{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2024,2,1]],“日期-时间”:“2024-02-01T08:09:48Z”,“时间戳”:1706774988945},“引用-计数”:58,“发布者”:“爱思唯尔BV”,“许可证”:[{“开始”:{'日期-部件“:[2021,6,1]],”日期-时间“:”2021-06-01T00:00:00Z“,”timestamp“:1622505600000},”content-version“:“tdm”,“delay-in-days”:0,“URL”:“https:\/\/www.elsevier.com//tdm\/userlicense\/1.0\/”},{“start”:{“date-parts”:[[2021,6,1]],“date-time”:“2021-06-01T00:00:00Z”,“timestamp”:1622505600000},“content-version”:“stm-asf”,“delay-in-days”:“0”,“URL“https:\\/doi.org\/1015223\/policy-017“},{“start”:{“date-parts”:[[2021,6,1]],“date-time”:“2021-06-01T00:00:00Z”,“时间戳”:1622505600000},“内容版本”:“stm-asf”,“延迟天数”:0,“URL”:“https:\/\/doi.org/10.15223\/policy-037”},{“开始”:{“日期部分”:[[2021,6,1],“日期-时间”:“2021-06-01T00:00:00Z”,“时间戳”:1622505600000},“内容版本”:“stm-asf”,“延迟天数”:0,“URL”:“https:\/\/doi.org/10.15223\/policy-013 2”},{“开始”:{“日期部分”:[[2021,6,1]],“date-time”:“2021-06-01T00:00:00Z”,“timestamp”:1622505600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2021,6,1]],“datetime”:“2011-06-01T_00:00:0Z”,f“,”delay-in-days“:0,”URL“:”https:\/\/doi.org\/10.15223\/policy-004“}],“资助者”:[{“DOI”:“10.13039\/50110001871”,“name”:“Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia”,“DOI由”断言:“发布者”,“奖项”:[“PTDC\/EEI-COM\/29271\/2017”,“UID\/CEC\/50021\/2019”]}],“内容域”:{“域”:[“elsevier.COM”,“sciencedirect.COM”],“交叉标记限制”:true},“短容器标题”用法:[“Journal of Information Security and Applications”],“published-print”:{“date-parts”:[[2021,6]]},“DOI”:“10.1016\/j.jisa.2021.102826”,“type”:“Journal-article”,“created”:{“date-parts”:[[2021,5,4],“date-time”:“2021-05-04T19:20:11Z”,“timestamp”:162015601000},《page》:“102826”.org \/10.1016 \/elsevier_cm_policy“,”源“:“Crossref”,“is-referenced-by-count”:3,“title”:[“使用节省空间的秘密共享保护云中存储”],“prefix”:“10.1016”,“volume”:“59”,“author”:[{“ORCID”:”http://\/ORCID.org\/00000-0002-8978-9014“,“authenticated-ORCID”:false,“given”:Ahad“,”family“:”Niknia“,”sequence“:”first“,“affiliation”:[]},{“givent”:“Miguel”,“family”:“科雷亚”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Jaber”,“family”:“Karinpur”,“se序列”:“附加”,“从属关系”:[]}],“member”:“78”,“reference”:[{“key”:“doi-asserted-by”:“crossref”,“非结构化”:“Rocha F,Correia M.Lucy in the sky without diamonds:窃取云中的机密数据。in:云、数据中心和虚拟计算环境可靠性第一次国际研讨会。2011.”,“DOI”:“10.1109\/DSNW.2011.5958798”},{“key”:“101016\/j.jisa.2021.102826_b3”,“article-title”:“Multicloud:关于云计算最大趋势的所有信息”,“author”:“McLellan”,“year”:“2019”,“journal-title”:“ZDNet”},{“key”:“10.1016\/j.jisa.2021.102826_b4”,“doi-asserted-by”:“crossref”,“unstructured”:“Abu-Libdeh H,Princehouse L,Weatherspoon H。RACS:云存储多样性案例。摘自:第一届ACM云计算研讨会论文集。2010.p.229\u201340.“,”DOI“:”10.1145\/1807128.1807165“},{“issue”:“4”,“key”:“10.1016\/j.jisa.2021.102826_b5”,“DOI-asserted-by”:“crossref”,“first page”:”1“,”DOI“:“10.1145\/2535929”,“article-title”:“Depsky:云中可靠且安全的存储”,“volume”::“9”,“author”:“Bessani”,“year”:“2013”,“journal-title”:“ACM Trans storage”},{“key”:“10.1016\/j.jisa.2021.102826_b6“,“非结构化”:“Bessani A,Mendes R,Oliveira T,Neves N,Correia M,Pasin M et al.SCFS:共享的云备份文件系统。附:2014年USENIX年度技术会议记录。2014.p.169\u201380。