[1] 冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. Feng Deng-guo,Zhang Min,Zhang Yan,Xu Zhen.Study oncloud computing security[J].Journal of Software,2011,22(1):71-83.(in Chinese) [2] G Ateniese,R Burns,R Curtmola,J Herring,L Kissner,Z Peterson,D Song.Provable data possession at untrusted stores [A].Proceedings of the 14th ACM Conference on Computer and Communications Security [C].Alexandria:ACM,2007.598-609. [3] Juels,Burton S Kaliski Jr.Pors:Proofs of retrievability for large files [A].Proceedings of the 14th ACM Conference on Computer and Communications Security [C].Alexandria:ACM,2007.584-597. [4] H Shacham,B Waters.Compact proofs of retrievability [A].Proceedings of the 14th International Conference on Theory and Application of Cryptology and Information Security:Advances in Cryptology [C].Melbourne:LNCS 5350,2008.90-107. [5] K D Bowers,A Juels,A Oprea.Proofs of retrievability:Theory and implementation [A].Proceedings of the 2009 ACM Workshop on Cloud Computing Security [C].Chicago:ACM,2009.43-54. [6] Ee-Chien Chang,Jia Xu.Remote integrity check with dishonest storage server [A].Proceedings of the 13th European Symposium on Research in Computer Security [C].Berlin:Springer-Verlag,2008.223-237. [7] A Oprea,MK Reiter,K Yang.Space-efficient block storage integrity [A].Proceedings of the 12th Annual Network and Distributed System Security Symposium [C].San Diego:USENIX,2005.1-12. [8] G Ateniese,RD Pietro,LV Mancini,G Tsudik.Scalable and efficient provable data possession [A].Proceedings of the 4th International Conference on Security and Privacy in Communication Networks [C].Istanbul:ACM,2008.1-10. [9] C Wang,Q Wang,K Ren,W Lou.Ensuring data storage security in cloud computing [A].Proceedings of the 17th International Workshop Quality of Service [C].Charleston:IEEE,2009.1-9. [10] C Erway,A Kupcu,C Papamanthou,R Tamassia.Dynamic provable data possession [A].Proceedings of the 16th ACM Conference on Computer and Communications Security [C].Chicago:ACM,2009.213-222. [11] F Sebe,J Domingo-Ferrer,A Martinez-Balleste,Y Deswarte,J-J Quisquater.Efficient remote data possession checking in critical information infrastructures[J].IEEE Transactions on Knowledge and Data Engineering,2008,20(8):1034-1038. [12] C Wang,Q Wang,K Ren,W Lou.Privacy-preserving public auditing for data storage security in cloud computing [A].Proceedings of 2010 IEEE INFOCOM [C].San Diego:IEEE,2010.1-9. [13] Zhuo Hao,Sheng Zhong,Nenghai Yu.A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability[J].IEEE Transactions on Knowledge and Data Engineering,2011,23(9):1432-1437. [14] Qian Wang,Cong Wang,Kui Ren,Wenjing Lou,Jin Li.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859. [15] Boneh D,Lynn B,Shacham H.Short signatures from the Weil pairing[J].Journal of Cryptology,2004,17(4):297-319. |