电子学报 ›› 2022, Vol. 50 ›› Issue (10): 2542-2560.DOI: 10.12263/DZXB.20220204
任正伟1,2, 李雪婷1, 王丽娜3, 童言4(), 徐士伟4(
), 丁炜5(
)
收稿日期:
2022-02-25
修回日期:
2022-06-15
出版日期:
2022-10-25
作者简介:
基金资助:
REN Zheng-wei1,2, LI Xue-ting1, WANG Li-na3, TONG Yan4(), XU Shi-wei4(
), DING Wei5(
)
Received:
2022-02-25
Revised:
2022-06-15
Online:
2022-10-25
Published:
2022-10-11
摘要:
云存储的外包特性使得数据的所有权与管理权/持有权分离,导致数据安全成为用户关注的焦点之一.作为云存储中数据安全的一个组成部分和数据生命周期的最后一个阶段,外包数据确定性删除研究的是如何证实留存于云服务提供商、数据使用者和网络中的数据是失效、不可恢复的,从而防止数据滥用和隐私泄漏等安全隐患.其主要研究思路是利用密码学相关理论和技术将数据删除问题转换为密钥的安全管控和删除问题,即在假定加密算法是安全的情况下,安全管控和删除密钥将使得外包的密文数据不能被解密和访问,从而实现数据在计算上的删除.本文首先介绍了外包数据确定性删除的研究背景及其主要研究思路,并阐述了作者对于该问题的思考,包括该问题的模型及其蕴含的关键科学问题;之后,分类梳理了国内外研究现状,分析了每类方法的特点和发展趋势;接着,通过几个有着众多用户的应用案例展示了外包数据确定性删除所预想的部分功能;最后,探讨了该领域未来的研究方向.
中图分类号:
任正伟, 李雪婷, 王丽娜, 童言, 徐士伟, 丁炜. 云存储中外包数据确定性删除研究综述[J]. 电子学报, 2022, 50(10): 2542-2560.
REN Zheng-wei, LI Xue-ting, WANG Li-na, TONG Yan, XU Shi-wei, DING Wei. A Survey on Assured Deletion of Outsourced Data in Cloud Storage[J]. Acta Electronica Sinica, 2022, 50(10): 2542-2560.
1 | 丁滟, 王怀民, 史佩昌, 等. 可信云服务[J]. 计算机学报, 2015, 38(1): 133-149. |
DING Y, WANG H M, SHI P C, et al. Trusted cloud service[J]. Chinese Journal of Computers, 2015, 38(1): 133-149. (in Chinese) | |
2 | 冯朝胜, 秦志光, 袁丁. 云数据安全存储技术[J]. 计算机学报, 2015, 38(1): 150-163. |
FENG C S, QIN Z G, YUAN D. Techniques of secure storage for cloud data[J]. Chinese Journal of Computers, 2015, 38(1): 150-163. (in Chinese) | |
3 | 田洪亮, 张勇, 李超, 等. 云环境下数据库机密性保护技术研究综述[J]. 计算机学报, 2017, 40(10): 2245-2270. |
TIAN H L, ZHANG Y, LI C, et al. A survey of confidentiality protection for cloud databases[J]. Chinese Journal of Computers, 2017, 40(10): 2245-2270. (in Chinese) | |
4 | SUN W H, ZHANG R D, LOU W J, et al. REARGUARD: Secure keyword search using trusted hardware[C]//Proceedings of the 38th IEEE Conference on Computer Communications(INFOCOM'18), Honolulu: IEEE, 2018: 801-809. |
5 | 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015, 38(1): 164-177. |
TAN S, JIA Y, HAN W H. Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015, 38(1): 164-177. (in Chinese) | |
6 | REN Z W, WANG L N, WANG Q, et al. Dynamic proofs of retrievability for coded cloud storage systems[J]. IEEE Transactions on Services Computing, 2018, 11(4): 685-698. |
7 | KOSBA A, PAPAMANTHOU C, SHI E. xJsnark: A framework for efficient verifiable computation[C]//Proceedings of the 39th IEEE Symposium on Security and Privacy(S&P'18). San Francisco: IEEE, 2018: 944-961. |
8 | 王丽娜, 任正伟, 余荣威, 等. 一种适于云存储的数据确定性删除方法[J]. 电子学报, 2012, 40(2): 266-272. |
WANG L N, REN Z W, YU R W, et al. A data assured deletion approach adapted for cloud storage[J]. Acta Electronica Sinica, 2012, 40(2): 266-272. (in Chinese) | |
9 | RAMOKAPANE K M, RASHID A, SUCH J M. Assured deletion in the cloud: Requirements, challenges and future directions[C]//Proceedings of 2016 ACM on Cloud Computing Security Workshop(CCSW'16). Vienna: ACM, 2016: 97-108. |
10 | 魏凯敏, 翁健, 任奎. 大数据安全保护技术综述[J]. 网络与信息安全学报, 2016, 2(4): 00046-1-00046-11. |
WEI K M, WENG J, REN K. Data security and protection techniques in big data: A survey[J]. Chinese Journal of Network and Information Security, 2016, 2(4): 1-11. (in Chinese) | |
