软件即服务模式下租户多副本数据存储完整性问题研究
李 琳1,钱 进2,张永新1*,丁艳辉3,孔兰菊2
南京大学学报(自然科学版) ›› 2016, Vol. 52 ›› Issue (2) : 324.
软件即服务模式下租户多副本数据存储完整性问题研究
Research on multitenants duplicates storage integrity protection in software as a service
[1] Aulbach S,Grust T,Jacobs D,et al.Multitenant databases for Software as a Service:Schemamapping techniques.In:Proceedings of the ACM SIGMOD International Conference on Management of Data.Canada:SIGMOD Conference,2008,1195-1206.
[2] Aulbach S,Jacobs D,Kemper A,et al.A comparison of flexible schemas for software as a service.In:Proceedings of the ACM SIGMOD International Conference on Management of Data.Rhode Island:SIGMOD Conference,2009,881-888.
[3] 孔兰菊,李庆忠,桑成良.面向SaaS应用基于键值对模式的多租户索引研究.计算机学报,2010,12(3):2239-2247.(Kong L J,Li Q Z,Sang C L.Research on index of multitenant based on keyvalues for SaaS application.Chinese Journal of Computers,2010,12(3):2239-2247.)
[4] Wang C,Wang Q,Ren K,et al.Ensuring data storage security in cloud computing.In:The 17th International Workshop on Quality of Service.Charleston:IEEE Press,2009,1-9.
[5] 王一蕾,吴英杰,孙 岚.隐私保护关系型数据发布的多维划分动态规划算法.南京大学学报(自然科学),2013,49(2):258-267.(Wang Y L,Wu Y J,Sun L.A dynamic programming algorithm based on multidimensional partitioning for privacy preserving relational data publishing.Journal of Nanjing University(Natural Sciences),2013,49(2):258-267.)
[6] Liu H,Zhang P,Liu J.Public data integrity verification for secure cloud storage.Journal of Networks,2013,8(2):373-380.
[7] 卞 磊,刘 超,金茂忠.一种面向审查的过程内数据流异常自动检测方法.南京大学学报(自然科学),2010,46(1):71-76.(Bian L,Liu C,Jin M Z.A method for intraprocedural data flow anomaly autodetection facing to inspection.Journal of Nanjing University(Natural Sciences),2010,46(1):71-76.)
[8] Li L,Li Q,Kong L,et al.Tenantoriented composite authentication tree for data integrity protection in SaaS.In:The 15th International Conference on WebAge Information Management.Macau:Lecture Notes in Computer Science 8485,2014,402-414.
[9] Zhang L,Li Q,Shi Y,et al.An integrity verification scheme for multiple replicas in clouds.In:The 2012 International Conference on Web Information Systems and Mining.Chengdu:Lecture Notes in Computer Science 7529,Springer,2012,264-274.
[10] 咸鹤群,冯登国.外包数据库中完整性检测方案.计算机研究与发展,2010,47(6):1107-1115.(Xian H Q,Feng D G.An integrity checking scheme in outsourced database model.Journal of Computer Research & Development,2010,47(6):1107-1115.)
[11] Wang Q,Wang C,Li J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing.In:The 14th European Symposium on Research in Computer Security.SaintMalo:Lecture Notes in Computer Science 5789,Springer,2009,355-370.
[12] Dan Boneh,Gentry C,Lynn B,et al.A survey of two signature aggregation techniques.Cryptogamie Bryologie,2003,6(2):1-10.
[13] Barsoum A F,Hasan M A.On verifying dynamic multiple data copies over cloud servers.Cryptology ePrint Archive,Report,2011,447.
[14] Bowers K D,Juels A,Oprea A.HAIL:A highavailability and integrity layer for cloud storage.In:Proceedings of the 2009 ACM Conference on Computer and Communications Security.Chicago:ACM,2009,187-198.
[15] Juels A,Burton S,Kaliski Jr.PORs:Proofs of retrievability for large files.In:Proceedings of the 14th ACM Conference on Computer and communications security.Alexandria:ACM,2007,584-597.
[16] Curtmola R,Khan O,Burns R C,et al.MRPDP:Multiplereplica provable data possession.In:The 28th International Conference on Distributed Computing Systems.,Beijing:IEEE Press,2008,411-420.
[17] Xiao D,Yang Y,Yao W,et al.multiplefile remote data checking for cloud storage.Computers & Security,2012,31(2):192-205.
[18] Halevi S,Harnik D,Pinkas B,et al.Proofs of ownership in remote storage systems.In:Proceedings of the 18th ACM Conference on Computer and Communications Security.Chicago:ACM,2011,491-500.
[19] Zheng Q,Xu S.Secure and efficient proof of storage with deduplication.In:Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy(CODASPY’12).New York:ACM,2012,1-12.
[20] Thakur Anandita S,Gupta P K,Gupta P.handling data integrity issue in SaaS cloud.In:Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing:Theory and Applications(FICTA)2014Volume 2.India:Advances in Intelligent Systems and Computing 328,Springer,2015,127-134.
/
〈 | 〉 |