[1] |
WU J , PING L , GE X ,et al. Cloud storage as the infrastructure of cloud computing[C]// IEEE International Conference on Intelligent Computing and Cognitive Informatics (ICICCI). 2010: 380-383.
|
[2] |
ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// The 14th ACM Conference on Computer and Communications Security. 2007: 598-609.
|
[3] |
WANG Q , WANG C , LI J ,et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// European Conference on Research in Computer Security. 2009: 355-370.
|
[4] |
WANG C , WANG Q , REN K ,et al. Privacy-preserving public auditing for data storage security in cloud computing[J]. 2010,62(2): 525-533.
|
[5] |
ERWAY C , PAPAMANTHOU C , TAMASSIA R . Dynamic provable data possession[C]// ACM Conference on Computer and Communications Security. 2009: 213-222.
|
[6] |
WANG Q , WANG C , REN K ,et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel & Distributed Systems, 2011,22(5): 847-859.
|
[7] |
XU J , . Auditing the auditor:secure delegation of auditing operation over cloud storage[C]// IACR Cryptology ePrint Archive. 2011:304.
|
[8] |
HUANG K , XIAN M , FU S ,et al. Securing the cloud storage audit service:defending against frame and collude attacks of third party auditor[J]. IEEE Transactions on Communication, 2011.
|
[9] |
WU Y L , LIN X , LU X C ,et al. A secure light-weight public auditing scheme in cloud computing with potentially malicious third party auditor[J]. IEICE Transactions on Information & Systems, 2016(10): 2638-2642.
|
[10] |
肖达, 杨绿茵, 孙斌 ,等. 面向真实云存储环境的数据持有性证明系统[J]. 软件学报, 2016,27(9): 2400-2413.
|
|
XIAO D , YANG L Y , SUN B ,et al. Provable data possession system for realistic cloud storage environments[J]. Journal of Software, 2016,27(9): 2400-2413.
|
[11] |
FRANCESCO P S , VLADIMIRO S , LUCA N I ,et al. FaaS:Federation-as-a-Service[J]. 2016.
|
[12] |
田俊峰, 常方舒 . 基于 TPM 联盟的可信云平台管理模型[J]. 通信学报, 2016,37(2): 1-10.
|
|
TIAN J F , CHANG F S . Trusted cloud platform management model based on TPM alliance[J]. Journal on Communications, 2016,37(2): 1-10.
|
[13] |
BERGER S , GOLDMAN K A , PEREZ R ,et al. vTPM:virtualizing the trusted platform module[C]// Conference on Usenix Security Symposium. 2006:21.
|
[14] |
张健 . 云计算服务等级协议(SLA)研究[J]. 电信网技术, 2012(2): 7-10.
|
|
ZHANG J . Study on cloud computing SLA[J]. Telecommunication network technology, 2012(2): 7-10.
|
[15] |
SYED S R , KATIE C , ABDUL R . Cloud data integrity using a designated public verifier[C]// HPCC-CSS-ICESS. 2015.
|
[16] |
HU V C , KUHN D R , FERRAIOLO D F . Attribute-based access control[J]. Computer, 2015,48(2): 85-88.
|
[17] |
CASTRO M , LISKOV B . Practical byzantine fault tolerance[C]// OSDI. 1999: 173-186.
|
[18] |
范捷, 易乐天, 舒继武 . 拜占庭系统技术研究综述[J]. 软件学报, 2013(6): 1346-1360.
|
|
FAN J , YI L T , SHU J W . Research on the technologies of Byzantine system[J]. Journal of Software, 2013,24(6): 1346-1360.
|
[19] |
WANG Q , WANG C , REN K ,et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel & Distributed Systems, 2011,22(5): 847-859.
|
[20] |
周振吉, 吴礼发, 洪征 ,等. 云计算环境下的虚拟机可信度量模型[J]. 东南大学学报(自然科学版), 2014,44(1): 45-50.
|
|
ZHOU Z J , WU L F , HONG Z ,et al. Trustworthiness measurement model of virtual machine for cloud computing[J]. Journal of Southeast University(Natural Science Edition) , 2014,44(1): 45-50.
|
[21] |
吴昊, 毋国庆 . 程序的动态完整性:模型和方法[J]. 计算机研究与发展, 2012,49(9): 1874-1882.
|
|
WU H , WU G Q . Dynamical integrity of codes:model and method[J]. Journal of Computer Research and Development, 2012,49(9): 1874-1882.
|