[1] |
MELL P , GRANCE T . The NIST definition of cloud computing[J]. Communications of the ACM, 2011,53(6): 50.
|
[2] |
WANG T , XING G , LI M ,et al. Efficient Wi-Fi deployment algorithms based on realistic mobility characteristics[C]// Mobile Ad hoc and Sensor Systems (MASS). IEEE, 2010: 422-431.
|
[3] |
李晖, 孙文海, 李凤华 ,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014,51(7): 1397-1409.
|
|
LI H , SUN W H , LI F H ,et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014,51(7): 1397-1409.
|
[4] |
肖亮, 李强达, 刘金亮 . 云存储安全技术研究进展综述[J]. 数据采集与处理, 2016,31(3): 464-472.
|
|
XIAO L , LI Q D , LIU J L . Survey on secure cloud storage[J]. Journal of Data Acquisition and Processing, 2016,31(3): 464-472.
|
[5] |
MCELIECE R J , SARWATE D V . On sharing secrets and Reed-Solomon codes[J]. Communications of the ACM, 1981,24(9): 583-584.
|
[6] |
PLANK J S , . T1:erasure codes for storage applications[C]// The 4th USENIX Conference on File and Storage Technologies. USENIX, 2005: 1-74.
|
[7] |
黄汝维, 桂小林, 余思 ,等. 云环境中支持隐私保护的可计算加密方法[J]. 计算机学报, 2011,34(12): 2391-2402.
|
|
HUANG R W , GUI X L , YU S ,et al. Privacy-preserving computable encryption scheme of cloud computing[J]. Chinese Journal of Computers, 2011,34(12): 2391-2402.
|
[8] |
BELLARE M , HOFHEINZ D , KILTZ E . Subtleties in the definition of IND-CCA:when and how should challenge decryption be disallowed[J]. Journal of Cryptology, 2015,28(1): 29-48.
|
[9] |
成春香, 张伟, 徐涛 . 一种基于云存储的数据安全与隐私保护系统[J]. 北京信息科技大学学报(自然科学版), 2013(2): 87-90.
|
|
CHENG C X , ZHANG W , XU T . A data security and privacy protection system based on cloud storage[J]. Journal of Beijing Information Science and Technology University, 2013(2): 87-90.
|
[10] |
侯清铧, 武永卫, 郑纬民 ,等. 一种保护云存储平台上用户数据私密性的方法[J]. 计算机研究与发展, 2011,48(7): 1146-1154.
|
|
HOU Q H , WU Y W , ZHENG W M ,et al. A method on protection of user data privacy in cloud storage platform[J]. Journal of Computer Research and Development, 2011,48(7): 1146-1154.
|
[11] |
BARHAM P , DRAGOVIC B , FRASER K ,et al. Xen and the art of virtualization[C]// ACM SIGOPS Operating Systems Review. ACM, 2003,37(5): 164-177.
|
[12] |
SHEN J , SHEN J , CHEN X F ,et al. An efficient public auditing protocol with novel dynamic structure for cloud data[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10): 2402-2415.
|
[13] |
SHEN J , LIU D Z , SHEN J ,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities[J]. Pervasive Mobile Computing, 2017(41): 219-230.
|
[14] |
傅颖勋, 罗圣美, 舒继武 . 安全云存储系统与关键技术综述[J]. 计算机研究与发展, 2013,50(1): 136-145.
|
|
FU Y X , LUO S M , SHU J W . Survey of secure cloud storage system and key technologies[J]. Journal of Computer Research and Development, 2013,50(1): 136-145.
|
[15] |
BHUIYAN M Z A , WANG T , HAYAJNEH T ,et al. Maintaining the balance between privacy and data integrity in Internet of things[C]// The 2017 International Conference on Management Engineering,Software Engineering and Service Sciences. ACM, 2017: 177-182.
|
[16] |
BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the Internet of things[C]// Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, 2012: 13-16.
|
[17] |
STOJMENOVIC I , WEN S . The fog computing paradigm:scenarios and security issues[C]// Computer Science and Information Systems (FedCSIS). IEEE, 2014: 1-8.
|
[18] |
曾建电, 王田, 贾维嘉 ,等. 传感云研究综述[J]. 计算机研究与发展, 2017,54(5): 925-939.
|
|
ZENG J D , WANG T , JIA W J ,et al. Survey of sensor-cloud[J]. Journal of Computer Research and Development, 2017,54(5): 925-939.
|
[19] |
王田, 李洋, 贾维嘉 ,等. 传感云安全研究进展[J]. 通信学报, 2018,39(3): 35-52.
|
|
WANG T , LI Y , JIA W J ,et al. Research on security of sensor-cloud[J]. Journal of Communication, 2018,39(3): 35-52.
|
[20] |
LAI Y X , XIE J S , LIN Z Y ,et al. Adaptive data gathering in mobile sensor networks using speedy mobile elements[J]. Sensors, 2015,15(9): 23218-23248.
|
[21] |
WANG T , LI Y , WANG G J ,et al. Sustainable and efficient data collection from WSNs to cloud[J]. IEEE Transactions on Sustainable Computing, 2017: 1.
|
[22] |
BERLEKAMP E R . Galois field computer:US4,162,480[P]. 1979.
|
[23] |
BAKHTIARI S , SAFAVI-NAINI R , PIEPRZYK J . Cryptographic hash functions:a survey[J]. Centre for Computer Security Research, 1995(4): 95-109.
|