参考文献
[1]王勇, 徐衍龙, 刘强. 云计算安全模型与架构研究[J]. 信息安全研究, 2019, 5(4): 287292[2]Rakesh B, Lalitha K, Ismail M, et al. Distributed scheme to authenticate data storage security in cloud computing[J]. International Journal of Computer Science and Information Technology, 2017, 9(6): 5966[3]杨璐, 叶晓俊. 云服务环境下的密钥管理问题和挑战[J].计算机科学, 2017, 44(3): 39[4]Barker E, Barker W, Burr W, et al. Recommendation for key management—part 1: General[EBOL]. 2007 [20220920]. http:csrc.nist.govpublicationsnistpubs80057sp80057Part1revised2_Mar082007.pdf[5]Damiani E, Vimercati S D C D, Foresti S, et al. Key management for multiuser encrypted databases[C] Proc of the 2005 ACM Workshop on Storage Security and Survivability (StorageSS 2005). New York: ACM, 2005: 7483[6]Xinyi Z, Ru Z, Fangyu W, et al. Research on the privacypreserving retrieval over ciphertext on cloud[C] Proc of Int Conf on Information Communication & Management. Piscataway, NJ: IEEE, 2016: 100104[7]Vimercati S D C D, Foresti S, Jajodia S, et al. Overencryption: Management of access control evolution on outsourced data[C] Proc of the 33rd Int Conf on Very Large Data Bases. University of Vienna. New York: ACM, 2007: 123134[8]Blundo C, Cimato S, Di Vimercati S D C, et al. Managing key hierarchies for access control enforcement: Heuristic approaches[J]. Computers & Security, 2010, 29(5): 533547[9]祝烈煌, 曹元大, 廖乐健. 基于状态密钥树的安全群组密钥分发协议[J]. 北京理工大学学报, 2006, 26(9): 805808[10]Cui Z, Zhu H, Chi L. Lightweight key management on sensitive data in the cloud[J]. Security and Communication Networks, 2013, 6(10): 12901299[11]Rajendran R, Miller E L, Long D D E. Horus: Finegrained encryptionbased security for high performance petascale storage*[C] Proc of the 6th Workshop on Parallel Data Storage (PDSW’11). New York: ACM, 2011: 1924[12]王祥宇, 马建峰, 苗银宾. 基于密钥状态散列树的密钥存储管理方案[J]. 通信学报, 2018, 39(5): 98106[13]Wong C K, Gouda M, Lam S S. Secure group communications using key graphs[J]. IEEEACM Trans on Networking, 2002, 8(1): 1630[14]Zhang Q, Wang Y, Jue J P. A key management scheme for hierarchical access control in group communication[J]. International Journal of Network Security, 2008, 7(3): 323334[15]Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage[C] Proc of USENIX Conf on File and Storage Technologies. Berkeley, CA: USENIX Association, 2003: 2942 |