共 35 条
- [1] Yu N., Hao Z., Xu J., Et al., Review of cloud computing security, Acta Electronica Sinica, 41, 2, pp. 371-381, (2013)
- [2] Gentry C., Fully homomorphic encryption using ideal lattices, Symposium on Theory of Computing, STOC 2009, pp. 169-178, (2009)
- [3] Dijk M.V., Gentry C., Halevi S., Et al., Fully homomorphic encryption over the integers, Advances in Cryptology-EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24-43, (2010)
- [4] Gentry C., A Fully Homomorphic Encryption Scheme, (2009)
- [5] Amazon simple storage service
- [6] Amazon elastic block storage
- [7] Hao F., Lakshman T.V., Mukherjee S., Et al., Secure cloud computing with a virtualized network infrastructure, Usenix Conference on Hot Topics in Cloud Computing, pp. 57-61, (2010)
- [8] Oberheide J., Cooke E., Jahanian F., Cloud AV: N-version antivirus in the network cloud, Proceedings of the 17th Conference on Security Symposium, pp. 91-106, (2008)
- [9] Yu S., Wang C., Ren K., Et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proceedings of the IEEE INFOCOM 2010, pp. 1-9, (2010)
- [10] Wang G., Liu Q., Wu J., Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, Proceedings of the 2010 ACM Conference on Computer & Communications Security, pp. 735-737, (2010)