Computer Science ›› 2020, Vol. 47 ›› Issue (9): 330-338.doi: 10.11896/jsjkx.190800147
• Information Security • Previous Articles
LI Ying1,2, YU Ya-xin1,2, ZHANG Hong-yu1, LI Zhen-guo1
CLC Number:
[1] NAKAMOTO S,BITCOIN A.A peer-to-peer electronic cashsystem[EB/OL].https://bitcoin.org/bitcoin.pdf. [2] ZHENG Z,XIE S,DAI H,et al.An overview of blockchaintechnology:Architecture,consensus,and future trends[C]//2017 IEEE International Congress on Big Data (BigData congress).IEEE,2017:557-564. [3] OTTE P,DE VOS M,POUWELSE J.TrustChain:A Sybil-re-sistant scalable blockchain[J].Future Generation Computer Systems,2020,107:770-780. [4] JIA D Y,XIN J C,WANG Z Q.Storage Capacity Scalable Model of Blockchain[J].Journal of Frontiers of Computer Science and Technology,2018,12(4):525-535. [5] EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-ng:A scalable blockchain protocol[C]//13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16).2016:45-59. [6] SOMPOLINSKY Y,ZOHAR A.Secure high-rate transactionprocessing in bitcoin[C]//International Conference on Financial Cryptography and Data Security.Berlin:Springer,2015:507-527. [7] ZHOU L,VARADHARAJAN V,HITCHENS M.Trust en-hanced cryptographic role-based access control for secure cloud data storage[J].IEEE Transactions on Information Forensics and Security,2015,10(11):2381-2395. [8] UIKEY C,BHILARE D S.TrustRBAC:Trust role based access control model in multi-domain cloud environments[C]//2017 International Conference on Information,Communication,Instrumentation and Control (ICICIC).IEEE,2017:1-7. [9] TIAN H,CHEN Y,JIANG H,et al.Public auditing for trusted cloud storage services[J].IEEE Security & Privacy,2019,17(1):10-22. [10] ZHAO B,FAN P,NI M.Mchain:a blockchain-based VM measurements securestorage approach in IaaS cloud with enhanced integrity and controllability[J].IEEE Access,2018,6:43758-43769. [11] SUKHODOLSKIY I,ZAPECHNIKOV S.A blockchain-basedaccess control system for cloud storage[C]//2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).IEEE,2018:1575-1578. [12] WESTERLUND M,KRATZKE N.Towards distributed clouds:A review about the evolution of centralized cloud computing,distributed ledger technologies,and a foresight on unifying opportunities and security implications[C]//2018 International Conference on High Performance Computing & Simulation (HPCS).IEEE,2018:655-663. [13] POURMAJIDI W,MIRANSKYY A.Logchain:blockchain-as-sisted log storage[C]//2018 IEEE 11th International Conference on Cloud Computing (CLOUD).IEEE,2018:978-982. [14] ZHU L,WU Y,GAI K,et al.Controllable and trustworthyblockchain-based cloud data management[J].Future Generation Computer Systems,2019,91:527-535. [15] ESPOSITO C,DE SANTIS A,TORTORA G,et al.Blockchain:A panacea for healthcare cloud-based data security and privacy?[J].IEEE Cloud Computing,2018,5(1):31-37. [16] SHEN M,MA B,ZHU L,et al.Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection[J].IEEE Transactions on Information Forensics and Security,2017,13(4):940-953. [17] XIA Q I,SIFAH E B,ASAMOAH K O,et al.MeDShare:Trust-less medical data sharing among cloud service providers via blockchain[J].IEEE Access,2017,5:14757-14767. [18] GUO R,SHI H,ZHAO Q,et al.Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems[J].IEEE access,2018,6:11676-11686. [19] LIANG G,WELLER S R,LUO F,et al.Distributed blockchain-based data protection framework for modern power systems against cyber attacks[J].IEEE Transactions on Smart Grid,2018,10(3):3162-3173. [20] ZYSKIND G,NATHAN O.Decentralizing privacy:Usingblockchain to protect personal data[C]//2015 IEEE Security and Privacy Workshops.IEEE,2015:180-184. [21] LIANG X,SHETTY S,TOSH D,et al.Provchain:A block-chain-based data provenance architecture in cloud environment with enhanced privacy and availability[C]//2017 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing (CCGRID).IEEE,2017:468-477. [22] JIA D,XIN J,WANG Z,et al.ElasticChain:support very large blockchain by reducing data redundancy[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data.Cham:Springer,2018:440-454. [23] GAETANI E,ANIELLO L,BALDONI R,et al.Blockchain-based database to ensure data integrity in cloud computing environments[C]//Italian Conference on Cybersecurity.2017. [24] YANG C,CHEN X,XIANG Y.Blockchain-based publicly verifiable data deletion scheme for cloud storage[J].Journal of Network and Computer Applications,2018,103:185-193. |
[1] | CHANG Bing-guo, SHI Hua-long, CHANG Yu-xin. Multi Model Algorithm for Intelligent Diagnosis of Melanoma Based on Deep Learning [J]. Computer Science, 2022, 49(6A): 22-26. |
[2] | CHAO Le-men, WANG Rui. Data Science Platform:Features,Technologies and Trends [J]. Computer Science, 2021, 48(8): 1-12. |
[3] | ZHUANG Yuan, GUO Qiang, ZHANG Jie, ZENG Yun-hui. Large Scalability Method of 2D Computation on Shenwei Many-core [J]. Computer Science, 2020, 47(8): 87-92. |
[4] | YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302. |
[5] | WU Bin-feng. Design of IoT Middleware Based on Microservices Architecture [J]. Computer Science, 2019, 46(6A): 580-584. |
[6] | ZHAO Xing-wang,LIANG Ji-ye,GUO Lan-jie. Collaborative Filtering Recommendation Algorithm Based on Space Transformation [J]. Computer Science, 2018, 45(7): 16-21. |
[7] | ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2018, 45(2): 20-24. |
[8] | ZHOU Qiang, XIE Jing and ZHAO Hua-ming. Architecture and Solution for Large Web Sites [J]. Computer Science, 2017, 44(Z6): 587-590. |
[9] | HAI Mo and ZHANG You. Performance Comparison of Clustering Algorithms in Spark [J]. Computer Science, 2017, 44(Z6): 414-418. |
[10] | TANG Bing, Laurent BOBELIN and HE Hai-wu. Parallel Algorithm of Nonnegative Matrix Factorization Based on Hybrid MPI and OpenMP Programming Model [J]. Computer Science, 2017, 44(3): 51-54. |
[11] | XU Jing, REN Kai-jun and LI Xiao-yong. Parallel Algorithm Design and Optimization of Range Query for Meteorological Data Retrieval [J]. Computer Science, 2017, 44(3): 42-47. |
[12] | LIU Lin and ZHOU Jian-tao. Review for Research of Control Plane in Software-defined Network [J]. Computer Science, 2017, 44(2): 75-81. |
[13] | HE Yan-xiang, YU Tao, CHEN Yan-zhao, LI Qing-an and FAN Tong-rang. Data Storage and Query in Internet of Things [J]. Computer Science, 2015, 42(3): 185-190. |
[14] | FU Teng and GAO Jian-hua. Metadata Checking and Testing of Web Application Based on Invariance [J]. Computer Science, 2014, 41(8): 224-228. |
[15] | XIE Ping. Survey on Data Deduplication Techniques for Storage Systems [J]. Computer Science, 2014, 41(1): 22-30. |
|