共 35 条
- [1] Feng CS, Qin ZG, Yuan D., Techniques of secure storage for cloud data, Chinese Journal of Computers, 38, 1, (2015)
- [2] Ateniese G, Burns R, Curtmola R, Et al., Provable data possession at untrusted stores, Proc. of the ACM Conf. on Computer and Communications Security, pp. 598-609, (2007)
- [3] Juels A, Kaliski BS., PORs: Proofs of retrievability for large files, Proc. of the 14th ACM Conf. on Computer and Communications Security (CCS), pp. 584-597, (2007)
- [4] Shacham H, Waters B., Compact proofs of retrievability, Journal of Cryptology, 26, 3, (2013)
- [5] Ateniese G, Dipietro R, Mancini LV, Et al., Scalable and efficient provable data possession, Proc. of the 4th Int’l Conf. on Security and Privacy in Communication Networks, pp. 1-10, (2008)
- [6] Erway C, Kupcu A, Papamanthou C, Et al., Dynamic provable data possession, Proc. of the ACM Conf. on Computer and Communications Security, pp. 213-222, (2009)
- [7] Wang Q, Wang C, Ren K, Et al., Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Trans. on Parallel and Distributed Systems, 22, 5, (2011)
- [8] He K, Chen J, Yuan Q, Et al., Dynamic group-oriented provable data possession in the cloud, IEEE Trans. on Dependable and Secure Computing, (2019)
- [9] Barsoum AF, Hasan MA., Provable multicopy dynamic data possession in cloud computing systems, IEEE Trans. on Information Forensics and Security, 10, 3, (2015)
- [10] Yu J, Ren K, Wang C, Et al., Enabling cloud storage auditing with key-exposure resistance, IEEE Trans. on Information Forensics and Security, 10, 6, pp. 1167-1179, (2016)