11 | 熊金波, 李凤华, 王彦超, 等. 基于密码学的云数据确定性删除研究进展[J]. 通信学报, 2016, 37(8): 167-184. |
XIONG J B, LI F H, WANG Y C, et al. Research progress on cloud data assured deletion based on cryptography[J]. Journal on Communications, 2016, 37(8): 167-184. (in Chinese) | |
12 | ZHENG D, XUE L, YU C, et al. Toward assured data deletion in cloud storage[J]. IEEE Network, 2020, 34(3): 101-107 |
13 | GEAMBASU R, KOHNO T, LEVY A A, et al. Vanish: Increasing data privacy with self-destructing data[C]//Proceedings of the 18th USENIX Security Symposium(USENIX Security'09). Montreal: USENIX Association, 2009: 299-316. |
14 | GEAMBASU R, KOHNO T, KRISHNAMURTHY A, et al. New Directions for Self-Destructing Data Systems[R]. Technical Report, University of Washington, 2011, UW-CSE-11-08-01. |
15 | 熊金波, 姚志强, 马建峰, 等. 基于属性加密的组合文档安全自毁方案[J]. 电子学报, 2014, 42(2): 366-376. |
XIONG J B, YAO Z Q, MA J F, et al. A secure self-destruction scheme for composite documents with attribute based encryption[J]. Acta Electronica Sinica, 2014, 42(2): 366-376. (in Chinese) | |
16 | 熊金波, 姚志强, 马建峰, 等. 面向网络内容隐私的基于身份加密的安全自毁方案[J]. 计算机学报, 2014, 37(1): 139-150. |
XIONG J B, YAO Z Q, MA J F, et al. A secure self-destruction scheme with IBE for the Internet content privacy[J]. Chinese Journal of Computers, 2014, 37(1): 139-150. (in Chinese) | |
17 | 姚志强, 熊金波, 马建峰, 等. 云计算中一种安全的电子文档自毁方案[J]. 计算机研究与发展, 2014, 51(7): 1417-1423. |
YAO Z Q, XIONG J B, MA J F, et al. A secure electronic document self-destructing scheme in cloud computing[J]. Journal of Computer Research and Development, 2014, 51(7): 1417-1423. (in Chinese) | |
18 | XIONG J B, LIU X M, YAO Z Q, et al. A secure data self-destructing scheme in cloud computing[J]. IEEE Transactions on Cloud Computing, 2014, 2(4): 448-458. |
19 | FERNANDES M, RODRIGUES SILVA A, GONÇALVES A. Specification of personal data protection requirements-analysis of legal requirements from the GDPR regulation[C]//Proceedings of the 20th International Conference on Enterprise Information Systems(ICEIS'18). Madeira: SCITEPRESS-Science and Technology Publications, 2018: 398-405. |
20 | LINDQVIST J. New challenges to personal data processing agreements: Is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things?[J]. International Journal of Law and Information Technology, 2017, 26(1): 45-63. |
21 | HUA M Y, ZHAO Y Y, JIANG T. Secure data deletion in cloud storage: A survey[J]. International Journal of Embedded Systems, 2020, 12(2): 253-265. |
22 | 中华人民共和国国家互联网信息办公室. 全国人民代表大会常务委员会关于加强网络信息保护的决定[EB/OL]. (2021-12-29)[2022-02-21]. . |
23 | 中华人民共和国国家互联网信息办公室. 中华人民共和国网络安全法[EB/OL]. (2016-11-07)[2022-02-21]. . |
24 | 中华人民共和国国家互联网信息办公室. 中华人民共和国个人信息保护法[EB/OL]. (2021-08-20)[2022-02-21]. . |
25 | 刘田甜, 李超, 胡庆成, 等. 云环境下多副本管理综述[J]. 计算机研究与发展, 2011, 48(S3): 254-260. |
LIU T T, LI C, HU Q C, et al. Multiple-replicas management in the cloud environment[J]. Journal of Computer Research and Development, 2011, 48(S3): 254-260. (in Chinese) | |
26 | REARDON J, BASIN D, CAPKUN S. SoK: secure data deletion[C]//Proceedings of the 34th IEEE Symposium on Security and Privacy(S&P'13). Berkeley: IEEE, 2013: 301-315. |
