[1] |
ATENIESE G , BURNS R , CURTMOLA R , et al. Provable data pos-session at untrusted stores[C]//ACM CCS. 2007:598-610.
|
[2] |
ATENIESE G , KAMARA S , KATZ J . Proofs of storage from homomorphic identification protocols[C]//ASIACRYPT 2009:319-333.
|
[3] |
BONEH D , LYNN B , SHACHAM H . Short signature from the weil pairing[C]//ASIACRYPT 2001. 2001:514-532.
|
[4] |
SHACHAM H , WATERS B . Compact proofs of retrievability[C]//ASIACRYPT 2008. 2008:90-107.
|
[5] |
ATENIESE G , PIETRO R D , MANCINI L V , et al. Scalable and efficient provable data possession[C]//4th ICST SecureComm. 2008.
|
[6] |
WANG Q , WANG C , LI J , et al. Enabling public verifiability and data dynamic for storage security in cloud computing[C]//ESORICS 2009. 2009:355-370.
|
[7] |
ERWAY C , KUPCU A , PAPAMANTHOU C , et al. Dynamic provable data possession[C]//Proceedings of ACM CCS. 2009:213-222.
|
[8] |
ZHU Y , WANG H , HU Z , et al. Dynamic audit services for integrity verification of outsourced storage in cloud[C]//ACM SAC. 2011:1550-1557.
|
[9] |
ZHU Y , AHN G J , HU H , et al. Dynamic audit services for outsourced storage in clouds[C]//IEEE Transactions on Services Computing, 2013,6(99):1.
|
[10] |
WANG C , WANG Q , REN K , et al. Privacy-preserving public audit-ing for data storage security in cloud computing[C]//IEEE INFOCOM. 2010:525-533.
|
[11] |
WANG C , CHOW S S , WANG Q , et al. Privacy-preserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013,62(2):362-375.
|
[12] |
BONEH D , GENTRY C , LYNN B , et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]//EUROCRYPT 2003. 2003:416-432.
|
[13] |
ZHU Y , WANG H , HU Z , et al. Poster:efficient provable data posses-sion for hybird clouds[C]//ACM CCS. 2010.
|
[14] |
TATE S R , VISHWANATHAN R , EVERHART L . Multi-user dy-namic proofs of data possession using trusted hardware[C]//ACM CODASPY. 2013:353-364.
|
[15] |
WANG B , LI B , LI H . Oruta:privacy-preserving public auditing for shared data in the cloud[C]//IEEE 5th International Conference on Cloud Computing (CLOUD'12). Piscataway, NJ:IEEE, 2012:295-302.
|
[16] |
WANG B , LI B , LI H . Knox:privacy-preserving auditing for shared data with large groups in the cloud[C]//10th International Conference on Applied Cryptography and Network Security (ACNS'12). 2012:507-525.
|
[2] |
WANG B , LI B , LI H . Public auditing for shared data with efficient user revocation in the cloud[C]//2013 IEEE International Conference on Computer Communication (INFOCOM'13). Los Alamitos, 2013:2904-2912.
|