2MELL P, GRANCE T. The NIST definition of cloud com- puting ( draft ) [ J ]. NIST Special Publication, 2011,800 : 145. 被引量:1
3WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing [ C ] JJProceedings of IEEE INFOCOM. 2010 : 1 - 9. 被引量:1
4GELLMAN R. Privacy in the clouds:Risks to privacy and confidentiality from cloud computing [ C ] J/Proceedings of the World Privacy Forum. 2012. 被引量:1
5MANYIKA J, CHUI M, BROWN B, et al. Big data: The next frontier for innovation, competition, and productivity [ R ]. New York: McKinsey Global Institute, 2011 : 1 - 137. 被引量:1
6KAUFMAN L M. Data security in the world of cloud com- puting [ J ]. IEEE Security & Privacy, 2009,7 ( 4 ) : 61. 被引量:1
8WANG C, WANG Q, REN K, et al. Toward secure and dependable storage services in cloud computing [ J ]. IEEE Transactions on Services Computing, 2012,5 (2) : 220 - 232. 被引量:1
9HO R. Cloud computing and enterprise migration strate- gies[ C ] ///Distributed Computing Innovations for Busi- ness, Engineering, and Science-autofilled. 2013 : 156. 被引量:1
10YU S, WANG C, REN K, et al. Achieving secure, scala- ble, and fine-grained data access control in cloud compu- ting [ C ]///Proceedings of IEEE INFOCOM. 2010 : 1 - 9. 被引量:1