JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (9): 41-53.doi: 10.6040/j.issn.1671-9352.0.2017.145
Previous Articles Next Articles
HAN Pan-pan1, QIN Jing1,2*
CLC Number:
[1] MELL P, GRANCE T. The NIST definition of cloud computing[M]. Gaithersburg: National Institute of Standards & Technology, 2011. [2] HACIGUMUS H, IYER B, MEHROTRA S. Providing database as a service[C] // Proceedings of the International Conference on Data Engineering. Los Alamitos: IEEE Computer Society, 2002: 29-38. [3] SHAIKH F B, HAIDER S. Security threats in cloud computing[C] // Proceedings of 2015 International Conference on Computing, Communication & Automation(ICCCA). New York: IEEE, 2011: 214-219. [4] CURTMOLAR, GARAYJ, KAMARA S, et al. Searchable symmetric encryption: improved definitions and efficient constructions[EB/OL].(2006-6-26)[2017-2-14]. http://eprint. iacr.org/2006/210. [5] LI Feifei, HADJIELEFTHERIOU M, KOLLIOS G, et al. Dynamic authenticated index structures for outsourced databases[C] // ACM SIGMOD International Conference on Management of Data. New York: ACM, 2008: 121-132. [6] HAN Fei, QIN Jing, HU Jiankun. Secure searches in the cloud: a survey[J]. Future Generation Computer Systems, 2016, 62:66-75. [7] WANG Jianfeng, CHEN Xiaofeng. Efficient and secure storage for outsourced data: a survey[J]. Data Science & Engineering, 2016, 1(3):178-188. [8] DEVANBU P, GERTZ M, MARTEL C, et al. Authentic data publication over the internet[J]. Journal of Computer Security, 2003, 11(3):291-314. [9] MA Di, DENG R H, PANG H, et al. Authenticating query results in data publishing[C] // Proceedings of the International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2005: 376-388. [10] SION R. Query execution assurance for outsourced databases[C] // Proceedings of the 31st International Conference on Very Large Data Bases. [S.l.] : DBLP, 2005: 601-612. [11] XIE Min, WANG Haixun, YIN Jian, et al. Integrity auditing of outsourced data[C] // Proceedings of the 33rd International Conference on Very Large Data Bases.[S.l.] : DBLP, 2007: 782-793. [12] MYKLETUN E, NARASIMHA M, TSUDIK G. Authentication and integrity in outsourced databases[J]. ACM Transactions on Storage, 2004, 2(2):107-138. [13] NARASIMHA M, TSUDIK G. DSAC: integrity for outsourced databases with signature aggregation and chaining[C] // ACM CIKM International Conference on Information and Knowledge Management. New York: ACM Press, 2005: 235-236. [14] WANG Jianfeng, CHEN Xiaofeng, HUANG Xinyi, et al. Verifiable auditing for outsourced database in cloud computing[J]. IEEE Transactions on Computers, 2015, 64(11):3293-3303. [15] WANG Jianfeng, CHEN Xiaofeng, LI Jin, et al. Towards achieving flexible and verifiable search for outsourced database in cloud computing[J]. Future Generation Computer Systems, 2017, 67:266-275. [16] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C] // ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609. [17] MERKLE R C. A certified digital signature [M] //Advances in Cryptology—CRYPTO’ 89 Proceedings. New York: Springer-Verlag, 1989: 218-238. [18] BUCHMANN J, DAHMEN E, SCHNEIDER M. Merkle tree traversal revisited[M] // Post-Quantum Cryptography. Berlin: Springer-Verlag, 2008: 63-78. [19] BURTON H B. Space/Time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7):422-426. [20] EPPSTEIN D, GOODRICH M T. Straggler identification in round-trip data streams via Newton's identities and invertible Bloom filters[J]. IEEE Transactions on Knowledge & Data Engineering, 2010, 23(2):297-306. [21] FAN Li, CAO Pei, ALMEIDA J, et al. Summary cache: a scalable wide-area Web cache sharing protocol[J]. IEEE/ACM Transactions on Networking, 2000, 8(3):281-293. [22] EVDOKIMOV S, GUNTHER O. Encryption techniques for secure database outsourcing[C] // Proceedings of the12th European Symposium on Research in Computer Security. Heidelberger: Springer-Verlag Berlin, 2007: 327-342. [23] CHU Chengkang, TZENG W G. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries [J]. Journal of Universal Computer Science, 2005, 3(3):172-183. |
[1] | WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37. |
[2] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
[3] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[4] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[5] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[6] | CAI Hong-yun, TIAN Jun-feng. Research of data privacy protection for cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 83-89. |
[7] | LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117. |
[8] | LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35. |
|