[4] |
张宇 . Verizon报告称两成数据泄露皆因“杂项错误”[J]. 计算机与网络, 2016,42(8): 52.
|
|
ZHANG Y . Verizon report shows fifth of breaches caused by “miscellaneous errors”[J]. Computer and Network Journal, 2016,42(8): 52.
|
[5] |
TAKABI H , JOSHI J B D , AHN G . Security and privacy challenges in cloud computing environments[J]. IEEE Security & Privacy, 2010,8(6): 24-31.
|
[6] |
吕志泉, 张敏, 冯登国 . 云存储密文访问控制方案[J]. 计算机科学与探索, 2011,5(9): 835-844.
|
|
LV Z Q , ZHANG M , FENG D G . Cryptographic access control scheme for cloud storage[J]. Journal of Frontiers of Computer Science and Technology, 2011,5(9): 835-844.
|
[7] |
洪澄, 张敏, 冯登国 . 面向云存储的高效动态密文访问控制方法[J]. 通信学报, 2011,32(7): 123-132.
|
|
HONG C , ZHANG M , FENG D G . Achieving efficient dynamic cryp-tographic access control in cloud storage[J]. Journal on Communica-tions, 2011,32(7): 123-132.
|
[8] |
洪澄, 张敏, 冯登国 . AB-ACCS:一种云存储密文访问控制方法[J]. 计算机研究与发展, 2010,47(z1): 259-365.
|
|
HONG C , ZHANG M , FENG D G . AB-ACCS:A cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010,47(z1): 259-365.
|
[9] |
侯清铧, 武永卫, 郑纬民 . 一种保护云存储平台上用户数据私密性的方法[J]. 计算机研究与发展, 2011,48(7): 1146-1154.
|
[1] |
MELL P , GRANCE T . The NIST definition of cloud computing[R]. National Institute of Standards and Technology(NIST),Washington,USA:Technical Report Special Publication, 2011: 800-145.
|
[2] |
李晖, 孙文海, 李凤华 ,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014,51(7): 1397-1409.
|
[9] |
HOU Q H , WU Y W , ZHEN W M . A method on protection of user da-ta privacy in cloud storage platform[J]. Journal of Computer Research and Development, 2011,48(7): 1146-1154.
|
[10] |
EKASIT K . Improving the communication performance of distributed animation rendering using BitTorrent file system[J]. Journal of Systems & Software, 2014,97: 178-191.
|
[2] |
LI H , SUN W H , LI F H ,et al. Secure and privacy-preserving data storage storage service in public cloud[J]. Journal of Computer Re-search and Development, 2014,51(7): 1397-1409.
|
[3] |
傅颖勋, 罗圣美, 舒继武 . 安全云存储系统与关键技术综述[J]. 计算机研究与发展, 2013,50(1): 136-145.
|
[11] |
GHEMAWAT S , GOBIOFF H , LEUNG S T . The google file system[C]// Proc of the 19th ACM Symp on Operating Systems Principles. New York :ACM , 2003: 29-43.
|
[12] |
何高峰 . 基于 HDFS 的多租户小文件存储系统的研究与设计[D]. 杭州:浙江大学, 2016.
|
|
HE G F . Research and design of multi-tenant small file storage system based on HDFS[D]. Hangzhou:Zhejiang University, 2016.
|
[13] |
TAL G , MENDAL R , DAN B . A broader vision for trusted computing[C]// 9th Workshop on Hot Topics in Operating System, 2003.
|
[14] |
EMMETT W , JUNGHWAN R , KRSTE A . Mondrix:memory isolation for linux using mondriaan memory protection[C]// The 20th ACM Symposium on OS Principles. Brighton,UK, 2005.
|
[15] |
TAL G , BEN P , JIM C ,et al. Terra:a virtual machine-based platform for trusted computing[J]. ACM Sigops Operating Systems Review, 2003,37(5): 193-206.
|
[16] |
CHEN X X , TAL G , LEWIS E C ,et al. Overshadow:a virtualization-based approach to retrofitting protection in commodity operating systems[J]. ACM Sigplan Notices, 2008,43(3): 2-13.
|
[17] |
毛文波 . 可信云安全的原理与应用[C]// 第三届中国云计算大会, 2011.
|
|
MAO W B , . Trusted and secure cloud principle and practice[C]// 3rd China Cloud Computing Conference, 2011.
|
[18] |
DUA R , RAJA A R , KAKADIA D . Virtualization vs containerization to support PaaS[J]. IEEE International Conference on Cloud Engineering, 2014,41: 610-614.
|
[19] |
佘冉君 . SSL安全研究及实现[D]. 西安:西安电子科技大学, 2015.
|
|
SHE R J . The SSL security research and implementation[D]. Xi’an:Xidian University, 2015.
|
[20] |
王彬 . 基于 OpenStack 的云平台管理系统的设计与实现[D]. 北京:北京交通大学, 2016.
|
|
WANG B . Design and implementation of cloud platform management system based on OpenStack[D]. Beijing Jiaotong University, 2016.
|
[21] |
BLAZE M , . A cryptographic file system for UNIX[C]// The 1st ACM Conf on Communications and Computing Security. 1993: 9-16.
|
[22] |
RIVEST R L , SMITH A C , FU K E . Group sharing and random access in cryptographic storage file systems[M]. Massachusetts Institute of Technology. 1999.
|
[23] |
KALLAHALLA M , RIEDEL E , SWAMINATHAN R ,et al. Plutus:scalable secure file sharing on untrusted storage[C]// The 2nd Conf on File and Storage Technologies. Berkley:USENIX Association, 2003.
|
[24] |
薛矛, 薛巍, 舒继武 ,等. 一种云存储环境下的安全存储系统[J]. 计算机学报, 2015,38(5): 987-998.
|
|
XUE M , XUE W , SHU J W ,et al. A secure storage system over cloud storage environment[J]. Chinese Journal of Computers, 2015,38(5): 987-998.
|
[25] |
张逢喆, 陈进, 陈海波 . 云计算中的数据隐私性保护与自我销毁[J]. 计算机研究与发展, 2011,48(7): 1155-1167.
|
|
ZHANG F Z , CHEN J , CHEN H B ,et al. Lifetime privacy and self-destruction of data in the cloud[J]. Journal of Computer Research and Development, 2011,48(7): 1155-1167.
|
[26] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// The INFOCOM 2010 Mini-Conference.San Diego. 2010: 1-5.
|
[27] |
WANG Q , CAO N , LI J ,et al. Secure ranked keyword search over encrypted cloud data[C]// The 30th International Conference on Distributed Computing Systems. Genoa,Italy, 2010: 253-262.
|
[28] |
WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(8): 1467-1479.
|
[3] |
FU Y X , LUO S M , SHU J W . Survey of Secure Cloud Storage System and Key Technologies[J]. Journal of Computer Research and Devel-opment , 2013,50(1): 136-145.
|