[1] |
冯登国, 张敏, 张妍 . 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83. FENG D G , ZHANG M , ZHANG Y . Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[2] |
FOSTER I , KESSELMAN C . The Grid 2:Blueprint for a New Computing Infrastructure[M]. San Francisco: Morgan Kaufmann Publishers IncPress, 2003.
|
[3] |
陈康, 郑纬民 . 云计算:系统实例与研究现状[J]. 软件学报, 2009,20(5): 1337-1348. CHEN K , ZHENG W M . Cloud computing:system instances and current research[J]. Journal of Software, 2009,20(5): 1337-1348.
|
[4] |
SENY K , KRISTIN L . Cryptographic cloud storage[A]. FC ′ OS,Financial Cryptography and Data Security[C]. Roseau,Commonwealth of Dominica, 2010. 136-149.
|
[5] |
Amazon.Amazon simple storage service[EB/OL]. . 2012.
|
[6] |
Cloud Security Alliance . Security guidance for critical areas of focus in cloud computing[EB/OL]. . 2009.
|
[7] |
YUMEREFENDI A R , CHASE J S . Strong accountability for network storage[J]. ACM Transactions on Storage, 2007,3(3): 6-16.
|
[8] |
KUBIATOWICZ J , BINDEL D , CHEN Y . Oceanstore:an architecture for global scale persistent storage[A]. International Conference on Architectural Support for Programming Languages and Operating Systems[C]. Cambridge,MA,USA, 2000. 190-201.
|
[9] |
MAHESHWARI U , VINGRALEK R , SHAPIRO W . How to build a trusted database system on untrusted storage[A]. Conference on Symposium on Operating System Design and Implementation (OSDI 00)[C]. San Diego,California,USA, 2000. 10-20.
|
[10] |
ARI J , BURTON K . PORs:proofs of retrievability for large files[A]. 14th ACM Conference on Computer and Communications Security[C]. Alexandria,VA,USA, 2007. 584-597.
|
[11] |
BOWERS K D , JUELS A , OPREA A . Proofs of retrievability:theory and implementation[A]. ACM Cloud Computing Security Workshop at CCS[C]. 2009. 43-54.
|
[12] |
BOWERS K D , JUELS A , OPREA A . HAIL:A high-availability and integrity layer for cloud storage[A]. 16th ACM Conference on Computer and Communications Security[C]. 2009. 187-198.
|
[13] |
YUN A , SHI C , KIM Y . On protecting integrity and confidentiality of cryptographic file system for outsourced storage[A]. ACM Cloud Computing Security Workshop at CCS[C]. 2009. 67-76.
|
[14] |
WANG Q , WANG C , LI J . Enabling public verifiability and data dynamics for storage security in cloud computing[J].LNCS 5789,Springer-Verlag,2009,355-370. LNCS 5789,Springer-Verlag, 2009, 355-370.
|
[15] |
ATENIESE G , BURNS R , CURTMOLA R . Remote data checking using provable data possession[J]. ACM Transactions on Information and System Security, 2011,14(1): 12-34.
|
[16] |
ATENIESE G , PIETRO R D , MANCINI L V . Scalable and efficient provable data procession[A]. 4th International Conference on Security and Privacy in Communication Networks[C]. Istanbul,Turkey, 2008. 1-10.
|
[17] |
CHRIS E , ALPTEKIN K , PAPAMANTHOU C . Dynamic provable data procession[M]. ePrint Archieve, 2009.
|
[18] |
ZHU Y,WANG H , HU Z . Efficient provable data possession for hybrid clouds[A]. 17th ACM Conference on Computer and Communications Security (CCS'10)[C]. Chicago,IL,USA, 2010. 756-758.
|
[19] |
CURTMOLA R , KHAN O , BURNS R . MR-PDP:Multiple replica provable data possession[A]. 28th IEEE International Conference on Distributed Computing Systems[C]. Beijing,China, 2008. 411-420.
|
[20] |
SHAH A , BAKER M , MOGUL C . Auditing to keep online storage services honest[A]. 11th Workshop on Hot Topics in Operating Systems[C].San Diego,California,USA. 2005. 1-6.
|