[1] Wang C, Wang Q, Ren K, et al. Ensuring data storage security in Cloud Computing[J]. IEEE Press, 2009,1-9
[2] 王一蕾, 吴英杰, 孙岚. 隐私保护关系型数据发布的多维划分动态规划算法[J]. 南京大学学报:自然科学版, 2013, 49(2):258-267
[3] Lin L, Li Q, Kong L, et al. Tenant-oriented composite authentication tree for data integrity protection in SaaS[C]// Proc of Int Conf on Web-Age Information Management. Berlin:Springer, 2014:402-414
[4] Liu H, Zhang P, Liu J. Public data integrity verification for secure cloud storage[J]. Journal of Networks, 2013, 8(2) :373-380
[5] Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing[C]// Proc of Conf on Information Communications. Piscataway,NJ:IEEE, 2010:441-445
[6] Ni J, Yu Y, Mu Y, et al. On the security of an efficient dynamic auditing protocol in cloud storage[J]. IEEE Trans on Parallel & Distributed Systems, 2013, 25(10):2760-2761
[7] Liu C, Yang C, Zhang X, et al. External integrity verification for outsourced big data in cloud and IoT[J]. Future Generation Computer Systems, 2015, 49(C):58-67
[8] Wang Q, Wang C, Li J, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]// Proc of European Conf on Research in Computer Security.Berlin: Springer, 2009:355-370
[9] Tang S,Jia Y,Han W.Research and development of provable data integrity in cloud storage[J].Chinese Journal of Computers,2015,38(1):164-177
[10] Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores[C]// Proc of ACM Conf on Computer and Communications Security. New York:ACM, 2007:598-609
[11] Curtmola R, Khan O, Burns R, et al. MR-PDP: Multiple-replica provable data possession[C]//Proc of Int Conf on Distributed Computing Systems. Piscataway,NJ:IEEE, 2008:411-420
[12] Chen H F, Lin B G, Yang Y, et al. Public batch auditing for 2M-PDP based on BLS in cloud storage[J]. Journal of Cryptologic Research,2014,1(4):368-378
[13] Zha Y X, Luo S S, Bian J C, et al. Multiuser and multiple-replica provable data possession scheme based on multi-branch authentication tree[J]. Journal on Communications, 2015,36(11):80-91
|