[1] 王国峰,刘川意,潘鹤中.云计算模式内部威胁综述[J].计算机学报,2017,40(02):296-316. Wang G F,Liu C Y,Pan H Z.Survey on insider to cloud computing[J].Chinese Journal of Computers,2017,40(02):296-316.(in Chinese)
[2] 田俊峰,李天乐.基于TPA云联盟的数据完整性验证模型[J].通信学报,2018,39(08):113-124. Tian J F,Li T L.Data integrity verification based on model cloud federation of TPA[J].Journal on Communications,2018,39(08):113-124.(in Chinese)
[3] Feng B,Ma X,Guo C,et al.An efficient protocol with bidirectional verification for storage security in cloud computing[J].IEEE Access,2017,99(4):7899-7911.
[4] Atenise G,Burns R.,Curtmol R.,et al.Provable data possession at untrusted stores[J].ACM Conference on Computer and Communications Security,2007,14(1):598-609.
[5] Fun T S,Samsudin A,Zaaba Z F.Enhanced security for public cloud storage with honey encryption[J].Advanced Science Letters,2017,23(5):4232-4235.
[6] Wang Q,Wang C,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859.
[7] Wang C,Chow S S,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[8] Tian H,Chen Z,Chang C,et al.Enabling public auditability for operation behaviors in cloud storage[J].Soft Computing,2016,21(8):2175-2187.
[9] Yang K,Jia X.An efficient and secure dynamic auditing protocol for data storage in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(9):1717-1726.
[10] Sookhak M,Gani A,et al.Dynamic remote data auditing for securing big data storage in cloud computing[J].Information Sciences,2017,380(3):101-116.
[11] Zhou Y,Ni J,Tao X.Provable multiple replication data possession with full dynamics for secure cloud[J].Concurrency and Computation,2015,28(4),1164-1173.
[12] 付艳艳,张敏,陈开渠,冯登国.面向云存储的多副本文件完整性验证方案[J].计算机研究与发展,2014,51(07):1410-1416. Fu Y Y,Zhang M,Chen K Q,et al.Proofs of data possession of multiple-copies[J].Journal of Computer Research and Development,2014,51(07):1410-1416.(in Chinese).
[13] Cha Y X,Luo S S,Bian J C,Li W.Multiuser and multiple-replica provable data possession scheme based on multi-branch authentication tree[J].Journal on Communications,2015,36(11):80-91.
[14] Yu Y,Ni J,Man H A,et al.Improved security of a dynamic remote data possession checking protocol for cloud storage[J].Expert Systems with Applications,2014,41(1):7789-7796.
[15] Shen W T,Qin J,Yu J,Hao R,Hu J K:Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J].IEEE Transactions Information Forensics and Security,2019,14(2):331-346.
[16] Li Y N,Yu Y,Min G Y,Susilo W,Ni J B.Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J].IEEE Transactions Dependable Security Computer,2019,16(1):72-83.
[17] Surmila T,Dilip K.Privacy preserving and public auditable integrity checking on dynamic cloud data[J].Network Security,2019,21(2):221-229. |