Computer Science ›› 2023, Vol. 50 ›› Issue (7): 302-307.doi: 10.11896/jsjkx.220600067
• Information Security • Previous Articles Next Articles
WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu
CLC Number:
[1]DESWARTE Y,QUISQUATER J J,SAIDANE A.Remote Integrity Checking[C]//Working Conference on Integrity & Internal Control in Information Systems.Springer,2003:1-11. [2]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer & Communications Security.2007:598-609. [3]JUELS A,KALISKI JR B S.PORs:Proofs of Retrievability for Large Files[C]//Proceedings of the 14th ACM Conference on Computer & Communications Security.2007:584-597. [4]SHACHAM H,WATERS B.Compact Proofs of Retrievability[C]//International Conference on the Theory & Application of Cryptology & Information Security.Springer,2008:90-107. [5]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalableand Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security & Privacy in Communication Networks.ACM,2008:1-10. [6]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859. [7]SHEN W,YU J,XIA H,et al.Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium[J].Journal of Network & Computer Applications,2017,82:56-64. [8]WANG H,WU Q,QIN B,et al.Identity-based remote data possession checking in public clouds[J].IET Information Security,2014,8(2):114-121. [9]YU Y,MAN H A A,ATENIESE G,et al.Identity-based re-mote data integrity checking with perfect data privacy preserving for cloud storage[J].IEEE Transactions on Information Forensics and Security,2017,12(4):767-778. [10]WANG H,HE D,TANG S.Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud[J].IEEE Transactions on Information Forensics and Security,2016,11(6):1165-1176. [11]WANG Y,WU Q,QIN B,et.al.Identity-based data outsourcing with comprehensive auditing in clouds[J].IEEE Transactions on Information Forensics and Security,2016,12(4):940-952. [12]ZHANG J,DONG Q.Efficient ID-based public auditing for the outsourced data in cloud storage[J].Information Sciences,2016,343:1-14. [13]WANG H Q.Identity-based distributed provable data possession in multicloud storage[J].IEEE Transactions on Services Computing,2014,8(2):328-340. [14]LI Y,YU Y,MIN G,et al.Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J].IEEE Transactions on Dependable & Secure Computing,2017,16(1):72-83. [15]LI J,YAN H,ZHANG Y.Identity-based privacy preserving remote data integrity checking for cloud storage[J].IEEE Systems Journal,2020,15(1):577-585. |
[1] | ZHAO Yuqi, YANG Min. Review of Differential Privacy Research [J]. Computer Science, 2023, 50(4): 265-276. |
[2] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[3] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[4] | WANG Jian. Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving [J]. Computer Science, 2022, 49(6A): 575-580. |
[5] | LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345. |
[6] | KONG Yu-ting, TAN Fu-xiang, ZHAO Xin, ZHANG Zheng-hang, BAI Lu, QIAN Yu-rong. Review of K-means Algorithm Optimization Based on Differential Privacy [J]. Computer Science, 2022, 49(2): 162-173. |
[7] | SHEN Zhen, ZHAO Cheng-gui. Storage Task Allocation Algorithm in Decentralized Cloud Storage Network [J]. Computer Science, 2022, 49(12): 17-21. |
[8] | YANG Hong-jian, HU Xue-xian, LI Ke-jia, XU Yang, WEI Jiang-hong. Study on Privacy-preserving Nonlinear Federated Support Vector Machines [J]. Computer Science, 2022, 49(12): 22-32. |
[9] | PENG Chun-chun, CHEN Yan-li, XUN Yan-mei. k-modes Clustering Guaranteeing Local Differential Privacy [J]. Computer Science, 2021, 48(2): 105-113. |
[10] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
[11] | LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338. |
[12] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[13] | LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283. |
[14] | ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309. |
[15] | LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261. |
|