[1] Juels A,Kaliski Jr B S.PORs:Proofs of retrievability for large files[A].Proceedings of the 14th ACM Conference on Computer and Communications Security[C].USA:ACM,2007.584-597.
[2] Erway C,Küp?ü A,Papamanthou C,et al.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.213-222.
[3] Bowers K D,van Dijk M,Juels A,et al.How to tell if your cloud files are vulnerable to drive crashes[A].Proceedings of the 18th ACM Conference on Computer and Communications Security[C].USA:ACM,2011.501-514.
[4] Benson K,Dowsley R,Shacham H.Do you know where your cloud files are?[A].Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop[C].USA:ACM,2011.73-82.
[5] Watson G J,Safavi-Naini R,Alimomeni M,et al.LoSt:location based storage[A].Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop[C].USA:ACM,2012.59-70.
[6] Gondree M,Peterson Z N J.Geolocation of data in the cloud[A].Proceedings of the Third ACM Conference on Data and Application Security and Privacy[C].USA:ACM,2013.25-36.
[7] Wang Z,Sun K,Jajodia S,et al.Disk storage isolation and verification in cloud[A].IEEE Global Communications Conference (GLOBECOM)[C].USA:IEEE,2012.771-776.
[8] Wang Z,Sun K,Jing J,et al.Verification of data redundancy in cloud storage[A].Proceedings of the 2013 International Workshop on Security in Cloud Computing[C].USA:ACM,2013.11-18.
[9] Wang Z,Sun K,Jajodia S,et al.Terracheck:Verification of dedicated cloud storage[A].Data and Applications Security and Privacy XXVII[M].Berlin Heidelberg:Springer,2013.113-127.
[10] Noman A,Adams C.Providing a data location assurance service for cloud storage environments[J].Journal of Mobile Multimedia,2012,8(4):265-286.
[11] Albeshri A,Boyd C,Nieto J G.Geoproof:proofs of geographic location for cloud computing environment[A].Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW)[C].USA:IEEE,2012.506-514.
[12] Albeshri A,Boyd C,Nieto J G.Enhanced GeoProof:improved geographic assurance for data in the cloud[J].International Journal of Information Security,2014,13(2):191-198.
[13] Chen B,Curtmola R.Towards self-repairing replication-based storage systems using untrusted clouds[A].Proceedings of the Third ACM Conference on Data and Application Security and Privacy[C].USA:ACM,2013.377-388.
[14] BOWERS K D,JUELS A,OPREA A.HAIL:Ahigt-aviailability and integrity layer for cloud storage[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.67-76.
[15] 周恩光,李舟军,郭华,贾仰理.一个改进的云存储数据完整性验证方案[J].电子学报,2014,42 (1):150-154. ZHOU En-guang,LI Zhou-jun,GUO Hua,JIA Yang-li.An improved data integrity verification scheme in cloud storage system[J].Acta Electronica Sinica,2014,42 (1):150-154.(in Chinese)
[16] 王丽娜,任正伟,余荣威,韩凤,董永峰.一种适于云存储的数据确定性删除方法[J].电子学报,2012,40(2):266-272. WANG Li-na,REN Zheng-wei,YU Rong-wei,HAN Feng,DONG Yong-feng.A data assured deletion approach adapted for cloud storage[J].Acta Electronica Sinica,2012,40(2):266-272.(in Chinese)
[17] 沈钢,魏震,蔡云泽,许晓鸣,何星,张卫东.一种实时以太网介质访问控制协议的时延性能分析[J].电子学报,2003,31(2):175-179. SHEN Gang,WEI Zhen,CAI Yun-ze,XU Xiao-ming,HE Xing,ZHANG Wei-dong.Delivery delay analysis of a real-time ethernet MAC protocol[J].Acta Electronica Sinica,2003,31(2):175-179.(in Chinese)
[18] Shacham H,Waters B.Compact proofs of retrievability[A].Advances in Cryptology-ASIACRYPT[M].Berlin Heidelberg:Springer,2008.90-107.
[19] Curtmola R,Khan O,Burns R,et al.MR-PDP:Multiple-replica provable data possession[A].Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS'08)[C].USA:IEEE,2008.411-420.
[20] 李超零,陈越,谭鹏许,杨刚.基于同态 hash 的数据多副本持有性证明方案[J].计算机应用研究,2013,30(1):265-269. Li Chao-ling,Chen Yue,Tan Peng-xu,Yang Gang.Multiple-replica provable data possession based on homomorphic hash[J].Application Research of Computers,2013,30(1):265-269.(in Chinese)
[21] Yang C,Ren J,Ma J.Provable ownership of file in de-duplication cloud storage[A].Proceedings of Global Communications Conference (GLOBECOM)[C].USA:IEEE,2013.695-700.
[22] Erway C,Kupcu A,Papamanthou C,et al.Dynamic provable data possession[A].Proceedings of the 16th ACM Conference on Computer and Communications Security[C].USA:ACM,2009.213-222.
[23] 李超零,陈越,谭鹏许,杨刚.一种高效的动态数据持有性证明方案[J].小型微型计算机系统,2013,34(11):2461-2466. LI Chao-ling,CHEN Yue,TAN Peng-xu,LI Min,YANG Gang.An efficient provable data possession scheme with data dynamics[J].Journal of Chinese Computer Systems,2013,34(11):2461-2466.(in Chinese)
[24] 胡德敏,余星.一种基于同态标签的动态云存储数据完整性验证方法[J].计算机应用研究,2014,31(5):1362-1365,1395. HU De-min,YU Xing.Dynamic cloud storage data integrity verifying method based on homomorphic tags[J].Application Research of Computers,2014,31(5):1362-1365,1395.(in Chinese) |