[1]
Yuanfang He, A research of mass data processing technology, in China Academic Journal Electronic Publishing House, 1671-7597 (2009)0420059-02, (2009).
Google Scholar
[2]
M. Mowbray and S. Pearson, A Client-Based Privacy Manager for Cloud Computing, ACM 978-1-60558-353-2/09/06, June 16-19, 2009, Dublin, Ireland.
Google Scholar
[3]
H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, RACS: A Case for Cloud Storage Diversity, ACM 978-1-4503-0036-0/10/06, June 10-11, 2010, Indianapolis, Indiana, USA.
DOI: 10.1145/1807128.1807165
Google Scholar
[4]
B K. Samanthula, G. Howser, Y. Elmehdwi and S Madria, An Efficient and Secure Data Sharing Framework using Homomorphic Encryption in the Cloud, ACM 978-1-4503-1596-8/12/08, August 31 2012, Istanbul, Turkey.
DOI: 10.1145/2347673.2347681
Google Scholar
[5]
http: /baike. baidu. com/view/2044736. htm.
Google Scholar
[6]
Huiqun Yu and Guisheng Fan, A review of application and development trend in cloud computing, Micmcomputer Applications Vol 27, No. 10, (2011).
Google Scholar
[7]
Wenying Zeng, Yuelong Zhao, Kairi Ou and Wei Song, Research on Cloud Storage Architecture and Key Technologies, ACM 978-1-60558-710-3/09/11, November 24-26, 2009 Seoul, Korea.
Google Scholar
[8]
Qinlu He, Zhanhuai Li and Xiao Zhang, Analysis of the key technology on cloud storage, appears in Future Information Technology and Management Engineering (FITME), 2010 International Conference on, pp.426-429, 9-10 Oct, (2010).
DOI: 10.1109/fitme.2010.5656540
Google Scholar
[9]
Weihui Zhang, Wanliang Wang and Zhaolin Fang, A research of campus network storage system, Journal Of ZheJang University Of Technology, Vol 33 No. 5, Oct, (2005).
Google Scholar
[10]
Longli Zhang, Cloud Storage Technology, in China Academic Journal Electronic Publishing House, [Online] http: /www. cnki. net, Aug, (2010).
Google Scholar
[11]
Qianlin Tan, The Development Trend of Library's data storage—Clould Storage, SCI-TECH INFORMATION DEVELOPMENT&ECONOMY, Aug, (2011).
Google Scholar
[12]
Lingdi Ping, Xiaoping Ge, Ya Wang, etc, etc, Cloud Storage as the Infrastructure of Cloud Computing, Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on.
DOI: 10.1109/icicci.2010.119
Google Scholar
[13]
pp.380-383, 22-23 June (2010).
Google Scholar
[14]
D J. Abadi, Data Management in the Cloud: Limitations and Opportunities, Bulletin of the IEEE Computer Society Technical Committee on Data Engineering.
Google Scholar
[15]
HeQun Wang, The Applications of cloud storage, in China Academic Journal Electronic Publishing House, 2008, [Online] http: /www. cnki. net.
Google Scholar
[16]
http: /tech. qq. com/a/20120910/000113. htm.
Google Scholar
[17]
Yi Yang, Yingchun Lai, Analysis of security issues in the cloud computing environment, COMPUTER KNOWLEDGE AND TECHNOLOGY, V01. 5,No. 16, June 2009, PP. 4154-4156.
Google Scholar
[18]
Prof. Dr. C. Weinhardt, Dr. B. Blau, Dipl. -Inform. N. Borissov, etc, etc, Cloud Computing–A Classification, Business Models and Research Directions, Business & Information Systems Engineering, Mar, (2009).
DOI: 10.1007/s12599-009-0071-2
Google Scholar
[19]
Jian Tang, Research and Application of the Cloud Computation Storage System, Computer Knowledge and Technology, V01. 5, No. 20, July 2009, pp.5337-5338, 5340.
Google Scholar
[20]
http: /www. ctocio. com. cn/cloud/118/12569118. shtml.
Google Scholar
[21]
http: /www. techweb. com. cn/news/2012-03-06/1162453. shtml.
Google Scholar
[22]
http: /www. enet. com. cn/article/2012/0809/A20120809148254. shtml.