27 | SHU J L, ZHANG Y Y, LI J R, et al. Why data deletion fails? A study on deletion flaws and data remanence in Android systems[J]. ACM Transactions on Embedded Computing Systems, 2017, 16(2): 61(1-22. |
28 | LEOM M D, CHOO K K R, HUNT R. Remote wiping and secure deletion on mobile devices: A review[J]. Journal of Forensic Sciences, 2016, 61(6): 1473-1492. |
29 | YANG L, WEI T, ZHANG F W, et al. SADUS: Secure data deletion in user space for mobile devices[J]. Computers & Security, 2018, 77: 612-626. |
30 | JIA S J, XIA L N, CHEN B, et al. NFPS: Adding undetectable secure deletion to flash translation layer[C]//Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. Xi'an: ACM, 2016: 305-315. |
31 | WEI M, GRUPP L M, SPADA F E, et al. Reliably erasing data from flash-based solid state drives[C]//Proceedings of the 9th USENIX Conference on File and Stroage Technologies(FAST'11). San Jose: ACM, 2011: 105-117. |
32 | LIU C, AGHAEI KHOUZANI H, YANG C M. ErasuCrypto: A light-weight secure data deletion scheme for solid state drives[J]. Proceedings on Privacy Enhancing Technologies, 2017, 2017(1): 132-148. |
33 | XIONG J B, CHEN L, BHUIYAN M Z A, et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis[J]. Future Generation Computer Systems, 2020, 111: 741-753. |
34 | DIESBURG S, MEYERS C, STANOVICH M, et al. TrueErase: Leveraging an auxiliary data path for per-file secure deletion[J]. ACM Transactions on Storage, 2016, 12(4): 18(1-37. |
35 | ZHANG Q L, JIA S J, CHANG B, et al. Ensuring data confidentiality via plausibly deniable encryption and secure deletion-a survey[J]. Cybersecurity, 2018, 1(1): 1-20. |
36 | CHEN S H, YANG M C, CHANG Y H, et al. Enabling file-oriented fast secure deletion on shingled magnetic recording drives[C]//Proceedings of the 56th Annual Design Automation Conference(DAC'19).Las Vegas: ACM, 2019: 103(1-6. |
37 | LI B Z, DU D H C. TASecure: Temperature-aware secure deletion scheme for solid state drives[C]//Proceedings of the 2019 on Great Lakes Symposium on VLSI(GLSVLSI'19). Tysons Corner: ACM, 2019: 275-278. |
38 | LI C L, CHEN Y, ZHOU Y Z. A data assured deletion scheme in cloud storage[J]. China Communications, 2014, 11(4): 98-110. |
39 | XIONG J B, LI F H, MA J F, et al. A full lifecycle privacy protection scheme for sensitive data in cloud computing[J]. Peer-to-Peer Networking and Applications, 2015, 8(6): 1025-1037. |
40 | 张坤, 杨超, 马建峰, 等. 基于密文采样分片的云端数据确定性删除方法[J]. 通信学报, 2015, 36(11): 108 - 117. |
ZHANG K, YANG C, MA J F, et al. Novel cloud data assured deletion approach based on ciphertext sample slice[J]. Journal on Communications, 2015, 36(11): 108-117. (in Chinese) | |
41 | 王敏燊, 熊金波, 林倩, 等. 基于密钥分发和密文抽样的云数据确定性删除方案[J]. 计算机应用, 2018, 38(1): 194-200. |
WANG M S, XIONG J B, LIN Q, et al. Cloud data assured deletion scheme based on key distribution and ciphertext sampling[J]. Journal of Computer Applications, 2018, 38(1): 194-200. (in Chinese) | |
42 | SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613. |
43 | ZARRAS A, KOHLS K, DURMUTH M, et al. Neuralyzer: Flexible expiration times for the revocation of online data[C]//Proceedings of the 6th ACM Conference on Data and Application Security and Privacy(CODASPY'16). New Orleans: ACM, 2016: 14-25. |
