Computer Science ›› 2019, Vol. 46 ›› Issue (3): 188-196.doi: 10.11896/j.issn.1002-137X.2019.03.028
• Information Security • Previous Articles Next Articles
XIE Si-jiang1,2,JIA Bei1,WANG He2,XU Shi-cong1
CLC Number:
[1]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:598-609. [2]THANGAVEL M,VARALAKSHMI P,SINDHUJA R,et al.A survey on provable data possession in cloud storage[C]∥2016 Eighth International Conference on Advanced Computing (ICoAC).IEEE,2017:25-31. [3]TAN S,JIA Y,HAN W H.Research and Development of Prova- ble Data Integrity in Cloud Storage[J].Chinese Journal of Comptuers,2015,38(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. [4]JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597. [5]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable and efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:9. [6]WANG C,WANG Q,REN K,et al.Ensuring Data Storage Security in Cloud Computing[C]∥2009 17th International Workshop on Quality of Service.IEEE,2009:1-9. [7]WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥European Symposium on Research in Computer Security.Springer Berlin Heidelberg,2009:355-370. [8]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859. [9]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession[J].ACM Transactions on Information &System Security,2015,17(4):1-29. [10]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222. [11]WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9. [12]WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375. [13]ZHANG Y,BLANTON M.Efficient dynamic provable possession of remote data via balanced update trees[C]∥Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:183-194. [14]LIN C,LUO F,WANG H,et al.A provable data possession scheme with data hierarchy in cloud[C]∥International Con-ference on Information Security and Cryptology.Springer International Publishing,2015:301-321. [15]WANG H.Identity-based distributed provable data possession in multicloudstorage[J].IEEE Transactions on Service Computing,2015,8(2):328-340. [16]ETEMAD M,KP A.Transparent,distributed,and replicated dynamic provable data possession[C]∥International Con-ference on Applied Cryptography and Network Security.Sprin-ger Berlin Heidelberg,2013:1-18. [17]ZOU J,SUN Y,LI S.Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree[C]∥2016 International Con-ference on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2016:4-9. [18]LI L,YANG Y,WU Z.FMR-PDP:Flexible multiple-replica provable data possession in cloud storage[C]∥2017 IEEE Symposium on Computers and Communications(ISCC).IEEE,2017:1115-1121. [19]PENG S,ZHOU F,WANG Q,et al.Identity-Based Public Multi-Replica Provable Data Possession[J].IEEE Access,2017,5:26990-27001 [20]RAJENDRAN A,BALASUBRAMANIAN V,MALA T.Integrity verification using Identity based Provable Data Possession in multi storage cloud[C]∥2017 International Conference on Computational Intelligence in Data Science (ICCIDS).IEEE,2017:1-4. [21]HUANG D,WAN C.PDPMT:Provable data possession for multiple cloud tenants[C]∥2017 10th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics (CISP-BMEI).IEEE,2017:1-6. |
[1] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[2] | LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338. |
[3] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[4] | ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309. |
[5] | LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261. |
[6] | BAI Li-fang, ZHU Yue-fei, LU Bin. Research and Development of Data Storage Security Audit in Cloud [J]. Computer Science, 2020, 47(10): 290-300. |
[7] | QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101. |
[8] | GU Chen-yang, FU Wei, LIU Jin-long, SUN Gang. Survey of ORAM Research in Cloud Storage [J]. Computer Science, 2019, 46(11A): 341-347. |
[9] | WU Xiu-guo, LIU Cui. Data Replicas Distribution Transition Strategy in Cloud Storage System [J]. Computer Science, 2019, 46(10): 202-208. |
[10] | JIN Yu, CAI Chao, HE Heng and LI Peng. BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party [J]. Computer Science, 2018, 45(3): 144-150. |
[11] | LIU Yan-tao, LIU Heng. Cloud Storage System Based on Network Coding [J]. Computer Science, 2018, 45(12): 293-298. |
[12] | PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei. Perfect Privacy-preserving Batch Provable Data Possession [J]. Computer Science, 2018, 45(11): 130-137. |
[13] | ZHANG Gui-peng, CHEN Ping-hua. Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments [J]. Computer Science, 2018, 45(11): 187-192. |
[14] | TIAN Hui, CHEN Yu-xiang, HUANG Yong-feng and LU Jing. Research and Development of Auditing Techniques for Cloud Data Possession [J]. Computer Science, 2017, 44(6): 8-16. |
[15] | XU Yun-yun, BAI Guang-wei, SHEN Hang and HUANG Zhong-ping. Virtual-user-based Public Auditing Integrity in Cloud Storage [J]. Computer Science, 2017, 44(5): 95-99. |
|