[1]
|
POPA R A, LORCH J R, MOLNAR D, et al. Enabling security in cloud storage SLAs with Cloud-Proof[C]//USENIX Annual Technical Conference. Portland, Oregon, USA: USENIX Association, 2011(242): 355-368. |
[2]
|
ITANI W, A KAYSSI, CHEHAB A. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures[C]//Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing. New Jersey, USA: IEEE Computer Society, 2009: 711-716. |
[3]
|
RYAN M D. Cloud computing security: the scientific challenge, and a survey of solutions[J]. Journal of Systems and Software, 2013, 86(9): 2263-2268. |
[4]
|
JUELS A, KALISKI JR B S. PORs: Proofs of retrievability for large files[C]//14th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2007: 584-597. |
[5]
|
YAMAGUCHI T, HASHIYAMA T, OKUMA S. A study on reconfigurable computing system for cryptography[C]//2000 IEEE International Conference on in Systems, Man, and Cybernetics. New Jersey, USA: IEEE Computer Society, 2000: 2965-2968. |
[6]
|
KAMARA S, LAUTER K, Cryptographic cloud storage[C]//14th Financial Cryptograpy and Data Security International Conference. Berlin, Germany: Springer-Verlag, 2010: 136-149. |
[7]
|
ZHOU L, VARADHARAJAN V, HITCHENS M. Enforcing role-based access control for secure data storage in the cloud[J]. Computer Journal, 2011, 54(10): 1675-1687. |
[8]
|
ZISSIS D, LEKKAS D. Addressing cloud computing security issues[J]. Future Generation Computer Systems, 2012, 28(3): 583-592. |
[9]
|
LEKKAS D, GRITZALIS S, KATSIKAS S. Quality assured trusted third parties for deploying secure internet-based healthcare applications[J]. International Journal of Medical Informatics, 2002, 65(2): 79-96. |
[10]
|
ANGIN P, BHARGAVA B, RANCHAL R, et al. An entity-centric approach for privacy and identity management in cloud computing[C]//29th IEEE Symposium on Reliable Distributed Systems. New Jersey, USA: IEEE Computer Society, 2010: 177-183. |
[11]
|
RANCHAL R, BHARGAVA B, OTHMANE L B, et al. Protection of identity information in cloud computing without trusted third party[C]//29th IEEE Symposium on Reliable Distributed Systems. New Jersey, USA: IEEE Computer Society, 2010: 368-372. |
[12]
|
TAKABI H, JOSHI J B, AHN G. Security and privacy challenges in cloud computing environments[J]. IEEE Security & Privacy, 2010, 8(6): 24-31. |
[13]
|
WANG C, CHOW S S M, WANG Q, et al. Privacypreserving public auditing for secure cloud storage[J]. IEEE Transactions on Computers, 2013, 62(2): 362-375. |
[14]
|
JANSEN W, GRANCE T. Guidelines on security and privacy in public cloud computing[J]. NIST Special Publication, 2011(800-144): 7-12. |
[15]
|
VARADHARAJAN V, TUPAKULA U. Security as a service model for cloud environment[J]. IEEE Transactions on Network & Service Management, 2014, 11(1): 60-75. |