[1] |
China Academy of Information and Communications Technology.White paper on key technologies of data circulation[EB/OL].[2021-04-22].http://www.caict.ac.cn/.(in Chinese)
|
[2] |
Wang Wei,Zhang Meng-jun,Wang Jing.Research and analysis of big data trading platforms at home and abroad[J].Journal of Intelligence,2019,38(2):181-186.(in Chinese)
|
[3] |
Liang F,Yu W,An D,et al.A survey on big data market:Pricing,trading and protection[J].IEEE Access,2018,6:15132-15154.
|
[4] |
Antonopoulos A M,Wood G.Mastering ethereum:Building smart contracts and dapps[M].California:Oreilly Media Inc,2018.
|
[5] |
Antonopoulos A M. Mastering Bitcoin:Unlocking digital cryptocurrencies[M].California:OReilly Media Inc,2014.
|
[6] |
Li R,Song T,Mei B,et al.Blockchain for large-scale Internet of Things data storage and protection[J].IEEE Transactions on Services Computing,2019,12 (5):762-771.
|
[7] |
Do H G,Ng W K.Blockchain-based system for secure data storage with private keyword search[C]∥Proc of 2017 IEEE World Congress on Services,2017:90-93.
|
[8] |
Liang W,Fan Y K,Li K C,et al.Secure data storage and recovery in industrial blockchain network environments[J].IEEE Transactions on Industrial Informatics,2020,16(3):2063-2071.
|
[9] |
Zyskind G,Nathan O,Pentland A S.Decentralizing privacy:Using blockchain to protect personal data[C]∥Proc of 2015 IEEE Security and Privacy Workshops,2015:180-184.
|
[10] |
Karafiloski E, Mishev A.Blockchain solutions for big data challenges:A literature review[C]∥Proc of the 17th IEEE International Conference on Smart Technologies,2017:763-768.
|
[11] |
Liu X,Wang Z,Jin C,et al.A blockchain-based medical data sharing and protection scheme[J].IEEE Access,2019,7:118943-118953.
|
[12] |
Singla A,Bertino E.Blockchain-based PKI solutions for IoT[C]∥Proc of the 4th IEEE International Conference on Collaboration and Internet Computing,2018:9-15.
|
[13] |
NVIDIA. NVIDIA CUDA programming guide[EB/OL].[2021-04-22].https://docs.nvidia.com/cuda/index.html.
|
[14] |
Cheng J,Grossman M,Mckercher T.Professional CUDA C programming[M].NJ:John Wiley & Sons,2014.
|
[15] |
Cook S.CUDA programming:A developers guide to parallel computing with GPUs[M].Cambridge:Morgan Kaufmann,2012.
|
[16] |
Nickolls J,Buck I,Garland M,et al.Scalable parallel programming with CUDA[J].ACM Queue,2008,6 (2):40-53.
|
[17] |
Qin Zhi-guang,Wu Shi-kun,Xiong Hu.A review on data integrity auditing protocols for data storage in cloud computing[J].Netinfo Security,2014(7):1-6.(in Chinese)
|
[18] |
Wang C,Chow S S,Wang Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2011,62 (2):362-375.
|
[19] |
Juels A,Kaliski Jr B S.PORs:Proofs of retrievability for large files[C]∥Proc of the 14th ACM Conference on Computer and Communications Security,2007:584-597.
|
[20] |
Wang Q,Wang C,Li J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥Proc of European Symposium on Research in Computer Security,2009:355-370.
|
[21] |
Wang H,Zhang J.Blockchain based data integrity verification for large-scale IoT data[J].IEEE Access,2019,7:164996-165006.
|
[22] |
Liu B,Yu X L,Chen S,et al.Blockchain based data integrity service framework for IoT data[C]∥Proc of 2017 IEEE International Conference on Web Services,2017:468-475.
|
[23] |
Shafagh H, Burkhalter L, Hithnawi A, et al. Towards blockchain-based auditable storage and sharing of IoT data[C]∥Proc of 2017 Cloud Computing Security Workshop,2017:45-50.
|
[24] |
Zhang Q,Li Y,Wang R,et al.Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things[J].International Journal of Intelligent Systems,2020,36 (1):94-111.
|
[25] |
Ali M,Nelson J,Shea R,et al.Blockstack:A global naming and storage system secured by blockchains[C]∥Proc of 2016 {USENIX} Annual Technical Conference,2016:181-194.
|
[26] |
Federal information processing standards publication:FIPS PUB 180-2[S].Gaithersburg:National Institute of Standards and Technology,2002.
|
|
附中文参考文献:
|
[1] |
中国信息通信研究院.数据流通关键技术白皮书[EB/OL].[2021-04-22].http://www.caict.ac.cn/.
|
[2] |
王卫,张梦君,王晶.国内外大数据交易平台调研分析[J].情报杂志,2019,38 (2):181-186.
|
[17] |
秦志光,吴世坤,熊虎.云存储服务中数据完整性审计方案综述[J].信息网络安全,2014(7):1-6.
|