[1] |
Song D,Shi E,Fischer I,et al.Cloud data protection for the masses[J].Computer,2012,45(1):39-45.
|
[2] |
Juels A, Jr B S K.PORs:Proofs of retrievability for large files[C]∥Proc of the 14th ACM Conference on Computer and Communications Security,2007:584-597.
|
[3] |
Ateniese G,Burns R,Curtmola R,et al.Provable data possession at untrusted stores[C]∥Proc of the 14th ACM Confe- rence on Computer and Communications Security,2007:598-609.
|
[4] |
Ateniese G, Pietro R D,Mancini L V,et al.Scalable and efficient provable data possession[C]∥Proc of the 4th International Conference on Security and Privacy in Communication Netowrks,2008:1-10.
|
[5] |
Wang Q,Wang C,Ren K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2010,22(5):847-859.
|
[6] |
Barsoum A F,Hasan M A.Provable multicopy dynamic data possession in cloud computing systems[J].IEEE Transactions on Information Forensics and Security,2014,10(3):485-497.
|
[7] |
Liu C,Ranjan R,Yang C,et al.MuR-DPA:Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud[J].IEEE Transactions on Computers,2014,64(9):2609-2622.
|
[8] |
Shen J,Shen J,Chen X,et al.An efficient public auditing protocol with novel dynamic structure for cloud data[J].IEEE Transactions on Information Forensics and Security,2017,12(10):2402-2415.
|
[9] |
Curtmola R, Khan O, Burns R, et al.MR-PDP:Multiple- replica provable data possession[C]∥Proc of the 28th International Conference on Distributed Computing Systems,2008:411-420.
|
[10] |
Barsoum A F,Hasan M A.Integrity verification of multiple data copies over untrusted cloud servers[C]∥Proc of the 12th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing,2012:829-834.
|
[11] |
Zhu Y,Hu H,Ahn G J,et al.Cooperative provable data possession for integrity verification in multicloud storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244.
|
[12] |
He K, Huang C H,Wang J H,et al.An efficient public batch auditing protocol for data security in multi-cloud storage[C]∥Proc of the 8th ChinaGrid Annual Conference,2013:51-56.
|
[13] |
Wang H.Identity-based distributed provable data possession in multicloud storage[J].IEEE Transactions on Services Computing,2014,8(2):328-340.
|
[14] |
Peng S,Zhou F,Xu J,et al.Comments on “identity-based distributed provable data possession in multicloud storage”[J].IEEE Transactions on Services Computing,2016,9(6):996-998.
|
[15] |
Lan C,Li H,Wang C.Analysis of the comments on “identity-based distributed provable data possession in multicloud storage”[J].IEEE Transactions on Services Computing,2017,14(1):44-46.
|
[16] |
Li Y, Yu Y,Chen R,et al.IntegrityChain:Provable data possession for decentralized storage[J].IEEE Journal on Selected Areas in Communications,2020,38(6):1205-1217.
|
[17] |
Zhou L,Fu A,Mu Y,et al.Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system[J].Information Sciences,2021,545:254-276.
|
[18] |
Li J, Yan H,Zhang Y.Efficient identity-based provable multi-copy data possession in multi-cloud storage[J].IEEE Transactions on Cloud Computing,2019,10(1):356-365.
|
[19] |
Wang H, Wu Q,Qin B,et al.Identity-based remote data possession checking in public clouds[J].IET Information Security,2014,8(2):114-121.
|
[20] |
The GNU multiple precision arithmetic library (GMP)[EB/OL].[2022-09-08].https://gmplib.org/.
|
[21] |
The Pairing-based cryptography library (PBC)[EB/OL].[2022-09-08].https://crysp.uwaterloo.ca/software/PBCWrapper.
|
[22] |
Openssl library[EB/OL].[2022-09-08].https://www.openssl.org/source.
|