44 | 熊金波, 沈薇薇, 黄阳群, 等. 云环境下的数据多副本安全共享与关联删除方案[J]. 通信学报, 2015, 36(S1): 136-140. |
XIONG J B, SHEN W W, HUANG Y Q, et al. Security sharing and associated deleting scheme for multi-replica in cloud[J]. Journal on Communications, 2015, 36(S1): 136-140. (in Chinese) | |
45 | 王丽娜, 任正伟, 董永峰, 等. 云存储中基于可信平台模块的密钥使用次数管理方法[J]. 计算机研究与发展, 2013, 50(8): 1628-1636. |
WANG L N, REN Z W, DONG Y F, et al. A management approach to key-used times based on trusted platform module in cloud storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636. (in Chinese) | |
46 | CHEN G X, ZHANG Y Q, LAI T H. OPERA: Open remote attestation for Intel's secure enclaves[C]//Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security(CCS'19). London: ACM, 2019: 2317-2331. |
47 | ZHAO S J, ZHANG Q Y, QIN Y, et al. SecTEE: a software-based approach to secure enclave architecture using TEE[C]//Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security(CCS'19). London: ACM, 2019: 1723-1740. |
48 | TANG Y, LEE P P C, LUI J C S, et al. FADE: secure overlay cloud storage with file assured deletion[C]//Proceedings of the 6th EAI International Conference on Security and Privacy in Communication Networks(SecureComm'10). Singapore: Springer, 2010: 380-397. |
49 | TANG Y, LEE P P C, LUI J C S, et al. Secure overlay cloud storage with access control and assured deletion[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6): 903-916. |
50 | ALI M, MALIK S U R, KHAN S U. DaSCE: Data security for cloud environment with semi-trusted third party[J]. IEEE Transactions on Cloud Computing, 2017, 5(4): 642-655. |
51 | CACHIN C, HARLAMBIEV K, HSIAO H C, et al. Policy-based secure deletion[C]//Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS'13). Berlin: ACM, 2013: 259-270. |
52 | YU Y, XUE L, LI Y N, et al. Assured data deletion with fine-grained access control for fog-based industrial applications[J]. IEEE Transactions on Industrial Informatics, 2018, 14(10): 4538-4547. |
53 | XUE L, YU Y, LI Y N, et al. Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2019, 479: 640-650. |
54 | HAO J L, LIU J, WU W, et al. Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT[J]. IEEE Internet of Things Journal, 2020, 7(2): 1140-1153. |
55 | CHENG Y T, YANG L, YU S, et al. Achieving efficient and verifiable assured deletion for outsourced data based on access right revocation[C]//Proceedings of the 18th International Conference on Cryptology and Network Security(CANS'19). Fuzhou: Springer, 2019: 392-411. |
56 | SHAN F F, LI H, LI F H, et al. An attribute-based assured deletion scheme in cloud computing[J]. International Journal of Information Technology and Web Engineering, 2019, 14(2): 74-91. |
57 | TIAN Y C, SHAO T, LI Z. An efficient scheme of cloud data assured deletion[J]. Mobile Networks and Applications, 2021, 26: 1597-1608. |
58 | TIAN J F, WANG Z D. Fine-grained assured data deletion scheme based on attribute association[J]. Computers & Security, 2020, 96: 101936(1-9). |
59 | MA J, WANG M S, XIONG J B, et al. CP-ABE-based secure and verifiable data deletion in cloud[J]. Security and Communication Networks, 2021, 8855341(1-14). |
