Computer Science ›› 2017, Vol. 44 ›› Issue (3): 55-58.doi: 10.11896/j.issn.1002-137X.2017.03.014
Previous Articles Next Articles
MA Hai-feng, YANG Jia-hai, YAO Nian-min and GUAN Ming-shan
[1] ATENIESE G,BUMS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥14th ACM CCS.2007:598-609. [2] JUELS A,BURTON S,KALISKI J.PORs:Proofs of Retrieva-bility for Large Files [C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07).Alexandria,Virginia,USA,USA:ACM Press,New York,NY,584-597. [3] ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable and efficient provable data possession[C]∥4th International Conference on Security and Privacy in Communication Networks.2008. [4] ERWAY C,KUPCU A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥16th ACM CCS.2009:213-222. [5] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’08).Melbourne,Australia,Berlin:Springer-Verlag,90-107. [6] TAN S,JIA Y,HAN W H.Research and Development of Pro-vable Data Integrity in Cloud Storage [J].Chinese Journal of Computers,2015,38(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177. [7] BOWERS K D,JUELS A,OPREA A.Proofs of Retrievability:Theory and Implementation[C]∥Proceeding(s) of ACM Workshop on Cloud Computing Security.Chicago,USA,2009:43-53. [8] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥29th IEEE INFOCOM.2010. [9] CHEN L,ZHOU S,HUANG X,et al.Data dynamics for remote data possession checking in cloud storage[J].Computers and Electrical Engineering,2013,39:2413-2424. |
No related articles found! |
|