Google Scholar
[23]
http: /it. 21cn. com/itnews/a/2013/0105/18/20177676. shtml.
Google Scholar
[24]
Kehuan Zhang, Xiaoyong Zhou, Yaoping Ruan, etc, Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds, ACM 978-1-4503-0948-6/11/10, October 17-21, 2011, Chicago, Illinois, USA.
DOI: 10.1145/2046707.2046767
Google Scholar
[25]
P A. Boampong and L A. Wahsheh, Different Facets of Security in the Cloud.
Google Scholar
[26]
http: /soft. yesky. com/security/446/34424446. shtml.
Google Scholar
[27]
http: /group. vsharing. com/News/Diary. aspx?id=31281.
Google Scholar
[28]
Hai Zhong, Analysis of the advantages and limitations of the cloud storage applications, Science & Technology Information, 2011 [Online] http: /d. g. wanfangdata. com. cn/Periodical_kjxx201135488. aspx.
Google Scholar
[28]
Xing San, Ali Cloud Storage OSS-Nine Tips, Porgrammer, I0024-I0027, (2012).
Google Scholar
[30]
D. Song, D. Wagner and A. Perrig, Practical Techniques for Searches on Encrypted Data, in IEEE Symposium on Research in Security and Privacy, (2000).
DOI: 10.1109/secpri.2000.848445
Google Scholar
[31]
R. Chow, P Golle, M Jakobsson, R Masuoka and etc, Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, ACM 978-1-60558-784-4/09/11, November 13, 2009, Chicago, Illinois, USA.
DOI: 10.1145/1655008.1655020
Google Scholar
[32]
Govinda. K and Perla Ravitheja, Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud, ACM 978-1-4503-1196-0/12/08, August 03-05, 2012, CHENNAI, India.
DOI: 10.1145/2345396.2345418
Google Scholar
[33]
P. S Kumar, R. Subramanian and D. T Selvam, Ensuring Data Storage Security in Cloud Computing using Sobol Sequence, proceedings of the 1st International Conference on Parallel, Distributed and Grid Computing (PDGC-2010) 978-1-4244-7674-9/10/ ©2010 IEEE.
DOI: 10.1109/pdgc.2010.5679900
Google Scholar
[34]
Wee Keong Ng, Yonggang Wen, Huafei Zhu, Private Data Deduplication Protocols in Cloud Storage, ACM 978-1-4503-0857-1/12/03, March 25-29, 2012, Riva del Garda, Italy.
Google Scholar
[35]
Lei Wan, Chunlu Wang and Chuanyi Liu, Secure Cloud Storage with Data De-duplication, [Online] http: /www. paper. edu. cn.
Google Scholar
[36]
Paolo Gasti, Giuseppe Ateniese and Marina Blanton, Deniable Cloud Storage: Sharing Files via Public-key Deniability, ACM 978-1-4503-0096-4/10/10, October 4, 2010, Chicago, Illinois, USA.
DOI: 10.1145/1866919.1866925
Google Scholar
[37]
Wang, C, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, In Proceedings of the IEEE INFOCOM, p.1–9, (2010).
DOI: 10.1109/infcom.2010.5462173
Google Scholar
[38]
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEECS Log Number TPDS-2010-03-0184, Digital Object Identifier no. 10. 1109/TPDS. 2010. 183, 20 Oct. (2010).
DOI: 10.1109/iwqos.2009.5201385
Google Scholar
[39]
Puneet Jai Kaur and Sakshi Kaushal, Security Concerns in Cloud Computing, A. Mantri et al. (Eds. ): HPAGC 2011, CCIS 169, p.103–112, 2011, © Springer-Verlag Berlin Heidelberg (2011).
Google Scholar
[40]
N. Santos, R. Rodrigues, K P. Gummadi, S. Saroiu, Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services", proceeding in Security, 12 Proceedings of the 21st USENIX conference on Security symposium, pp.10-10, USENIX Association Berkeley, CA, USA ©(2012).
Google Scholar
[41]
J A. Nicholson, Plus Ultra: Third-Party Preservation in a Cloud Computing Paradigm, Winter, 2012, Hastings Business Law Journal 8 Hastings Bus. L.J. 191.
Google Scholar