60 | BENTAJER A, HEDABOU M, ABOUELMEHDI K, et al. An IBE-based design for assured deletion in cloud storage[J]. Cryptologia, 2019, 43(3): 254-265. |
61 | KAUSHIK S, GANDHI C. Capability based outsourced data access control with assured file deletion and efficient revocation with trust factor in cloud computing[J]. International Journal of Cloud Applications and Computing, 2020, 10(1): 64-84. |
62 | REARDON J, RITZDORF H, BASIN D, et al. Secure data deletion from persistent media[C]//Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS'13). Berlin: ACM, 2013: 271-284. |
63 | ROCHE D S, AVIV A, CHOI S G. A practical oblivious map data structure with secure deletion and history independence[C]//Proceedings of the 37th IEEE Symposium on Security and Privacy(S&P'16). San Jose: IEEE, 2016: 178-197. |
64 | MO Z, XIAO Q J, ZHOU Y A, et al. On deletion of outsourced data in cloud computing[C]//Proceedings of the 7th IEEE International Conference on Cloud Computing(CLOUD'14). Anchorage: IEEE, 2014: 344-351. |
65 | MO Z, QIAO Y, CHEN S G. Two-party fine-grained assured deletion of outsourced data in cloud systems[C]//Proceedings of the 34th IEEE International Conference on Distributed Computing Systems(ICDCS'14). Madrid: IEEE, 2014: 308-317. |
66 | YAO W B, CHEN Y J, WANG D B. Cloud multimedia files assured deletion based on bit stream transformation with chaos sequence[C]//Proceedings of the 17th International Conference on Algorithms and Architectures for Parallel Processing(ICA3PP'17). Helsinki: Springer, 2017: 441-451. |
67 | 张逢喆, 陈进, 陈海波, 等. 云计算中的数据隐私性保护与自我销毁[J]. 计算机研究与发展, 2011, 48(7): 1155-1167. |
ZHANG F Z, CHEN J, CHEN H B, et al. Lifetime privacy and self-destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011, 48(7): 1155-1167. (in Chinese) | |
68 | ZHAO L Y, MANNAN M. Gracewipe: secure and verifiable deletion under coercion[C]//Proceedings of the 22th Annual Network and Distributed System Security(NDSS'15). San Diego: Internet Society, 2015: 1-16. |
69 | HAO F, CLARKE D, ZORZO A F. Deleting secret data with public verifiability[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(6): 617-629. |
70 | WAIZENEGGER T. Deletion of Content in Large Cloud Storage Systems[D]. Stuttgart: Institut für Parallele und Verteilte Systeme der Universität Stuttgart, 2017. |
71 | WAIZENEGGER T, WAGNER F, MEGA C. SDOS: using trusted platform modules for secure cryptographic deletion in the swift object store[C]//Proceedings of the 20th International Conference on Extending Database Technology(EDBT'17). Venice: DBIS, 2017: 550-553. |
72 | REN Z W, CHEN X S, TANG J S, et al. Limited times of data access based on SGX in cloud storage[C]//Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics(SMC'21). Melbourne: IEEE, 2021: 3146-3151. |
73 | REN Z W, LI X, XU S W, et al. Restricting the number of times that data can be accessedincloud storage using TrustZone[C]//Proceedings of the 22th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing(CCGrid' 22). Messina: IEEE/ACM, 2022: 289-296. |
