參考文獻 |
[1] Chen, EY., Pei, Y., Chen, S., Tian, Y., Kotcher, R., and Tague, P., “Oauth demystified for mobile application developers,” Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 892–903, 2014.
[2] Chin, E., Felt, AP., Greenwood, K., and Wagner, D., “Analyzing inter-application communication in Android,” Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252, 2011.
[3] Denning, T., Kohno, T., and Levy, H.M., “Computer security and the modern home,” Communications of the ACM, vol. 56(1), pp. 94–103, 2013.
[4] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D., ”Provable data possession at untrusted stores,” Proceedings of the 14th ACM Conference on Computer and Communication Security, pp. 598–609, 2007.
[5] Shacham, H. and Waters, B., “Compact Proofs of Retrievability,” Proceedings of the 14th International Conference Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 90-107, 2008.
[6] Erway, C., Kupcu, A., Papamanthou, C., and Tamassia. R., “Dynamic Provable Data Possession,” Proceedings of the 15th ACM Conference on Computer and Communication Security, pp. 213-222, 2009.
[7] Ateniese, G., Kamara, S., and Katz. J., “Proofs of storage from homomorphic identification protocols,” Proceedings of the 15th International Conference Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 319-333, 2009.
[8] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., and Song, D., “Remote data checking using provable data possession,” ACM Transactions on Information and System Security, vol. 14, pp. 1–34, 2011.
[9] Ateniese, G., Pietro, R.D., Mancini, L.V., and Tsudik, G., “Scalable and efficient provable data possession,” Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, pp. 1-10, 2008.
[10] Wang, Q., Wang, C., Ren, K., Lou, W., and Li, J., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel Distributed Systems, vol. 22, pp. 847-859, 2011.
[11] Wang, C., Wang, Q., Ren, K., and Lou, W., “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proceedings of the 29th Conference on Information Communications, pp. 525-533, 2010.
[12] Yang, K. and Jia, X., “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, pp. 1717–1726, 2012.
[13] Wang, B., Li, B., and Li, H., “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” IEEE Transactions on Cloud Computing, vol. 2, pp. 43-56, 2014.
[14] Zhu, Y., Wang, S., Hu, H., Ahn, G.-J., and Ma, D., “Secure Collaborative Integrity Verification for hybrid cloud environment,” International Journal of Cooperative Information Systems, vol. 21, pp. 165–197, 2012.
[15] Zhu, Y., Hu, H., Ahn, G.-J., and Yu., M., “Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, pp. 2231-2244, 2012.
[16] Zhu, Y., Ahn, G.-J., Hu, H., Yau, S. S., An, H.G., and Hu, C.J., “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Transactions on Services Computing, vol. 6(2), pp. 227-238, 2013.
[17] Sookhak, M., Akhunzada, A., Gani, A., Khan, M. K., Anuar, and N. B., “Towards Dynamic Remote Data Auditing in Computational Clouds,” The Scientific World Journal, vol. 2014, Article ID 269357, 2014.
[18] Wang, F., Xu, L., Wang, H., Chen, Z., “Identity-based non-repudiable dynamic provable data possession in cloud storage,” Computers and Electrical Engineering, 2017. doi: 10.1016/j.compeleceng.2017.09.025
[19] Lin, C., Shen, Z., Chen, Q., Sheldon, F. T., “A Data Integrity Verification Scheme in Mobile Cloud Computing,” Journal of Network and Computer Applications, vol. 77, pp. 146–151, 2017.
[20] Yang, G., Yu, J., Shen, W., Su, Q., Fu, Z., Hao R., “Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability,” The Journal of Systems and software, vol. 113, pp. 130-139, 2016.
[21] Yuan, J. and Yu, S., “Public integrity auditing for dynamic data sharing with multiuser modification,” IEEE Transactions on Information Forensics and Security, vol. 10(8), pp. 1717-1726, 2015.
[22] Slamanig, D., Stingl, C., Menard, C., Heiligenbrunner, M., and Thierry, J., “Anonymity and application privacy in context of mobile computing in ehealth,” Mobile Response 2008. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, vol. 5424, pp. 148–157, 2009.
