共 27 条
[1]
Li N.H., Li T.C., Venkatasubramanian S., t-closeness: Privacy beyond k-anonymity and l-diversity, Proc. of the IEEE 23rd Int'l Conf. on Data Engineering (ICDE 2007), pp. 106-115, (2007)
[2]
Machanavajjhala A., Gehrke J., Kifer D., Venkitasubramaniam M., l-diversity: Privacy beyond k-anonymity, Proc. of the IEEE 22nd Int'l Conf. on Data Engineering (ICDE 2006), pp. 34-36, (2006)
[3]
Han J., Li Y.P., Chen W.F., A lightweight and privacy-preserving public cloud auditing scheme without bilinear paring in smart cities, Computer Standards & Interfaces, 62, 1, pp. 84-97, (2019)
[4]
Tan S., Jia Y., Han W.H., Research and development of provable data integrity in cloud storage, Chinese Journal of Computers, 38, 1, pp. 164-177, (2015)
[5]
Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., Song D., Provable data possession at untrusted stores, Proc. of the 14th ACM Conf. on Computer and Communications Security (CCS 2007), pp. 598-609, (2007)
[6]
Ristenpart T., Tromer E., Shacham H., Savage S., Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS 2009), pp. 199-212, (2009)
[7]
Wang Q., Wang C., Ren K., Lou W.J., Li J., Enabling public verifiability and data dynamics for storage security in cloud computing, IEEE Trans. on Parallel and Distributed Systems, 22, 5, pp. 847-859, (2011)
[8]
Wang C., Wang Q., Ren K., Lou W.J., Privacy-preserving public auditing for data storage security in cloud computing, Proc. of the IEEE INFOCOM 2010, pp. 1-9, (2010)
[9]
Wang C., Chow S.S.M., Wang Q., Ren K., Lou W.J., Privacy-preserving public auditing for secure cloud storage, IEEE Trans. on Computers, 62, 2, pp. 362-375, (2013)
[10]
Zhu Y., Hu H.X., Ahn G.J., Yu M.Y., Cooperative provable data possession for integrity verification in multicloud storage, IEEE Trans. on Parallel and Distributed Systems, 23, 12, pp. 2231-2244, (2012)