74 | XUE L, NI J B, LI Y N, et al. Provable data transfer from provable data possession and deletion in cloud storage[J]. Computer Standards & Interfaces, 2017, 54: 46-54. |
75 | LIU Y D, WANG X A, CAO Y F, et al. Improved provable data transfer from provable data possession and deletion in cloud storage[C]//Proceedings of International Conference on Intelligent Networking and Collaborative Systems(INCoS'18). Bratislava: Springer, 2018: 445-452. |
76 | YANG C S, TAO X L. New publicly verifiable cloud data deletion scheme with efficient tracking[C]//Proceedings of International Conference on Security with Intelligent Computing and Big-data Services(SICBS'18). Bratislava: Springer, 2018: 359-372. |
77 | HALL B, GOVINDARASU M. An assured deletion technique for cloud-based IoT[C]//Proceedings of the 27th International Conference on Computer Communication and Networks(ICCCN'18). Hangzhou: IEEE, 2018: 1-9. |
78 | DU L, ZHANG Z W, TAN S C, et al. An associated deletion scheme for multi-copy in cloud storage[C]//Proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing(ICA3PP'18). Guangzhou: Springer, 2018: 511-526. |
79 | YANG C S, WANG J F, TAO X L, et al. Publicly verifiable data transfer and deletion scheme for cloud storage[C]//Proceedings of the 20th International Conference on Information and Communications Security(ICICS'18). Lille: Springer, 2018: 445-458. |
80 | YANG C S, TAO X L, ZHAO F, et al. Secure data transfer and deletion from counting bloom filter in cloud computing[J]. Chinese Journal of Electronics, 2020, 29(2): 273-280. |
81 | LUO Y C, XU M, FU S J, et al. Enabling assured deletion in the cloud storage by overwriting[C]//Proceedings of the 4th ACM International Workshop on Security in Cloud Computing(SCC'16). Xi'an: ACM, 2016: 17-23. |
82 | YANG C S, CHEN X F, XIANG Y. Blockchain-based publicly verifiable data deletion scheme for cloud storage[J]. Journal of Network and Computer Applications, 2018, 103: 185-193. |
[1] | 王亚文, 郭云飞, 刘文彦, 霍树民, 杨超. 面向云存储安全的可自愈拜占庭Quorum系统[J]. 电子学报, 2020, 48(4): 675-681. |
[2] | 杜瑞忠, 石朋亮, 田俊峰. 基于DDCT表的多副本完整性审计方案[J]. 电子学报, 2020, 48(1): 164-171. |
[3] | 李建江, 马占宁, 张凯. 一种基于内容分块的层次化去冗优化策略[J]. 电子学报, 2019, 47(5): 1094-1100. |
[4] | 吴泽智, 陈性元, 杜学绘, 杨智. 基于双层信息流控制的云敏感数据安全增强[J]. 电子学报, 2018, 46(9): 2245-2250. |
[5] | 任正伟, 孙小雁, 王丽娜, 王骞, 徐明迪, 张茂胜. 基于简单随机抽样的大数据可信性验证方法[J]. 电子学报, 2017, 45(10): 2484-2490. |
[6] | 周洪丞, 杨超, 马建峰, 张俊伟. 云端数据异地容灾验证方案研究[J]. 电子学报, 2016, 44(10): 2485-2494. |
[7] | 谢显中, 黄倩, 王柳苏, 马彬. 一种云存储中基于干扰对齐的多节点精确修复方法[J]. 电子学报, 2014, 42(10): 1873-1881. |
[8] | 王宁, 杨扬, 孟坤, 陈宇, 王磊, 季青. 云计算环境下基于用户体验的成本最优存储策略研究[J]. 电子学报, 2014, 42(1): 20-27. |
[9] | 周恩光, 李舟军, 郭华, 贾仰理. 一个改进的云存储数据完整性验证方案[J]. 电子学报, 2014, 42(1): 150-154. |
[10] | 王小刚, 石为人, 周伟, 高鹏, 蒋亿松. 一种基于二次型的无线传感器网络密钥管理方案[J]. 电子学报, 2013, 41(2): 214-219. |
[11] | 王丽娜;;任正伟;余荣威;韩凤;董永峰. 一种适于云存储的数据确定性删除方法[J]. 电子学报, 2012, 40(2): 266-272. |
[12] | 李建敦, 彭俊杰, 张武. 云存储中一种基于布局的虚拟磁盘节能调度方法[J]. 电子学报, 2012, 40(11): 2247-2254. |
[13] | 吴吉义;傅建庆;平玲娣;谢琪;. 一种对等结构的云存储系统研究[J]. 电子学报, 2011, 39(5): 1100-1107. |
[14] | 阎军智;李凤华;马建峰. 基于Diffie-Hellman算法的分层密钥分配方案[J]. 电子学报, 2011, 39(1): 119-123. |
[15] | 彭清泉;裴庆祺;马建峰;庞辽军. 无线传感器网络中自治愈的群组密钥管理方案[J]. 电子学报, 2010, 38(1): 123-128. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||