參考文獻 |
[1] P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” NIST, Information Technology Laboratory, NIST SP 800-145, 2011. [Online] Available: http://www.nist.gov/itl. [Accessed: Oct. 14, 2011]
[2] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” in Proceedings of IEEE INFORCOM conference on Computer Communications, Mar., 2010, pp. 1-9.
[3] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no.5, May, 2011.
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” Cryptology ePrint Archive, Report 2007/202, 2007. [Online] Available: http://eprint.iacr.org. [Accessed: Mar. 5, 2012]
[5] A. Juels and J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proceedings of CCS '07 the 14th ACM conference on Computer and communications security, Alexandria, VA, Oct. 2007, pp. 584–597.
[6] H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proceeding of Asiacrypt '08 the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, vol. 5350, Dec 2008, pp. 90–107.
[7] G. I., ur Rehman A., and Islam, M. H., “Cloud computing security auditing,” in Proceeding of IEEE Next Generation Information Technology (ICNIT) The 2nd International Conference, 2011, pp. 143-148.
[8] R. C. Merkle, “Protocol for Public Key Cryptosystems,” in Proceeding of IEEE Symposium on Security and Privacy ’80, pp. 122-133, 1980.
[9] D. Boneh, B. Lynn, and H. Shacham, “Short Signature from the Weil Pairing,” in Proceedings of ASIACRYPT '01 the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, 2001, pp. 514-532.
[10] P. L. Karlton, S. H. Fuller, R. E. Scroggs, and E. B. Koehler, “Performance of Height-Balanced Trees,” Communications of the ACM, Vol. 19, no. 1, 1976, pp. 23-28. |