JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (5): 81-87.doi: 10.6040/j.issn.1671-9352.2.2019.146
MA Hai-feng1, YANG Jia-hai2, XUE Qing-shui1*, JU Xing-zhong1, ZHU Hao-zhi1, LIN Tao1, YUAN Xin-xin1
CLC Number:
[1] REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1):69-73. [2] 姚克, 杨海宁, 秦静. 云存储中可验证完整性的可搜索加密协议[J]. 山东大学学报(理学版), 2019, 54(1):67-78. YAO Ke, YANG Haining, QIN Jing. Searchable encryption with data integrity verification in cloud storage[J]. Journal of Shandong University(Natural Science), 2019, 54(1):67-78. [3] ATENIESE G, BUMS R, CURTMOL A, et al. Provable data possession at untrusted stores[C] //14th ACM CCS,[S.l.] :[s.n.] , 2007: 598-609. [4] 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015, 38(1):164-177. TAN Shuang, JIA Yan, HAN Weihong. Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015, 38(1):164-177. [5] 李晖, 孙文海, 李凤华,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014, 51(7):1397-1409. LI Hui, SUN Wenhai, LI Fenghua, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7):1397-1409. [6] JUELS A, Jr KALISKI B S. Pors: proofs of retrievability for large files[C] //Proceedings of the 14th ACM conference on Computer and Communications Security(CCS '07). New York: ACM Press, 2007: 584-597. [7] WANG Y J, WU Q H, QIN B, et al. Identity-based data outsourcing with comprehensive auditing in clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4):940-952. [8] 韩盼盼, 秦静. 云计算中可验证的外包数据库加密搜索方案[J]. 山东大学学报(理学版), 2017, 52(9):41-53. HAN Panpan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing[J]. Journal of Shandong University(Natural Science), 2017, 52(9):41-53. [9] ERWAY C, KUPCU A, PAPAMANTHOU C, et al. Dynamic provable data possession[C] //16th ACM CCS.[S.l.] :[s.n.] , 2009: 213-222. [10] SHACHAM H, WATERS B. Compact proofs of retrievability[J]. Journal of Cryptology, 2013, 26(3):442-483. [11] BOWERS K, JUELS A, OPERA A. Proofs of retrievability: theory and implementation[C] //Proceedings of ACM Workshop on Cloud Computing Security. Chicago:[s.n.] , 2009: 43-53. [12] CHEN L X, ZHOU S M, HUANG X Y, et al. Data dynamics for remote data possession checking in cloud storage[J]. Computers & Electrical Engineering, 2013, 39(7):2413-2424. [13] YU Y, NI J B, AU M H, et al. Improved security of a dynamic remote data possession checking protocol for cloud storage[J]. Expert Systems with Applications, 2014, 41(17):7789-7796. [14] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C] //2010 Proceedings IEEE INFOCOM. San Diego: IEEE, 2010: 525-533. [15] YU Y, AU M H, ATENIESE G, et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4):767-778. [16] SHEN W T, QIN J, YU J, et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(2):331-346. [17] ZHANG J H, DONG Q C. Efficient ID-based public auditing for the outsourced data in cloud storage[J]. Information Sciences, 2016, 343/344:1-14. |
[1] | YAO Ke, YANG Hai-ning, QIN Jing. Searchable encryption with data integrity verification in cloud storage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 67-78. |
[2] | LIU Wen-zhuo, CAO Tian-jie, HUANG Shi. An efficient multiple-replica data possession checking scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 160-165. |
|