[1] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York:ACM Press, 2007: 598-609.
|
[2] |
谭霜, 贾焰, 韩伟红 . 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1): 164-177.
|
|
TAN S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015,38(1): 164-177.
|
[3] |
SHI W S , PALLIS G , XU Z W . Edge computing scanning the issue[J]. Proceedings of the IEEE, 2019,107(8): 1474-1481.
|
[4] |
施巍松, 张星洲, 王一帆 ,等. 边缘计算:现状与展望[J]. 计算机研究与发展, 2019,56(1): 69-89.
|
|
SHI W S , ZHANG X Z , WANG Y F ,et al. Edge computing:state-of-the-art and future directions[J]. Journal of Computer Research and Development, 2019,56(1): 69-89.
|
[5] |
张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21.
|
|
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21.
|
[6] |
OQAILY M , JARRAYA Y , MOHAMMADY M ,et al. SegGuard:segmentation-based anonymization of network data in clouds for privacy-preserving security auditing[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(5): 2486-2505.
|
[7] |
YANG Y , CHEN Y J , CHEN F . A compressive integrity auditing protocol for secure cloud storage[J]. IEEE/ACM Transactions on Networking,2021:doi.org/10.1109/TNET.2021.3058130.
|
[8] |
CHEN X Y , SHANG T , ZHANG F ,et al. Dynamic data auditing scheme for big data storage[J]. Frontiers of Computer Science, 2020,14(1): 219-229.
|
[9] |
KONSTA A , MYTILINIS I , DOKA K ,et al. Clouseau:blockchain-based data integrity for HDFS clusters[C]// Proceedings of 2021 IEEE 37th International Conference on Data Engineering. Piscataway:IEEE Press, 2021: 2725-2728.
|
[10] |
TIAN M , YE S , ZHONG H ,et al. Identity-based proofs of storage with enhanced privacy[C]// Proceedings of International Conference on Algorithms and Architectures for Parallel Processing.[S.l.:s.n.], 2018: 461-480.
|
[11] |
SHEN W T , QIN J , YU J ,et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019,14(2): 331-346.
|
[12] |
LI Y N , YU Y , MIN G Y ,et al. Fuzzy identity-based data integrity auditing for reliable cloud storage systems[J]. IEEE Transactions on Dependable and Secure Computing, 2019,16(1): 72-83.
|
[13] |
WANG H Q . Identity-based distributed provable data possession in multicloud storage[J]. IEEE Transactions on Services Compu ting, 2015,8(2): 328-340.
|
[14] |
YU H Y , CAI Y Q , SINNOTT R O ,et al. ID-based dynamic replicated data auditing for the cloud[J]. Concurrency and Computation:Practice and Experience, 2019,31(11): 1-12.
|
[15] |
WANG F , XU L , WANG H Q ,et al. Identity-based non-repudiable dynamic provable data possession in cloud storage[J]. Computers &Electrical Engineering, 2018,69: 521-533.
|
[16] |
HE D B , KUMAR N , WANG H Q ,et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud[J]. Applied Mathematics and Computation, 2017,314: 31-43.
|
[17] |
JI Y Y , SHAO B L , CHANG J Y ,et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud,revisited[J]. Applied Mathematics and Computation, 2020,386:125478.
|
[18] |
GAO G M , FEI H X , QIN Z F . An efficient certificateless public auditing scheme in cloud storage[J]. Concurrency and Computation:Practice and Experience, 2020,32(24): e5924.
|
[19] |
WANG T , MEI Y X , LIU X X ,et al. Edge-based auditing method for data security in resource-constrained Internet of things[J]. Journal of Systems Architecture, 2021,114:101971.
|
[20] |
LIU D Z , SHEN J , VIJAYAKUMAR P ,et al. Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security[J]. Multimedia Tools and Applications, 2020,79(15/16): 10851-10870.
|
[21] |
LI B , HE Q , CHEN F F ,et al. Auditing cache data integrity in the edge computing environment[J]. IEEE Transactions on Parallel and Distributed Systems, 2021,32(5): 1210-1223.
|
[22] |
边缘计算产业联盟(ECC)与工业互联网产业联盟(AII)联合发布. 边缘计算安全白皮书[R]. 2019.
|
|
Edge Compting Consortium (ECC) and Alliance of Industrial Internet (AII) Jointly Publish. Edge compting security white paper[R]. 2019.
|