[1] |
GANTZ B J , REINSEL D . Big data,bigger digital shadows,and biggest growth in the far east executive summary:a universe of opportunities and challenges[C]// Idc. 2007: 1-16.
|
[2] |
HALEVI S , HARNIK D , PINKAS B ,et al. Proofs of ownership in remote storage systems[C]// The 18th ACM conference on Computer and communications security. 2011: 491-500.
|
[3] |
杨超, 纪倩, 熊思纯 ,等. 新的云存储文件去重复删除方法[J]. 通信学报, 2017,38(3): 25-33.
|
|
YANG C , JI Q , XIONG S . New method for file deduplication in cloud storage[J]. Journal on Communications, 2017,37(3): 25-33.
|
[4] |
LI J , CHEN X F , LI M Q ,et al. Secure deduplication with efficient and reliable convergent key management[J]. IEEE Trans on Parallel and Distributed Systems, 2014,25(6): 1615-1625.
|
[5] |
DOUCEUR J R , ADYA A , BOLOSKY W J ,et al. Reclaiming space from duplicate files in a serverless distributed file system[C]// 22nd International Conference on Distributed Computing Systems, 2002: 617-624.
|
[6] |
熊金波, 张媛媛, 李凤华 ,等. 云环境中数据安全去重研究进展[J]. 通信学报, 2016,37(11): 169-180.
|
|
XIONG J B , ZHANG Y Y , LI F H ,et al. Research progress on secure data deduplication in cloud[J]. Journal on Communications, 2016,31(1 1): 169-180.
|
[7] |
CHEN R , MU Y , YANG G ,et al. BL-MLE:block-level message-locked encryption for secure large file deduplication[J]. IEEE Trans actions on Information Forensics and Security, 2015,10(12): 2643-2652.
|
[8] |
BELLARE M , KEELVEEDHI S , RISTENPART T . Message-locked encryption and secure deduplication[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2013: 296-312.
|
[9] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// The 14th ACM conference on Computer and communications security. 2007: 598-609.
|
[10] |
黄龙霞, 张功萱, 付安民 . 基于层次树的动态群组隐私保护公开审计方案[J]. 计算机研究与发展, 2016,53(10): 2334-2342.
|
|
HUANG L X , ZHANG G X , FU A M . Privacy-preserving public auditing for dynamic group based on hierarchical tree[J]. Journal of Computer Research and Development, 2016,53(10): 2334-2342.
|
[11] |
LI Y , FU A , YU Y ,et al. IPOR:an efficient IDA-based proof of retrievability scheme for cloud storage systems[C]// 2017 IEEE International Conference on Communications (ICC). 2017: 1-6.
|
[12] |
FU A , YU S , ZHANG Y ,et al. NPP:a new privacy-aware public auditing scheme for cloud data sharing with group users[J]. IEEE Transactions on Big Data, 2017
|
[13] |
付安民, 秦宁元, 宋建业 ,等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案[J]. 计算机研究与发展, 2015,52(10): 2353-2362.
|
|
FU A M , QIN N Y , SONG J Y . Privacy-preserving public auditing for multiple managers shared data in the cloud[J][J]. Journal of Computer Research and Development, 2015,52(10): 2353-2362.
|
[14] |
HUANG L , ZHANG G , FU A . Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group[C]// The Australasian Computer Science Week Multiconference. 2017:76.
|
[15] |
YUAN J , YU S . Secure and constant cost public cloud storage auditingwith deduplication[C]// 2013 IEEE Conference on Communications and Network Security (CNS). 2013: 145-153.
|
[16] |
LI J , LI J , XIE D ,et al. Secure auditing and deduplicating data in cloud[J]. IEEE Transactions on Computers, 2016,65(8): 2386-2396.
|
[17] |
LIU X , SUN W , LOU W ,et al. One-tag checker:message-locked integrity auditing on encrypted cloud deduplication storage[J]. IEEE International Conference on Computer Communications, 2017.
|
[18] |
SHACHAM H , WATERS B . Compact proofs of retrievability[C]// Asiacrypt. 2008: 90-107.
|
[19] |
BOLDYREVA A , . Threshold signatures,multi signatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme[C]// International Workshop on Public Key Crypto graphy. 2003: 31-46.
|