Computer Science ›› 2021, Vol. 48 ›› Issue (9): 330-336.doi: 10.11896/jsjkx.200600139
• Information Security • Previous Articles Next Articles
ZHOU Yi-hua1,2,3, JIA Yu-xin1,2,3, JIA Li-yuan1,2,3, FANG Jia-bo1,2,3, SHI Wei-min1,2
CLC Number:
[1]PANG H,LIANG W,DU J L,et al.Enlightenment of low application rate of electronic medical records in American hospitals on the development of electronic medical records in Chinese hospitals[J].China Medical Records,2013(10):11-13. [2]MEI Y.The using blockchain based method of the secure sto-rage of medical records[J].Journal of Jiangxi Normal University(Natural Science Edition),2017,41(5):484-490. [3]TAN S,JIA Y,HAN W H.Research and development of data integrity proof in cloud storage[J].Journal of Computer Scien-ce,2015,38(1):164-177. [4]CAO X,XU L,CHEN L X.Data integrity verification protocol in cloud storage system [J].Computer Application,2012,32(1):8-12. [5]BIAN G Q,GAO S,SHAO B L.Cloud storage security architecture for distributed storage[J].Journal of Xi'an Jiaotong University,2011,45(4):41-45. [6]ZHANG J,CHEN K F,LV L,et al.User data security in cloud storage[J].Computer Science and Exploration,2013,(12):1093-1103. [7]XHAFA F,LI J,ZHAO G,et al.Designing cloud-based elec-tronic health record system with attribute-based encryption[J].Multimedia Tools & Applications,2015,74(10):3441-3458. [8]LI J Y,FAN X H,WANG Y.Design of privacy protectionmechanism of sharing economy based on blockchain[J].Computer Application and Software,2019,36(1):302-307. [9]MIAO J M,FENG C S,LI M,et al.Data integrity public audit scheme for public cloud[J].Computer Application,2018,38(10):146-152. [10]ATENIESE G,BURNS R,CURTMOLA R,et al.Provabledata possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.2007. [11]ERWAY C C,KÜPÇÜ A,PAPAMANTHOU C,et al.Dynamic provable data possession[J].ACM Transactions on Information and System Security,2015,17(4):15. [12]ANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859. [13]LI Y,YAO G,LEI L N,et al.Cloud storage data integrity verification mechanism based on multi branch path tree[J].Journal of Tsinghua University:Natural Science Edition,2016(56):510. [14]HU D M,YU X.A data integrity verification method for dynamic cloud storage based on homomorphic tags[J].Computer Application Research,2014,31(5):1362-1365,1395. [15]LI J W,ZHU M D.MHT based dynamic data integrity verification and recovery scheme in cloud storage[J].Computer Application Research,2019,36(7):2179-2183,2194. [16]ZHONG T,GENG J Z,XIONG H,et al.SBT based data integrity verification mechanism in cloud storage[J].Journal of University of Electronic Science and Technology,2014(6):131-135. [17]WANG R J,ZHANG F L,WANG X Y,et al.Cloud data integrity verification protocol based on improved hop table[J].Journal of University of Electronic Science and Technology,2018,47(1):88-94. [18]FU Y Y,ZHANG M,CHEN K Q,et al.Multi copy file integrity verification scheme for cloud storage[J].Computer Research and Development,2014(7):1410-1416. [19]YAN X T,LI Y F.Cloud storage integrity detection algorithmbased on hash tree[J].Computer Science,2012,39(12):94-97. [20]LIU H Y,DING Y W,CHEN L T.Multi copy data integrity verification schemes supporting dynamic operation[J].Compu-ter Application Research,2019(9):2778-2782. [21]LIU Y F,WANG Y J,FU S J.Lightweight integrity verification scheme for cloud group data[J].Journal of Communications,2016(S1):144-150. [22]WANG L Y,LU Z J,ZHANG X D,et al.Data payment integrity verification scheme for power payment terminal based on multi-branch tree structure[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(3):377-384. [23]ZHU X D,ZHANG Y Y,YAO R K,et al.Research on Government Information Opening and Sharing Model and Application Based on Blockchain[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2020,37(5):122-128. |
[1] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[2] | HONG Xiao-ling, WAN Hu, XIAO Xiao and SUN Hao-xiang. Manufacturing Alliance System Based on Block Chain [J]. Computer Science, 2020, 47(6A): 369-374. |
[3] | KE Yu-Jing, JING Mao-hua and ZHENG Han-yin. Application Research of Blockchain Technology in Trust Industry [J]. Computer Science, 2020, 47(6A): 591-595. |
[4] | REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638. |
[5] | XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286. |
[6] | LIANG He-jun, HAN Jing-ti. Research on Decentralized Transaction Consensus Mechanism of Cloud Computing Resources Based on Block Chain [J]. Computer Science, 2019, 46(11A): 548-552. |
[7] | HOU Yi-bin, LIANG Xun, ZHAN Xiao-yu. Block Chain Based Architecture Model of Electronic Evidence System [J]. Computer Science, 2018, 45(6A): 348-351. |
[8] | DAI Hua, BAO Jing-jing, ZHU Xiang-yang, YI Xun, YANG Geng. Integrity-verifying Single Keyword Search Method in Clouds [J]. Computer Science, 2018, 45(12): 92-97. |
[9] | LIU Yao-zong, LIU Yun-heng. Security Provenance Model for RFID Big Data Based on Blockchain [J]. Computer Science, 2018, 45(11A): 367-368. |
[10] | CHEN Wei,YANG Long and YU Le. Privacy-preserving Dynamic Integrity-verification Algorithm in Data Aggregation [J]. Computer Science, 2013, 40(7): 84-88. |
|