Citation: | ZHANG Xun, BAI Wanrong, WEI Feng, WANG Rong, TIAN Xiuxia, LIU Tianshun. An integrity auditing scheme based on MHT for power equipment images stored in the cloud[J]. Journal of East China Normal University (Natural Sciences), 2020, (5): 33-43. doi: 10.3969/j.issn.1000-5641.202091012 |
[1] |
姜哲. 无人机巡线电力设备故障的视觉检测技术 [D]. 西安: 电子科技大学, 2017.
|
[2] |
何道敬, 杜晓, 乔银荣, 等. 无人机信息安全研究综述 [J]. 计算机学报, 2019, 42(5): 1076-1094.
|
[3] |
冯朝胜, 秦志光, 袁丁. 云数据安全存储技术 [J]. 计算机学报, 2015, 38(1): 150-163.
|
[4] |
冯登国, 张敏, 张妍, 等. 云计算安全研究 [J]. 软件学报, 2011, 22(1): 71-83.
|
[5] |
WAZID M, DAS A K, KUMAR N, et al. Secure three-factor user authentication scheme for renewable-energy-based smart grid environment [J]. IEEE Transactions on Industrial Informatics, 2017, 13(6): 3144-3153.
|
[6] |
谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展 [J]. 计算机学报, 2015, 38(1): 164-177.
|
[7] |
XU J, WEI L, ZhANG Y, et al. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures [J]. Journal of Network and Computer Applications, 2018, 107: 113-124.
|
[8] |
PENG S, ZHOU F, LI J, et al. Efficient, dynamic and identity-based remote data integrity checking for multiple replicas [J]. Journal of Network and Computer Applications, 2019, 134: 72-88.
|
[9] |
SEBÉ F, DOMINGO-FERRER J, MARTINEZ-BALLESTE A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8): 1034-1038.
|
[10] |
WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 22(5): 847-859.
|
[11] |
张庆功, 赵现昌. SIFT算法在无人机遥感影像特征提取中的应用 [J]. 河南水利与南水北调, 2019, 48(11): 63-65.
|
[12] |
郭会, 邓伦治. 一个基于双线性映射的无证书多接收者签密方案 [J]. 贵州师范大学学报(自然科学版), 2018, 36(6): 98-105.
|
[13] |
许钟华, 张龙军. 基于MHT的云环境下数据完整性检验方案 [J]. 计算机与网络, 2014, 40(19): 63-66.
|
[14] |
苏迪, 刘竹松. 一种新型的Merkle哈希树云数据完整性审计方案 [J]. 计算机工程与应用, 2018, 54(1): 70-76.
|
[15] |
LI L M, YANG Y H, WU Z H. FMR-PDP: Flexible multiple replica provable data possession in cloud storage [C]//International Symposium on Computers and Communications. 2017: 1115-1121.
|
[16] |
李晨. 云存储数据的安全审计技术研究 [D]. 西安: 电子科技大学, 2018.
|
[17] |
秦志光, 王士雨, 赵洋, 等. 云存储服务的动态数据完整性审计方案[J]. 计算机研究与发展, 2015, 52(10): 2192-2199.
|
[18] |
PAPAMANTHOU C, TAMASSIA R, TRIANDOPOULOS N. Optimal authenticated data structures with multilinear forms [C]//International Conference on Pairing Based Cryptography. Springer, 2010: 246-264.
|
[19] |
HARIHARASITARAMAN S, BALAKANNAN S P. A dynamic data security mechanism based on position aware merkle tree for health rehabilitation services over cloud [J]. Journal of Ambient Intelligence and Humanized Computing, 2019(7): 1-15.
|
[20] |
ERWAY C, PAPAMANTHOU A C, TAMASSIA R. Dynamic provable data possession [J]. ACM Transactions on Information and System Security, 2015, 7(4): 1-29.
|