[23] Bjones, R., Krontiris, I., Paillier, P., and Rannenberg, K., “Integrating anonymous credentials with aids for privacy respecting online authentication,” Privacy Technologies and Policy, Springer, Berlin, Heidelberg, pp. 111–124, 2014.
[24] Guo, N., Gao, T., and Wang, J., “Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme,” International Journal of Computer Mathematics, vol. 93(2), pp. 273–288, 2014.
[25] Camenisch, J. and Lysyanskaya, A., “Signature schemes and anonymous credentials from bilinear maps,” Proceedings of the 24th Annual International Cryptology Conference Advances in Cryptology, LNCS, August, Springer, Berlin, Heidelberg, vol. 3152, pp. 56–72, 2004.
[26] Bhargav-Spantzel, A., Squicciarini, A. C., and Xue, R., “Multifactor Identity Verification Using Aggregated Proof of Knowledge,” IEEE Transactions on System, Man, and Cybernetics, vol. 40(4), pp. 372–383, 2010.
[27] Zhang, J. and Dong, Q., “Efficient ID-based public auditing for the outsourced data in cloud storage,” Information Sciences, vol. 343–344, pp. 1–14, 2016.
[28] He, D., Wang, H., Zhang, J., and Wang, L., “Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage,” Information Sciences, vol. 375, pp. 48–53, 2017.
[29] Wang, H., Wu, Q., Qin, B., and Domingo-Ferrer, J., “Identity-based remote data possession checking in public clouds,” IET Information Security, vol. 8(2), pp. 114–121, 2014.
[30] Wang, H., He, D., and Tang, S., “Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud,” IEEE Transactions on Information Forensics and Security, vol. 11(6), pp. 1165–1176, 2016.
[31] Curtmola, R., Khan, O., Burns, R., and Ateniese, G., “MR-PDP: Multiple-Replica Provable Data Possession,” Proceedings of the 28th International Conference on Distributed Computing Systems, pp. 411–420, 2008.
[32] Barsoum, A.F. and Hasan, M.A., “Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers,” Proceedings of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 829–834, 2012.
[33] Mo, Z., Zhou, Y., Chen, S., and Xu, C., “Enabling non-repudiable data possession verification in cloud storage systems,” Proceedings of the 7th International Conference on Cloud Computing, pp. 232–239, 2014.
[34] Peng, S., Zhou, F., Wang, Q., Xu, Z., and Xu, J., “Identity-based public multi-replica provable data possession,” IEEE Access 5, pp. 26990–27001, 2017.
[35] Boneh, D., Lynn, B., and Shacham, H., “Short Signatures from the Weil Pairing,” Journal of Cryptology, vol. 17, pp. 297-319, 2004.
[36] Lynn, B., “PBC library–the pairing-based cryptography library,” http://crypto.stanford.edu/pbc/. Accessed 30 July 2018.
[37] Boneh, D., Lynn, B., Gentry, C., and Shacham, H., “Aggregate and veriably encrypted signatures from bilinear maps,” Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques, pp. 416-432, 2003.
[38] Lysyanskaya, A., Rivest, R., Sahai, A., and Wolf, S., "Pseudonym systems.,” Selected Areas in Cryptography, LNCS. Springer, Vol. 1758, pp. 184–199, 1999.
[39] Begum, N., Nakanishi, T., and Nogami, Y., “An efficiency improvement in an anonymous credential system for CNF formulas on attributes with constant-size proofs,” 2nd International Conference on Electrical Engineering and Information Communication Technology, pp. 1-5, 2015.
[40] Shoup, V., “Lower Bounds for Discrete Logarithms and Related Problems,” Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 256–266, 1997.
[41] Mahmood, K., “Performance Comparison of NOSQL Database Cassandra and SQL Server for Large Databases,” Journal of Independent Studies and Research-Computing, vol. 14, pp. 21-25, 2016.
[42] Alborghetti, S., “New options and better performance in cqlsh copy, “ https://www.datastax.com/dev/blog/new-features-in-cqlsh-copy. Accessed 30 July 2018. |