism based on a fingerprint cube algorithm[J]. Telecommunications Science, 2014, 30(11):110-114.) [7] 郑凯, 朱林, 陈优广. 基于Kademlia的负载平衡云存储算法[J]. 计算机应用, 2015, 35(3):643-647.(ZHENG K, ZHU L, CHEN Y G. Load balancing cloud storage algorithm based on Kademlia[J]. Journal of Computer Applications, 2015, 35(3):643-647.) [8] 林伟伟, 贺品嘉, 刘波. 云存储系统的能耗优化节点管理方法[J]. 华南理工大学学报(自然科学版), 2014, 42(1):104-110.(LIN W W, HE P J, LIU B. Management method of energy consumption optimization nodes in cloud storage system[J]. Journal of South China University of Technology (Natural Science Edition), 2014, 42(1):104-110.) [9] KOSTA S, AUCINAS A, HUI P, et al. ThinkAir:dynamic resource allocation and parallel execution in the cloud for mobile code offloading[C]//Proceedings of the 31st Annual IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2012:945-953. [10] SAARINEN A, SIEKKINEN M, XIAO Y, et al. SmartDiet:offloading popular apps to save energy[J]. ACM SIGCOMM Computer Communication Review, 2012, 42(4):297-298. [11] BARBERA M V, KOSTA S, STEFA J, et al. CloudShield:efficient anti-malware smartphone patching with a P2P network on the cloud[C]//Proceedings of the 2012 IEEE 12th International Conference on Peer-to-Peer Computing. Piscataway, NJ:IEEE, 2012:50-56. [12] DRAGO I, MELLIA M, MUNAFO M M, et al. Inside dropbox:understanding personal cloud storage services[C]//Proceedings of the 2012 ACM Conference on Internet Measurement Conference. New York:ACM, 2012:481-494. |