参考文献
[1]Ghemawat S, Gobioff H, LeeungS T. The google file system[C] Proc of the 19th ACM Symp on Operating System Principles. New York: ACM, 2003: 2943[2]Dean J, Ghemawat S. MapRedcue: Simplified data processing on large clusters[J]. Communication of the ACM, 2008, 5(1): 107113[3]Chang F, Dean J, Ghemawat S, et al. A distributed storage system for structured data[C] Proc of the 7th USENIX Symp on Operating Systems Design and Implementation. Berkelery, CA: USENIX Association, 2006: 205218[4]姜栋瀚, 刘晓平, 吴作栋. 云计算技术发展现状研究综述[J]. 信息与电脑: 理论版, 2019 (8): 170171[5]刘莎莎. 云计算安全问题研究综述[J]. 数字技术与应用, 2020, 38(5): 175176[6]Schuster F, Costa M, Fournet C, et al. VC3: Trustworthy data analytics in the cloud using SGX[C] Proc of the 2015 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2015: 3854[7]Kelbert F, Gregor F, Pires R, et al. SecureCloud: Secure big data processing in untrusted clouds[C] Proc of the Conf on Design, Automation & Test. Piscataway, NJ: IEEE, 2017: 282285[8]Arnautov S, Trach B, Gregor F, et al. SCONE: Secure Linux containers with Intel SGX[C] Proc of the 12th USENIX Symp on Operating Systems Design and Implementation (OSDI). Berkelery, CA: USENIX Association, 2016: 689703[9]Tramer F, Boneh D. Slalom: Fast, verifiable and private execution of neural networks in trusted hardware[J]. arXiv preprint, arXiv:1806.03287, 2018[10]The MesaTEE Team. MesaTEE: A framework for universal secure computing[CPOL]. [20220120]. https:github.comzjshen14mesatee[11]金瑜, 王凡, 赵红武, 等. 云计算环境下信任机制综述[J]. 小型微型计算机系统, 2016, 37(1): 111[12]Wang J W, Jiang Y, Li Q, et al. Survey of research on SGX technology application[J]. Journal of Network New Media, 2017, 6(5): 39[13]Intel Corporation. Intel software guard extensions programming reference[ROL]. 2014 [20220120]. https:www.intel.comcontentdamdevelopexternalusendocuments329298002629101.pdf[14]Shaun D, Richard F. SGX: The good, the bad and the downright ugly[EBOL]. 2014 [20220120]. https:www.virusbulletin.comvirusbulletin201401sgxgoodbadanddownrightugly[15]涂山山, 胡俊, 宁振虎, 等. 可信计算:打造云安全新架构[J]. 信息安全研究, 2017, 3(5): 440450[16]Jauernig P, Sadeghi A R, Stapf E. Trusted execution environments: Properties, applications, and challenges[J]. IEEE Security & Privacy, 2020, 18(2): 5660[17]Anati I, Gueron S, Johnson S, et al. Innovative technology for CPU based attestation and sealing[EBOL]. [20220120]. https:dh6.inkksvoc[18]Johnson S, Scarlata V, Rozas C, et al. Intel software guard extensions: Epid provisioning and attestation services[J]. White Paper, 2016, 1(110): 119129[19]Apache. Hadoop[EBOL].[20220120]. http:Hadoop.apache.orgindex.html[20]Apache. Hadoop Streaming[EBOL].[20220120]. https:hadoop.apache.orgdocsr3.1.3hadoopstreamingHadoopStreaming.html |