[1] |
中国互联网络发展状况统计报告:2016-1[EB/OL]. .
|
|
Report of China Internet development statistics:2016-1[EB/OL]. .
|
[2] |
李瑞轩, 董新华, 辜希武 , 等. 移动云服务的数据安全与隐私保护综述 [J]. 通信学报, 2013, 34(12): 158-166.
|
|
LI R X , DONG X H , GU X W , et al. Overview of the data security and privacy-preserving of mobile cloud services[J]. Journal on Communications, 2013, 34(12): 158-166.
|
[3] |
何欢, 何倩 . 数据备份与恢复[M]. 北京: 机械工业出版社, 2010.
|
|
HE H , HE Q . Data backup and recovery[M]. Beijing: China Machine Press, 2010.
|
[4] |
张龙立 . 云存储技术探讨[C]// 中国云计算与SaaS大会. c2010.
|
|
ZHANG L L . Cloud storage technology[C]// The 1st Chinese Con-ference on Cloud Computing and SaaS. c2010.
|
[5] |
张桂刚, 李超, 张勇 , 等. 一种基于海量信息处理的云存储模型研究[J]. 计算机研究与发展, 2012, 49(z1): 32-36.
|
|
ZHANG G H , LI C , ZHANG Y , et al. A kind of cloud storage model research based on massive information processing[J]. Jour-nal of Computer Research and Development, 2012, 49(z1): 32-36.
|
[6] |
吴胜艳, 许力, 林昌露 . 基于门限属性加密的安全分布式云存储模型[J]. 计算机应用, 2013, 33(7): 1880-1884.
|
|
WU S Y , XU L , LIN C L . Secure and distributed cloud storage model from threshold attribute-based encryption[J]. Journal of Computer Applications, 2013, 33(7): 1880-1884.
|
[7] |
JUELS A , KALISKI JR B S . Pors:proofs of retrievability for large files[C]// The 14th ACM Conference on Computer and Communi-cations Security. c2007: 584-597.
|
[8] |
ATENIESE G , BURNS R , CURTMOLA R , et al. Provable data possession at untrusted stores[C]// The 14th ACM conference on Computer and Communications Security. c2007: 598-609.
|
[9] |
ATENIESE G , PIETRO D R , MANCINI L V , et al. Scalable and efficient provable data possession[C]// The 4th International Con-ference on Security and Privacy in Communication Netowrks.ACM, c2008: 9.
|
[10] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[M]// Advances in Cryptology—EUROCRYPT'98. Berlin Heidelberg:Springer 1998: 127-144.
|
[11] |
ATENIESE G , FU K , GREEN M , et al. Improved proxy re-encryption schemes with applications to secure distributed stor-age[J]. ACM Transactions on Information and System Security (TISSEC), 2006, 9(1): 1-30.
|
[12] |
IBRAIMI L , TANG Q , HARTEL P , et al. A type-and-identity-based proxy re-encryption scheme and its application in health-care[M]// Secure Data Management. Berlin Heidelberg:Springer: 2008, 185-198.
|
[13] |
TABAN G , CáRdenas A A , GLIGOR V D . Towards a secure and interoperable DRM architecture[C]// ACM Workshop on Digital rights Management. c2006: 69-78.
|
[14] |
王红兵 . 基于双线性配对的代理重加密的研究[D]. 上海: 上海交通大学, 2013.
|
|
WANG H B . Research on bilinear pairing based proxy re-encryption[D]. Shanghai: Shanghai Jiao tong University, 2013.
|