[1] |
王国峰, 刘川意, 潘鹤中, 方滨兴 . 云计算模式内部威胁综述[J]. 计算机学报, 2017,40(02): 296-316.
|
|
WANG G F , LIU C Y , PAN H Z , FANG B X . Survey on Insider to Cloud Computing[J]. Chinese Journal of Computers, 2017,40(02): 296-316.
|
[2] |
KAUSPADIENE L , RAMANAUSKAITE S , CENYS A ,et al. Modeling of enterprise management structure for data Leakage evaluation[J]. Information Security Journal:A Global Perspective, 2018,27(1): 1-13.
|
[3] |
RAMOKAPANE K M , RASHID A , SUCH J M . Assured deletion in the cloud:requirements,challenges and future directions[C]// ACM On Cloud Computing Security Workshop. 2011: 97-108.
|
[4] |
熊金波, 李凤华, 王彦超, 马建峰, 姚志强 . 基于密码学的云数据确定性删除研究进展[J]. 通信学报, 2016,37(08): 167-184.
|
|
XIONG J B , LI F H , WANG Y C . Research progress on cloud data assured deletion based on cryptography[J]. Journal on Communication, 2016,37(8): 168-184.
|
[5] |
GEAMBASU R , KOHNO T , LEVY A ,et al. Vanish:increasing data privacy with self-destructing data[C]// ACM Conference on USENIX Security Symposium. 2009: 299-316.
|
[6] |
ZENG L , SHI Z , XU S ,et al. SafeVanish:an improved data self-destruction for protecting data privacy[C]// IEEE International Conference on Cloud Computing Technology and Science. 2010: 521-528.
|
[7] |
LI C L , CHEN Y , ZHOU Y D . A data assued deletion scheme in cloud storage[J]. China Communication, 2014,11(04): 98-110.
|
[8] |
YAO W B , CHEN Y J , WANG D B . Cloud multimedia files assured deletion based on bit stream transformation with chaos sequence[J]. Algorithms and Architectures for Parallel Processing.ICA3PP, 2017: 441-451.
|
[9] |
XUE L , YU Y , LI Y ,et al. Efficient attribute-based encryption with attribute revocation for assured data deletion[J]. Information Sciences, 2018: 1-11.
|
[10] |
张坤, 杨超, 马建峰 ,等. 基于密文采样分片的云端数据确定性删除方法[J]. 通信学报, 2015,36(11): 108-117.
|
|
ZHANG K , YANG C , MA J F ,et al. Novel cloud data assured deletion approach based on ciphertext sample slice[J]. Journal on Communications, 2015,36(11): 108-117.
|
[11] |
MO Z , XIAO Q J , ZHOU Y . On deletion of outsourced data in cloud computing[C]// International Conference on Cloud Computing,IEEE, 2014: 344-351.
|
[12] |
XIONG J , YAO Z , MA J ,et al. A secure document self-destruction scheme with identity based encryption[C]// The International Conference on Intelligent Networking and Collaborative Systems. 2013: 239-243.
|
[13] |
MO Z , QIAO Y , CHEN S . Two-party fine-grained assured deletion of outsourced data in cloud systems[C]// International Conference on Computing System.. 2014: 308-317.
|
[14] |
YU Y , XUE L , LI Y ,et al. Assured data deletion with fine-grained access control for fog-based industrial applications[J]. IEEE Transactions on Industrial Informatics, 2018,PP(99): 1-1.
|
[15] |
曹来成, 刘宇飞, 董晓晔, 郭显 . 基于属性加密的用户隐私保护云存储方案[J]. 清华大学学报(自然科学版), 2018,58(02): 150-156.
|
|
CAO L C , LIU Y F , DONG X Y , GUO X . User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University (Science and Technology), 2018,58(02): 150-156.
|
[16] |
GEAMBASU R , KOHNO T , LEVY A ,et al. Vanish:increasing data privacy with self-destructing data[C]// The USENIX Security Symposium. 2009: 299-315.
|
[17] |
XIONG J B , YAO Z Q , MA J F ,et al. A secure self-destruction scheme with IBE for the internet content privacy[J]. Chinese Journal of Computers, 2014,37(1): 139-150.
|
[18] |
YAO Z Q , XIONG J B , MA J F ,et al. A secure electronic document self-destructing scheme in cloud computing[J]. Journal of Computer Research and Development, 2014,51(7): 1417-1423.
|
[19] |
XIONG J B , YAO Z Q , MA J F ,et al. A secure self-destruction scheme for composite documents with attribute based encryption[J]. ACTA Electronica Sinica, 2013,42(2): 366-376.
|
[20] |
ISOIT I , DAVID S , GUSTSVO A . Active pages 20 years Later:active storage for the cloud[J]. IEEE Internet Computing, 2018,22(4): 6-14.
|
[21] |
JUNG T , LI X Y , WAN Z ,et al. Privacy preserving cloud data access with multi-authorities[C]// INFOCOM. IEEE, 2013: 2625-2633.
|