Computer Science ›› 2017, Vol. 44 ›› Issue (6): 8-16.doi: 10.11896/j.issn.1002-137X.2017.06.002
Previous Articles Next Articles
TIAN Hui, CHEN Yu-xiang, HUANG Yong-feng and LU Jing
[1] DEWAN H,HANSDAH R C.A Survey of Cloud Storage Facilities[C]∥Proceedings of the 7th IEEE World Congress on Servi-ces.2011:224-231. [2] WANG C,WANG Q,REN K,et al.Toward Secure and Depen- dable Storage Services in Cloud Computing [J].IEEE Transactions on Services Computing,2012,5(2):220-232. [3] Digital in 2008.Amazon S3 Availability Event .http://status.aws.amazon.com/s3-20080720.html. [4] Digital in 2006.Reports of Mass Email Deletions .http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-ma-ssemail-deletions. [5] Digital in 2014.iCloud被黑客攻击而泄密 引发“公有云”恐慌 .http://www.chinacloud.cn/show.aspx?id=17748&cid=29. [6] FENG C S,QIN Z G,YUAN D.Techniques of Secure Storage for Cloud Data [J].Chinese Journal of Computers,2015,8(1):150-163(in Chinese) 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,8(1):150-163. [7] TAN S,JIA Y,HAN W H.Research and Development of Prova-ble Data Integrity of Cloud Storage[J].Chinese Journal of Computers,2015,8(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展 [J].计算机学报,2015,8(1):164-177. [8] CHEN L X,XU L.Research on Provable Data Possession and Recovery Technology in Cloud Storage [J].Journal of Computer Research and Development,2012,9(S1):19-25.(in Chinese) 陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,9(S1):19-25. [9] WANG C,REN K,LOU W J,et al.Toward Publicly Auditable Secure Cloud Data Storage Services [J].IEEE Network,2010,4(4):19-24. [10] YANG K,JIA X H.Data Storage Auditing Service in CloudComputing:Challenges,Methods and Opportunities [J].World Wide Web-internet & Web Information Systems,2012,5(4):409-428. [11] SOOKHAK M,GANI A,TALEBAIN H,et al.Remote DataAuditing in Cloud Computing Environments:A Survey, Taxono-my,and Open Issues [J].ACM Computing Surveys,2015,7(4):65. [12] SOOKHAK M,TALEBAIN H,AHMED E,et al.A Review on Remote Data Auditing in Single Cloud Server:Taxonomy and Open Issues [J].Journal of Network & Computer Applications,2014,3(5):121-141. [13] RYOO J,RIZVI S,AIKEN W,et al.Cloud Security Auditing:Challenges and Emerging Approaches [J].IEEE Security & Privacy,2014,2(6):68-74. [14] SEB F,DOMINGO-FERRER J,M ARTNEZ-BALLEST A,et al.Efficient Remote Data Possession Checking in Critical Information Infrastructures [J].IEEE Transactions on Knowledge and Data Engeering,2008,0(8):1034-1038. [15] JUELS A,KALISKI J R B S.PoRs:Proofs of Retrievability for Large Files [C]∥Proceedings of the 14th ACM Conference Computer and Communications Security.2007:584-597. [16] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of the 14th Theory and Application of Cryptology and Information Security:Advances in Cryptology.2008:90-107. [17] ATENIESE G,PIETRO R D,MANCINI L V,et al.Scalable and efficient provable data possession [C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.2008:1-10. [18] ATENIESE G,JOHNS R B,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores [C]∥Proceedings of the 14th Computer and Communications Security.2007:598-609. [19] WANG H.Proxy Provable Data Possession in Public Clouds[J].IEEE Transactions on Services Computing,2013,6(4):551-559. [20] WANG B Y,LI B C,LI H,et al.Certificateless Public Auditing for Data Integrity in the Cloud [C]∥Proceedings of the IEEE Conference on Communications and Network Security.2013:136-144. [21] WANG H K,WU Q H,QIN Bo,et al.Identity-based Remote Data Possession Checking in Public Clouds [J].IET Information Security,2014,8(2):114-121. [22] YU J,REN K,WANG C,et al.Enabling Cloud Storage Auditingwith Key-Exposure Resistance [J].IEEE Transactions on Information Forensics and Security,2015,0(6):1167-1180. [23] LIU C,RAJIV R,ZHANG X Y,et al.Public Auditing for Big Data Storage in Cloud Computing--A Survey [C]∥Proceedings of the 16th IEEE International Conference on Computational Science and Engineering.2013:1128-1135. [24] WANG C,WANG Q,REN K,et al.Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing [C]∥Proceedings of the 29th IEEE International Conference on Computer Communications.2010:1-9. [25] WANG C,CHOW S,WANG Q,et al.Privacy-Preserving Public Auditing for Secure Cloud Storage [J].IEEE Transactions on Computers,2013,2(2):362-375. [26] ZHU Y,HU H X,GAIL-JOON A,et al.Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Sto-rage[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(12):2231-2244. [27] YANG K,JIA X H.An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing [J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,4(9):1717-1726. [28] CURTMOLA R,KHAN O,BURNS R C,et al.MR-PDP:Multiple-Replica Provable Data Possession [C]∥Proceedings of the 28th IEEE International Conference on Distributed Computing Systems.2008:411-420. [29] HAO Z,YU N H.A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability[C]∥Proceedings of the 2nd IEEE International Symposium on Data,Privacy and E-Commerce.2010:84-89. [30] XIAO D,YANG Y,YAO W B,et al.Multiple-File Remote Data Checking for Cloud Storage [J].Computers & Security,2012,1(2):192-205. [31] BARSOUM A F,HASAN M A.On Verifying Dynamic Multiple Data Copies over Cloud Servers .http:/cacr.uwaterloo.ca/techreports/2011/cacr2011-28.pdf. [32] CHEN H F,LIN B G,YANG Y,et al.Public Batch Auditing for 2M-PDP Based on BLS in Cloud Storage [J].Journal of Cryptologic Research,2014,1(4):368-378. [33] ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession [C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.2009:213-222. [34] WANG Q,WANG C,REN K,et al.Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing [J].IEEE Transactions on Parallel and Distributed Systems,2011,2(5):847-859. [35] LIU C,ZHANG X,CHI Y,et al.Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].IEEE Transactions on Parallel and Distributed Systems,2014,5(9):2234-2244. [36] ZHU Y,AHN G J,HU H X,et al.Dynamic Audit Services for Outsourced Storage in Clouds [J].IEEE Transactions on Servi-ces Computing,2013,6(2):227-238. [37] JIN H,JIANG H,ZHOU K.Dynamic and Public Auditing with Fair Arbitration for Cloud Data [C]∥IEEE Transactions on Cloud Computing.2016:1. [38] TIAN H,CHEN Y X,CHANG C C,et al.Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage[C]∥IEEE Transactions on Services Computing.2016:1. [39] LIU C,RAJIV R J,YANG C,et al.MuR-DPA:Top-down Leve- led Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud [J].IEEE Transactions on Computers,2015,4(9):2609-2622. [40] BARSOUM A F,HASAN M A.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].IEEE Transactions on Information Forensics & Security,2015,0(3):485-496. [41] WANG B Y,LI H,LI M.Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics [C]∥Procee-dings of the IEEE International Conference Communication.2013:539-543. [42] WANG B Y,CHOW S,LI M,et al.Storing Shared Data on the Cloud via Security-Mediator [C]∥Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems.2013:124-133. [43] WANG B Y,LI B C,LI H.Knox:Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud [C]∥Procee-dings of the 10th International Conference on Applied Cryptography and Network Security.2012:507-525. [44] WANG B Y,LI B C,LI H.Oruta:Privacy-Preserving Public Auditing for Shared Data in the Cloud [J].IEEE Transactions on Cloud Computing,2014,2(1):43-56. [45] WANG B Y,LI B C,LI H.Panda:Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].IEEE Transactions on Services Computing,2015,8(1):92-106. [46] YU Y,LI Y N.Public Integrity Auditing for Dynamic Data Sharing with Multiuser Modification [J].IEEE Transactions on Information Forensics & Security,2015,0(8):1717-1726. [47] LUO Y C.Efficient Integrity Auditing for Shared Data in theCloud with Secure User Revocation [C]∥Proceedings of the IEEE Trustcom /BigDataSE/ISPA.2015:434-442. [48] JOHNSON R,MOLNAR D,SONG D,et al.Homomorphic Signature Schemes [C]∥Proceedings of the Cryptographers’ Track at the RSA Conference.2002:244-262. [49] BONEH D,GENTRY C,LYNN B,et al.Aggregate and Verifia-bly Encrypted Signatures from Bilinear Maps [C]∥ Procee-dings of the 22nd Theory and Applications of Cryptographic Techniques.2003:416-423. |
No related articles found! |
|