[1] |
熊金波, 李凤华, 王彦超 ,等. 基于密码学的云数据确定性删除研究进展[J]. 通信学报, 2016,37(8): 167-184.
|
|
XIONG J B , LI F H , WANG Y C ,et al. Research progress on cloud data assured deletion based on cryptography[J]. Journal on Communications, 2016,37(8): 167-184.
|
[2] |
NAIR S K , DASHTI M T , CRISPO B ,et al. A hybrid PKI-IBC based ephemerizer system[C]// Proceedings of the International Information Security Conference.[S.l.:s.n.], c2007: 241-252.
|
[3] |
TANG Y , LEE P P , LUI J C ,et al. FADE:secure overlay cloud storage with file assured deletion[C]// Proceedings of the Security and Privacy in Communication Networks (SecureComm).[S.l.:s.n.], c2010: 380-397.
|
[4] |
GEAMBASU R , KOHNO T , LEVY A ,et al. Vanish:increasing data privacy with self-destructing data[C]// Proceedings of the 18th USENIX Security Symposium.[S.l.:s.n.], c2009: 299-315.
|
[5] |
DABEK F . A distributed hash table[D]. Massachusetts:Massachusetts Institute of Technology, 2005.
|
[6] |
WOLCHOK S , HOFMANN O S , HENINGER N ,et al. Defeating vanish with lowcost sybil attacks against large DHTs[C]// Proceedings of the 17th Annual Network & Distributed System Security Conference (ISOC NDSS).[S.l.:s.n.], c2010: 1-15.
|
[7] |
ZENG L , SHI Z , XU S ,et al. SafeVanish:an improved data self-destruction for protecting data privacy[C]// Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). Piscataway:IEEE Press, 2010: 521-528.
|
[8] |
熊金波, 沈薇薇, 黄阳群 ,等. 云环境下的数据多副本安全共享与关联删除方案[J]. 通信学报, 2015,36(S1): 136-140.
|
|
XIONG J B , SHEN W W , HUANG Y Q ,et al. Security sharing and associated deleting scheme for multi-replica in cloud[J]. Journal on Communications, 2015,36(S1): 136-140.
|
[9] |
ZHANG M , ZHANG H , YANG Y ,et al. PTAD:provable and traceable assured deletion in cloud storage[C]// Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC). Piscataway:IEEE Press, 2019.
|
[10] |
杜瑞忠, 石朋亮, 何欣枫 . 基于覆写验证的云数据确定性删除方案[J]. 通信学报, 2019,40(1): 130-140.
|
|
DU R Z , SHI P L , HE X F . Cloud data assured deletion scheme based on overwrite verification[J]. Journal on Communications, 2019,40(1): 130-140.
|
[11] |
余海波 . 基于区块链的数据分布式存储安全机制研究[D]. 上海:华东师范大学, 2020.
|
|
YU H B . Research on security mechanism of data distributed storage based on blockchain[D]. Shanghai:East China Normal University, 2020.
|
[12] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[13] |
LIU J K , WEI V K , WONG D S . Linkable spontaneous anonymous group signature for Ad Hoc groups[C]// Proceedings of the Australasian Conference on Information Security and Privacy. Heidelberg:Springer, 2004.
|
[14] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[Z]. 2008.
|
[15] |
李董, 魏进武 . 区块链技术原理、应用领域及挑战[J]. 电信科学, 2016,32(12): 20-25.
|
|
LI D , WEI J W . Theory,application fields and challenge of the blockchain technology[J]. Telecommunications Science, 2016,32(12): 20-25.
|
[16] |
LI G , SATO H . A privacy-preserving and fully decentralized storage and sharing system on blockchain[C]// Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). Piscataway:IEEE Press, 2019.
|
[17] |
曹景源, 李立新, 李全良 ,等. 云存储环境下生命周期可控的数据销毁模型[J]. 计算机应用, 2017,37(5): 1335-1340.
|
|
CAO J Y , LI L X , LI Q L ,et al. Data destruction model for cloud storage based on lifecycle control[J]. Journal of Computer Applications, 2017,37(5): 1335-1340.
|
[18] |
周亮, 王震, 王冠 . 远程过程调用技术在分布式软件系统中的应用[J]. 航空电子技术, 2020,51(4): 47-52.
|
|
ZHOU L , WANG Z , WANG G . Application of remote procedure calling technology in distributed software system[J]. Avionics Technology, 2020,51(4): 47-52.
|
[19] |
Carlos-Zen,blockchain-python[S]. 2018.
|