[1] |
BUYYA R , YEO C S , VENUGOPAL S ,et al. Cloud computing and emerging IT platforms:vision,hype,and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009,25(6): 599-616.
|
[2] |
WU J , SHEN Q , WANG T ,et al. Recent advances in cloud security[J]. Journal of Computers, 2014,5(10): 2156-2163.
|
[3] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, 2007: 598-609.
|
[4] |
BOWERS K D , JUELS A , OPREA A . Proofs of retrievability:theory and implementation[C]// ACM Cloud Computing Security Workshop,CCSW 2009. Chicago,Il,USA, 2009: 43-54.
|
[5] |
CHOUDHURY A J , KUMAR P , SAIN M ,et al. A strong user authentication framework for cloud computing[C]// IEEE Asia-Pacific Services Computing Conference. Jeju,Korea, 2011: 110-115.
|
[6] |
LIU C , CHEN J , YANG L T ,et al. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,25(9): 2234-2244.
|
[7] |
GRITTI C , SUSILO W , PLANTARD T . Efficient dynamic provable data possession with public verifiability and data privacy[M]// Information Security and Privacy. Springer International Publishing, 2015: 395-412.
|
[8] |
WANG B , LI B , LI H . Panda:public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2015(1): 92-106.
|
[9] |
SHEN S T , ZENG W G . Delegable provable data possession for remote data in the clouds[M]// Information and Communications Security. Springer Berlin Heidelberg, 2011: 93-111.
|
[10] |
WANG H . Proxy provable data possession in public clouds[J]. IEEE Transactions on Services Computing, 2013,6(4): 551-559.
|
[11] |
RUAN H M , LEI C L . Fine-grained audit privilege control for integrity audit on cloud storage[C]// 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS). IEEE, 2014: 156-163.
|
[12] |
XU J , CHEN W , JI S ,et al. A novel preserving client privacy and designate verifier auditing scheme for cloud storage[J]. International Journal of Security and Its Applications, 2015,9(1): 295-304.
|
[13] |
NIMMY K , SETHUMADHAVAN M . Novel mutual authentication protocol for cloud computing using secret sharing and steganography[C]// Applications of Digital Information and Web Technologies. IEEE, 2014: 101-106.
|
[14] |
HAO Z , ZHONG S , YU N ,et al. A time-bound ticket-based mutual authentication scheme for cloud computing[J]. International Journal of Computers Communications & Control, 2011,(VI2): 227-235.
|
[15] |
HUANG J J , JUANG W S , FAN C I ,et al. Robust and privacy protection authentication in cloud computing[J]. International Journal of Innovative Computing,Information and Control, 2013,9(11): 4247-4261.
|
[16] |
NAGARAJU S , PARTHIBAN L . SecAuthn:provably secure multifactor authentication for the cloud computing systems[J]. Indian Journal of Science and Technology, 2016,9(9).
|
[17] |
HAHN C , KWON H , KIM D ,et al. Enhanced authentication for outsourced educational contents through provable block possession[J]. Multimedia Tools & Applications, 2015,23: 1-20.
|
[18] |
CREMERS C , FELTZ M . Beyond eCK:perfect forward secrecy under actor compromise and ephemeral-key reveal[J]. Designs,Codes and Cryptography, 2015,74(1): 183-218.
|
[19] |
KRAWCZYK H , . HMQV:a high-performance secure Diffie-Hellman protocol[C]// Advances in Cryptology–CRYPTO 2005. Springer Berlin Heidelberg, 2005: 546-566.
|
[20] |
SCOTT M , . MIRACL-multiprecision integer and rational arithmetic C/C++ library(1988-2007)[EB/OL]. .
|