[1] |
CHEN K, HU C, ZHANG X, et al. Survey on Routing in Data Centers:Insights and Future Directions[J]. IEEE Network, 2011, 25(4):6-10.
|
[2] |
DESWARTE Y, QUISQUATER J J, SAÏDANE A, Remote Integrity Checking[C]//Proceedings of the Integrity and Internal Control in Information Systems VI[J]. Heidelberg:Springer, 2004:1-11.
|
[3] |
OPREA A, REITER M K, YANG K. Space-Efficient Block Storage Integrity[C]//Proceedings of the Network and Distributed System Security Symposium. San Diego: NDSS, 2005:1-12.
|
[4] |
BONEH D, LYNN B, SHACHAM H. Short Signatures from the Weil Pairing[C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Heidelberg:Springer, 2001:514-532.
|
[5] |
FILHO D, BARRETO P S. Demonstrating Data Possession and Uncheatable Data Transfer[J]. Cryptology ePrint Archive, 2006, 1(1):150-159.
|
[6] |
ATENIESE G, BURNS R, CURTMOLA R. Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS2007). New York: ACM, 2007:598-609.
|
[7] |
ATENIESE G, BURNS R, CURTMOLA R, et al. Remote Data Checking Using Provable Data Possession[J]. ACM Transactions on Information and System Security, 2011, 14(1):1-34.
|
[8] |
WANG Q, WANG C, LI J, et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5):847-859.
doi: 10.1109/TPDS.2010.183
|
[9] |
CURTMOLA R, KHAN O, BURNS R, et al. MR-PDP:Multiple-Replica Provable Data Possession[C]//2008 The 28th International Conference on Distributed Computing Systems.Piscataway:IEEE, 2008:411-420.
|
[10] |
李勇, 姚戈, 雷丽楠, 等. 基于多分支路径树的云存储数据完整性验证机制[J]. 清华大学学报(自然科学版), 2016, 56(5):504-510.
|
|
LI Yong, YAO Ge, LEI Linan, et al. A Validation Mechanism for Cloud Storage Data Integrity Based on Multi-branch Path Tree[J]. Journal of Tsinghua University (Science and Technology), 2016, 56(5):504-510.
|
[11] |
ZHU H, YUAN Y, CHEN Y, et al. A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.[J] IEEE Access, 2019, 7:90036- 90044.
doi: 10.1109/Access.6287639
|
[12] |
毛向杰, 张品. 云平台数据完整性混合验证方案[J]. 计算机工程, 2020, 46(10):46-51.
doi: 10.19678/j.issn.1000-3428.0056404
|
|
MAO Xiangjie, ZHANG Pin. Hybrid Verification Scheme for Data Integrity of Cloud Platform[J]. Computer Engineering, 2020, 46(10):46-51.
doi: 10.19678/j.issn.1000-3428.0056404
|
[13] |
杨小东, 裴喜祯, 陈桂兰, 等. 支持用户撤销的多用户多副本数据公开审计方案[J]. 计算机工程, 2020, 46(12):150-157.
doi: 10.19678/j.issn.1000-3428.0056369
|
|
YANG Xiaodong, PEI Xizhen, CHEN Guilan, et al. Multi-User and Multi-Replica Public Data Audit Scheme Supporting User Revocation[J]. Computer Engineering, 2020, 46(12):150-157.
doi: 10.19678/j.issn.1000-3428.0056369
|
[14] |
咸鹤群, 刘红燕, 张曙光, 等. 可验证的云存储安全数据删重方法[J]. 软件学报, 2020, 31(2):455-470.
|
|
XIAN Hequn, LIU Hongyan, ZHANG Shuguang, et al. Verifiable Secure Data Deduplication Method in Cloud Storage[J]. Journal of Software, 2020, 31(2):455-470.
|
[15] |
杨海滨, 李瑞峰, 易铮阁, 等. 无效双线性对的高效云存储数据审计方案[J]. 西安电子科技大学学报, 2022, 49(1):47-54.
|
|
YANG Haibin, LI Ruifeng, YI Zhengge, et al. Efficient Cloud Storage Data Auditing Scheme without Bilinear Pairing[J]. Journal of Xidian University, 2022, 49(1):47-54.
|