Computer Science ›› 2017, Vol. 44 ›› Issue (5): 95-99.doi: 10.11896/j.issn.1002-137X.2017.05.017
Previous Articles Next Articles
XU Yun-yun, BAI Guang-wei, SHEN Hang and HUANG Zhong-ping
[1] LING C,SU W B,MENG K,et al.Cloud computing security:Architecture,Mechanism and Modeling[J].Journal of compu-ter,2013,36(9):1765-1784.(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,6(9):1765-1784. [2] LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,51(7):1397-1409.(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409. [3] ARMBRUST M,FOX A,GRIFFITH R A,et al.A View ofCloud Computing[J].Communications of the ACM,2010,53(4):50-58. [4] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores [C]∥The Proceedings of ACM CCS 2007.2007:598-610. [5] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of ASIAC RYPT 2008,LNCS.Springer,Heidelberg,2008,5350:90-107. [6] WANG C,WANG Q,REN K,et al.Privacy-preserving PublicAuditing for Data Storage Security in Cloud Computing [C]∥Proceedings of IEEE INFOCOM.2010:525-533. [7] ZHU Y,WANG H,HU Z,et al.Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds [C]∥the Proceedings of ACM SAC 2011.2011:1550-1557. [8] WANG C,WANG Q,REN K,et al.Towards Secure and Dependable Storage Services in Cloud Computing [J].IEEE Tran-sactions on Services Computing,2011,5(2):220-232. [9] CAO N,YU S,YANG Z,et al.LT Codes-based Secure and Relia-ble Cloud Storage Service [C]∥The Proceedings of IEEE INFOCOM 2012.2012:693-701. [10] WANG B,LI B,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].IEEE Transactions on Services Computing,2015,8(1):92-106. [11] BLAZE M,BLEUMER G,STRAUSS M.Divertible protocolsand atomic proxy cryptography [C]∥Advance in Cryptology- EUROCRYPT 98.1998:127-144. [12] ATENIESE G,HOHENBERGER S.Proxy Re-signatures:New Definitions,Algorithms and Applications [C]∥Proceeding of ACM CCS 2005.2005:310-319. [13] WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage [J].IEEE Transactions on Computers,2013,62(2):362-375. [14] ZHANG J,TANG W,MAO J.Efficient public verification proof of retrievability scheme in cloud [J].Cluster Computing,2014,17(17):1401-1411. [15] WANG B,LI B,LI H.Oruta:Privacy-preserving public auditing for shared data in the cloud [C]∥Proc.of IEEE 5th Internatio-nal Conference on Cloud Computing (CLOUD).2012:295-302. [16] YU Y,NI J,AU M,et al.On the security of a public auditing mechanism for shared cloud data service[J].IEEE Transaction Services Computing,1939,8(6):1. [17] YUAN J,YU S.Public integrity auditing for dynamic data sharing with multiuser modification [J].IEEE Trans.Inf.Forensics and Secur,2015,10(8):1717-1726. [18] BONEH D,GENTRY C,LYNN B,et al.Aggregate and Verifia-bly Encrypted Signatures from Bilinear Maps [M]∥The Proceedings of EUROCRYPT 2003.Springer-Verlag,2003:416-432. |
No related articles found! |
|