[1]Bhadauria R, Chaki R, Chaki N, et al. A survey on security issues in cloud computing[J]. arXiv preprint, arXiv:1109.5388, 2011[2]Ren Z, Wang L, Wang Q, et al. Dynamic proofs of retrievability for coded cloud storage systems[J]. IEEE Trans on Services Computing, 2015, 11(4): 685698[3]Shafagh H, Burkhalter L, Ratnasamy S, et al. Droplet: Decentralized authorization and access control for encrypted data streams[C] Proc of the 29th USENIX Conf on Security Symp. Berkeley, CA: USENIX Association, 2020: 24692486[4]Alderman J, Farley N, Crampton J. Treebased cryptographic access control[C] Proc of European Symp on Research in Computer Security. Berlin: Springer, 2017: 4764[5]Li Y, Dhotre N S, Ohara Y, et al. Horus: Finegrained encryptionbased security for largescale storage[C] Proc of the 11th USENIX Conf on File and Storage Technologies. Berkeley, CA: USENIX Association, 2013: 147160[6]国家密码管理局. GMT 0003—2012 SM2椭圆曲线公钥密码算法[S]. 北京: 国家密码管理局, 2010[7]Atallah M J, Blanton M, Fazio N, et al. Dynamic and efficient key management for access hierarchies[J]. ACM Trans on Information and System Security, 2009, 12(3): 143[8]Cui Z, Zhu H, Chi L. Lightweight key management on sensitive data in the cloud[J]. Security and Communication Networks, 2013, 6(10): 12901299[9]杨宜博. 面向云加密数据库的高效密钥管理系统[D]. 西安: 西安电子科技大学, 2019[10]Vimercati SDCD, Foresti S, Jajodia S, et al. Overencryption: Management of access control evolution on outsourced data[C] Proc of Int Conf on VLDB. New York: ACM, 2007: 123134[11]Cui Z, Zhu H, Shi J, et al. Lightweight management of authorization update on cloud data[C] Proc of Int Conf on Parallel and Distributed Systems. Piscataway, NJ: IEEE, 2013: 456461[12]Bessani A, Correia M, Quaresma B, et al. DepSky: Dependable and secure storage in a cloudofclouds[J]. ACM Trans on Storage, 2013, 9(4): 133[13]王祥宇, 马建峰, 苗银宾, 等. 基于密钥状态散列树的密钥存储管理方案[J]. 通信学报, 2018, 39(5): 94102[14]Lo J W, Hwang M S, Liu C H. An efficient key assignment scheme for access control in a large leaf class hierarchy[J]. Information Sciences, 2011, 181(4): 917925[15]Rajendran R, Miller E L, Long D D E. Horus: Finegrained encryptionbased security for high performance petascale storage[C] Proc of the 5th Workshop on Parallel Data Storage. Piscataway, NJ: IEEE, 2011: 1924[16]国家密码管理局. GMT 0002—2012 SM4分组密码算法[S]. 北京: 国家密码管理局, 2012[17]傅颖勋, 罗圣美, 舒继武. 安全云存储系统与关键技术综述[J]. 计算机研究与发展, 2013, 50(1): 136145[18]Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612613 |