[1] REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012,16(1):69-73.
[2] GUAN C W, REN K, ZHANG F G, et al. Symmetric-key based proofs of retrievability supporting public verification[C]// European Symposium on Research in Computer Security. 2015:203-223.
[3] LI J, TAN X, CHEN X F, et al. OPoR: Enabling proof of retrievability in cloud computing with resource constrained devices[J]. IEEE Transactions on Cloud Computing, 2014,3(2):195-205.
[4] WANG B Y, CHOW S S N, LI M, et al. Storing shared data on the cloud via security-mediator[C]// 2013 IEEE 33rd International Conference on Distributed Computing Systems. 2013:124-133.
[5] NIE H X, MA H, WANG J F, et al. Verifiable algorithm for secure outsourcing of systems of linear equations in the case of no solution[C]// 2014 9th International Conference on Broadband and Wireless Computing, Communication and Applications. 2014:572-577.
[6] LIANG X L, JIANG R. On the security of a remote data possession checking scheme in cloud storage[C]// 2014 9th International Conference on Broadband and Wireless Computing, Communication and Applications. 2014:96-99.
[7] TRUEMAN T E, NARAYANASAMY P. Ensuring privacy and data freshness for public auditing of shared data in cloud[C]// 2015 IEEE International Conference on Cloud Computing in Emerging Markets. 2015:22-27.
[8] SHEN J, LIU D Z, CHANG S H, et al. A lightweight mutual authentication scheme for user and server in cloud[C]// 2015 1st International Conference on Computational Intelligence 〖JP4〗Theory, Systems and Applications. 2015:183-186.
[9] WANG B Y, LI H, LI M. Privacy-preserving public auditing for shared cloud data supporting group dynamics[C]// 2013 IEEE International Conference on Communications. 2013:1946-1950.
[10]WANG B Y, LI B C, LI H. Panda: Public auditing for shared data with efficient user revocation in the cloud[J]. IEEE Transactions on Services Computing, 2013,8(1):92-106.
[11]WANG B Y, LI B C, LI H. Knox: Privacy-preserving auditing for shared data with large groups in the cloud[C]// International Conference on Applied Cryptography and Network Security. 2012:507-525.
[12]SHEN W T, YU J, YANG G Y, et al. Access-authorizing and privacy-preserving auditing with group dynamic for shared cloud data[J]. KSII Transactions on Internet & Information Systems, 2016,10(7):3319-3338.
[13]JIANG T, CHEN X F, MA J F. Public integrity auditing for shared dynamic cloud data with group user revocation[J]. IEEE Transactions on Computers, 2015,65(8):2363-2373.
[14]沈文婷,于佳,杨光洋,等. 具有私钥可恢复能力的云存储完整性检测方案[J]. 软件学报, 2016,27(6):1451-1462.
[15]YUAN J W, YU S C. Efficient public integrity checking for cloud data sharing with multi-user modification[C]// IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. 2014:2121-2129.
[16]SOOKHAK M, YU R, ZOMAYA A. Auditing big data storage in cloud computing using divide and conquer tables[J]. IEEE Transactions on Parallel and Distributed Systems, 2017,29(5):999-1012.
[17]查雅行,罗守山,李伟,等. 基于属性门限签名的动态群组共享数据公开审计方案[J]. 北京邮电大学学报, 2017,40(5):43-49.
[18]YU J, WANG H Q. Strong key-exposure resilient auditing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017,12(8):1931-1940.
[19]WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of the 29th Conference on Information Communications. 2010:1-9.
[20]ZHANG Y, YU J, HAO R, et al. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data[J]. IEEE Transactions on Dependable and Secure Computing, 2018(99):1.
[21]ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007:598-609.
[22]SHACHAM H, WATERS B. Compact proofs of retrievability[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2008:90-107.
[23]GMP. The GNU Multiple Precision Arithmetic Library[EB/OL]. [2019-07-10]. http://gmplib.org.
[24]LYNN B. The Pairing-based Cryptographic Library[EB/OL]. [2019-07-10]. http://crypto.Stanford.edu/pbc. |