[1]
NDRC and MIIT: Notice on Pilot Model for the Development and Innovation of Cloud Computing Services Work, 18 Oct, 2010. (In Chinese).
Google Scholar
[2]
Hui An: Development Status and Innovation of Cloud Computing in China (PPT), P. 25 (In Chinese).
Google Scholar
[3]
Peter Mell and Timothy Grance: The NIST Definition of Cloud Computing. http: /docs. ismgcorp. com/files/external/Draft-SP-800-145_cloud-definition. pdf.
DOI: 10.6028/nist.sp.800-145
Google Scholar
[4]
DeYi Li: Cloud Computing Technology Development Report 2012, Chapter 2, Mission of Cloud Computing, pp.13-48 (In Chinese).
Google Scholar
[5]
Puneet Jai Kaur and Sakshi Kaushal: Security Concerns in Cloud Computing, Communication in Computer and Information Science Vol. 169(2011), pp.103-112.
Google Scholar
[6]
Vamsee Krishna Yarlagadda and Sriram Ramanujam: Data Security in Cloud Computing, Vol. 2(2011), pp.15-23.
Google Scholar
[7]
ShuPing Chen and XianLiang Hou: DES Data Encryption/Decryption Technology in Computer Network, Modern Electronic Technology, Vol. 9(2005), pp.114-115(In Chinese).
Google Scholar
[8]
Marie A. Wright: The evolution of the Advanced Encryption Standard, Network Security, Vol. 11(1999), pp.11-14.
Google Scholar
[9]
James Nechvatal, Elaine Barker and Lawrence Bassham: Report on the Development of the Advanced Encryption Standard (AES), NIST, October 2, 2000, p.21.
Google Scholar
[10]
Ming Xing He and Lin Hao: Implementation of the Advanced Encryption Standard (AES), Computer Employment Research, Vol. 12(2002), pp.16-36(In Chinese).
Google Scholar
[11]
Hong Xu and GangQiang Tang: Data Security and Encrypting Arthmetic, Technological Development of Enterprise, Vol. 25(2006), pp.16-18(In Chinese).
Google Scholar
[12]
Vanstone Scott: A ECC system—The Answer to Strong, Fast Public-Key Cryptography for Securing Constrained Environment, Information Security Technical Report, Vol. 2(1997), pp.78-87.
DOI: 10.1016/s1363-4127(97)81331-3
Google Scholar
[13]
Zhen Song: Cryptography (China WaterPower Press, Chinese 2002), pp.3-129(In Chinese).
Google Scholar
[14]
Tao Sui: Discussion on DES and AES Data Encryption Algorithm, Journal of Hubei University of Education, Vol. 30: 8 (2013), pp.66-68(In Chinese).
Google Scholar
[15]
XingYe Han, Gang Chen and ShiBing Zhu: A XML Encryption Solution Based on AES and RSA, Vol. 2(2005), pp.140-142(In Chinese).
Google Scholar
[16]
MengMeng Wang: Big Data Encryption Algorithm Based on Data Deduplicaiton Technology (North China University of Water Resources and Electric Power, Chinese 2013).
Google Scholar