[1] 俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2013,41(2):371-381. Yu N,Hao Z,Xu J,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,41(2):371-381.(in Chinese)
[2] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83. Feng D G,Zhang M,Zhang Y,et al.Study on cloud computing security[J].Journal of Software,2011,22(1):71-83.(in Chinese)
[3] Zissis D,Lekkas D.Addressing cloud computing security issues[J].Future Generation Computer Systems,2012,28(3):583-592.
[4] Brunette G,Mogull R.Security guidance for critical areas of focus in cloud computing v2.1[J].Cloud Security Alliance,2009(11).1-76.
[5] Takabi H,Joshi J B D,Ahn G J.Security and privacy challenges in cloud computing environments[J].IEEE Security & Privacy,2010(6):24-31.
[6] Gueye B,Ziviani A,Crovella M,et al.Constraint-based geolocation of internet hosts[J].IEEE/ACM Transactions on Networking,2006,14(6):1219-1232.
[7] Gill P,Ganjali Y,Wong B,et al.Dude,where's that IP? circumventing measurement-based IP geolocation[A].Proceedings of the 19th USENIX Conference on Security[C].USA:USENIX Association,2010.16-31.
[8] Katz-Bassett,Ethan,et al.Towards IP geolocation using delay and topology measurements[A].Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement[C].USA:ACM,2006.71-84.
[9] Zeng Y,Cao J,Hong J,et al.Secure localization and location verification in wireless sensor networks[A].IEEE 6th International Conference on Mobile Adhoc and Sensor Systems,2009(MASS'09)[C].USA:IEEE,2009.864-869.
[10] Chiang J T,Haas J J,Choi J,et al.Secure location verification using simultaneous multilateration[J].IEEE Transactions on Wireless Communications,2012,11(2):584-591.
[11] Zhu Y,Ma D,Huang D,et al.Enabling secure location-based services in mobile cloud computing[A].Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing[C].USA:ACM,2013.27-32.
[12] Chandran N,Goyal V,Moriarty R,et al.Position based cryptography[A].Advances in Cryptology-CRYPTO 2009[C].Berlin:Springer-Verlag,2009.391-407.
[13] Cremers C,Rasmussen K B,Schmidt B,et al.Distance hijacking attacks on distance bounding protocols[A].2012 IEEE Symposium on Security and Privacy (SP)[C].USA:IEEE,2012.113-127.
[14] Rasmussen K B,Capkun S.Realization of RF distance bounding[A].Proceedings of the 19th USENIX Conference on Security[C].USA:USENIX Association,2010.389-402.
[15] Hancke G P,Kuhn M G.Attacks on time-of-flight distance bounding channels[A].Proceedings of the first ACM Conference on Wireless Network Security[C].USA:ACM,2008.194-202.
[16] Erway C,Kupcu A,Papamanthou C,et al.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.213-222.
[17] Zhu Y,Wang H,Hu Z,et al.Efficient provable data possession for hybrid clouds[A].Proceedings of the 17th ACM Conference on Computer and Communications Security[C].USA:ACM,2010.756-758.
[18] Bowers K D,Juels A,Oprea A.Proofs of retrievability:Theory and implementation[A].Proceedings of the 2009 ACM Workshop on Cloud Computing Security[C].USA:ACM,2009.43-54.
[19] Zhu Y,Wang H X,Hu Z X,et al.Zero-knowledge proofs of retrievability[J].Science China Information Sciences,2011,54(8):1608-1617.
[20] Albeshri A,Boyd C,Nieto J G.Geoproof:proofs of geographic location for cloud computing environment[A].201232nd International Conference on Distributed Computing Systems Workshops (ICDCSW)[C].USA:IEEE,2012.506-514.
[21] Albeshri A,Boyd C,Nieto J G.Enhanced GeoProof:improved geographic assurance for data in the cloud[J].International Journal of Information Security,2014,13(2):191-198.
[22] Watson G J,Safavi-Naini R,Alimomeni M,et al.Lost:location based storage[A].Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop[C].USA:ACM,2012.59-70.
[23] Ateniese G,Di Pietro R,Mancini L V,et al.Scalable and efficient provable data possession[A].Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks[C].USA:ACM,2008.1-10.
[24] 陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012(S1):19-25. Lanxiang C,Li X.Research on provable data possession and recovery technology in cloud storage[J].Journal of Computer Research and Development,2012(S1):19-25.(in Chinese) |