Computer Science ›› 2017, Vol. 44 ›› Issue (2): 195-201.doi: 10.11896/j.issn.1002-137X.2017.02.031
Previous Articles Next Articles
JIN Yu and YAN Dong
[1] LIU P.Cloud Computing (Second edition)[M].Beijing:Beijing Electronic Industry Press,2011. [2] MELL P,GRANCE T.The NIST definition of cloud computing[J].Communications of the ACM,2011,3(6):50 . [3] HASAN R,YURCIK W,MYAGMAR S.The evolution of sto-rage service providers:techniques and challenges to outsourcing storage[J].ACM Workshop on Storage Security & Survivability ACM,2005:1-8. [4] MORSY M A,GRUNDY J,MLLER I.An Analysis of theCloud Computing Security Problem[C]∥Proceedings of APSEC 2010 Cloud Workshop.Sydney,Australia,2010. [5] GIANI A,BITAR E,GARCIA M,et al.Smart Grid Data Integrity Attacks[J].IEEE Transactions on Smart Grid,2013,4(3):1244-1253. [6] OUALHA N,LENEUTRE J,ROUDIER Y.Verifying remote data integrity in peer-to-peer data storage:A comprehensive survey of protocols[J].Peerto-Peer Networking and Applications,2012,5(3):231-243. [7] WANG C,REN K,LOU W,et al.Toward publicly auditable secure cloud data storage services[J].Network,IEEE,2010,24(4):19-24. [8] MAMBO M,USUDA K,OKAMOTO E.Proxy signature:delegation Of the power to sign messages[J].Ieice Transactions on Fundamentals of Electronics Communications & Computer Scien-ces,1996,79(9):1338-1354. [9] ATENIESE G,BURNS R C,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Secu-rity.2007:598-609. [10] JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597. [11] ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalableand efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:1-10. [12] ERWAY C.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222. [13] WANG C,WANG Q,REN K.Ensuring data storage security in cloud computing[C]∥17th International Workshop on Quality of Service,2009.IWQoS.2009. [14] WANG Q,WANG C,LI J,et al.Enabling public verifiabilityand data dynamics for storage security in cloud computing[M]∥Computer Security(ESORICS 2009).Springer Berlin Heidelberg,2009:355-370. [15] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥ 2010 Proceedings IEEE INFOCOM.2010:1-9. [16] WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859. [17] KIM S,PARK S,WON D.Proxy signatures,Revisited[J].Infor-mation and Communications Security,1997:223-232. [18] http://wiki.apache.org/hadoop/#MapReduce. [19] GUO Peng.Cassandra in Action.China Machine Press. |
No related articles found! |
|