[1] |
谭霜, 贾焰, 韩伟红 . 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1): 164-177.
|
|
TAN S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015,38(1): 164-177.
|
[2] |
WANG Q , WANG C , LI J ,et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// The 14th European Symposium on Research in Computer Security. 2009: 355-370.
|
[3] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83.
|
|
FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[4] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// The ACM Conference on Computer and Communications Security. ACM, 2007: 598-609.
|
[5] |
JUELS A , KALISKI B S . Pors:proofs of retrievability for large files[C]// The 14th ACM Conference on Computer and Communications Security. ACM, 2007: 584-597.
|
[6] |
熊金波, 张媛媛, 李凤华 ,等. 云环境中数据安全去重研究进展[J]. 通信学报, 2016,37(11): 169-180.
|
|
XIONG J B , ZHANG Y Y , LI F H ,et al. Research progress on secure data deduplication in cloud[J]. Journal on Communications, 2016,37(11): 169-180.
|
[7] |
熊金波, 张媛媛, 田有亮 ,等. 基于角色对称加密的云数据安全去重[J]. 通信学报, 2018,39(5): 59-73.
|
|
XIONG J B , ZHANG Y Y , TIAN Y L ,et al. Cloud data secure deduplication scheme via role-based symmetric encryption[J]. Journal on Communications, 2018,39(5): 59-73.
|
[8] |
郭晓勇, 付安民, 况博裕 ,等. 基于收敛加密的云安全去重与完整性审计系统[J]. 通信学报, 2017,38(Z2): 156-163.
|
|
GUO X Y , FU A M , KUANG B Y ,et al. Secure deduplication and integrity audit system based on convergent encryption for cloud storage[J]. Journal on Communications, 2017,38(Z2): 156-163.
|
[9] |
熊金波, 李素萍, 张媛媛 ,等. 共享所有权证明:协作云数据安全去重新方法[J]. 通信学报, 2017,38(7): 18-27.
|
|
XIONG J B , LI S P , ZHANG Y Y ,et al. PoSW:novel secure deduplication scheme for collaborative cloud applications[J]. Journal on Communications, 2017,38(7): 18-27.
|
[10] |
杨超, 纪倩, 熊思纯 ,等. 新的云存储文件去重复删除方法[J]. 通信学报, 2017,38(3): 25-33.
|
|
YANG C , JI Q , XIONG S C ,et al. New method for file deduplication in cloud storage[J]. Journal on Communications, 2017,38(3): 25-33.
|
[11] |
YUAN J , YU S . Secure and constant cost public cloud storage auditing with deduplication[C]// The 1st IEEE Conference on Communications and Network Security. IEEE, 2013: 145-153.
|
[12] |
LI J , LI J , XIE D ,et al. Secure auditing and deduplicating data in cloud[J]. IEEE Transactions on Computers, 2016,65(8): 2386-2396.
|
[13] |
KIRAZ M S . Solving the secure storage dilemma:an efficient scheme for secure deduplication with privacy-preserving public auditing[J]. IACR Cryptology ePrint Archive, 2016:696.
|
[14] |
YU J , REN K , WANG C ,et al. Enabling cloud storage auditing with key-exposure resistance[J]. IEEE Transactions on Information Forensics and Security, 2017,10(6): 1167-1179.
|
[15] |
YU J , WANG H . Strong key-exposure resilient auditing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017,12(8): 1931-1940.
|
[16] |
CHATTERJEE S , SARKAR P . Identity-based encryption[M]. Boston: Springer Science & Business MediaPress, 2011: 29-48.
|
[17] |
BLOOM B H . Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970,13(7): 422-426.
|
[18] |
BLASCO J , PIETRO R D , ORFILA A ,et al. A tunable proof of ownership scheme for deduplication using Bloom filters[C]// The IEEE Conference on Communications and Network Security. IEEE, 2014: 481-489.
|
[19] |
WANG C , CHOW S S , WANG Q ,et al. Privacy-preserving publicauditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013,62(2): 362-375.
|