“},{”key“:”10.1016\/j.jisa.2021.102826_b7“,”series-title“:”2011 IEEE网络计算与应用国际研讨会论文集“,”首页“:”9“,”article-title“:“Belisarius:BFT机密存储”,“author”:“Padilha”,“year”:“2011”},“key”:“10.1016//j.jisa.2021.1022826_b8”,“series-ttle”:“”ACM云计算研讨会论文集”,“article-title”:“Hybris:健壮的混合云存储”,“author”:“Dobre”,“year”:“2014”},{“key”:“10.1016\/j.jisa.2021.102826_b9”,“series-title”:《ACM第17届数据仓库和OLAP国际研讨会论文集》,“首页”:“81”,“article-title”:“fVSS:一种新的安全且经济高效的云数据仓库方案”,“author”:“Attasena”,“year”:“2014”},{“key”:“10.1016\/j.jisa.2021.102826_b10”,“unstructured”:“Han S,Shen H,Kim T,Krishnamurthy A,Anderson TE,Wetherall D。MetaSync:跨多个不受信任的存储服务进行文件同步。参加:USENIX年度技术会议。2015.p.83\u201395.“},{”key“:”10.1016\/j.jasa.2021.102826_b11“,”series-title“:”Amazon S3引入跨区域复制“,”year“:”2015“}”{”key“:“10.1016\/j.jisa.2021.10826_b12”,”doi-asserted-by“:”crossref“,”unstructured“:”Burihabwa D,Pontes R,Felber p,Maia F,Mercier H,Oliveira R et al。公共云的安全存储成本:实验评估。摘自:第35届IEEE可靠分布式系统研讨会论文集。2016.p.157\u201366.“,”DOI“:”10.1109\/SRDS.2016.028“},{“key”:“10.1016\/j.jisa.2021.102826_b13”,“DOI-asserted-by”:“crossref”,“unstructured”:“Pereira S,Alves A,Santos N,Chaves R.Storekeeper:一种安全增强的云存储聚合服务。In:可靠分布式系统(SRDS),2016年IEEE第35次研讨会。2016年。p.111\u201320.”,“DOI”:“10.1109\/SRDS.2016.023”},{“issue”:“5”,“key”:“10.1016\/j.gisa.2021.102826_b14”,“DOI断言者”:“crossref”,“首页”:“64”,“DOI”:“10.1109\/MCC.2011.110”,“文章标题”:“云计算中以用户为中心的安全性和可靠性”,“卷”:“3”,“作者”:“Lacoste”,“年份”:“2016”,“期刊标题”:“IEEE Cloud Compute t“},{”key“:”10.1016\/j.jisa.2021.102826_b15“,”doi-asserted-by“:”crossref“,”first page“:“190”,”doi“:”101016\/j.future.2016.02.001“,”article-title“:”DAC:使用重复数据消除辅助的云计算提高存储可用性“,”volume“:74”,“author”:“Wu”,“year”:“2017”,“journal-title”:“future Gener Compute Syst”},{“key”:“”10.1016\/j.jisa.2021.102826_b16“,”doi-asserted-by“:”crossref“,”unstructured“:”Matos DR,Pardal ML,Carle G,Correia M.RockFS:云备份文件系统对客户端攻击的恢复能力。收录:ACM中间件论文集\u201918。2018.“,”DOI“:”10.1145\/3274808.3274817“},{“key”:“10.1016\/j.jisa.2021.10286_b17”,“DOI-asserted-by”:“crossref”,“unstructured”:“Chen M,Zadok E.Kurma:安全的地理分布多云存储网关。In:第十二届ACM国际系统和存储会议论文集。2019年。p.109\u201320.“,”DOI“:”10.1145\/3319647.3325830“},{“key”:“10.1016\/j.jisa.2021.102826_b18”,“article-title”:“Charon:一个用于存储和共享大数据的安全云计算系统”,“author”:“Mendes”,“year”:“2019”,“journal-title“:”IEEE Trans-cloud Compute“}”,{”key“:“10.116\/j.jisa.2021.022826_b19”,“series-title”:”现代密码学导论”,“author”:“Lindell”,“year”:“2014”},{“key”:“10.1016\/j.jisa.2021.102826_b20”,“series-title”:“算法、密钥大小和参数报告-2014”,“首页”:“108”,“作者”:“欧盟网络和信息安全局”,“年份”:“2014},}“issue”:“2”,“key“10.1016 \/j.jisa.2021.021.1022826_b21”,“doi-asserted-by“:”crossref“,”first page“:”325“,”doi“:”10.1103\/PhysRevLett.79.325“,”article-title“:”量子力学有助于大海捞针“,”volume“:“79”,“author”:“Grover”,“year”:“1997”,“journal-title”:“Phys-Rev-Lett”},{“issue”:“11”,“key”:“10.1016\/j.jisa.2021.10226_b22”,“doi-assert-by”:“cross”ref“,”首页“:”612“,”DOI“:”10.1145\/359168.359176“,”article-title“:”How to share a secret“,“volume”:“22”,“author”:“Shamir”,“year”:“1979”,“journal-title”:“Commun ACM”},{“key”:”10.1016\/j.jisa.2021.10286_b23“,”DOI-asserted-by“:”crossref“,‘unstructured’:”Blakley GR.保护密钥。In:1979年AFIPS国家计算机会议记录。1979年。p.313\u20137.“,”DOI“:”10.1109\/MARK.1979.8817296“},{“key”:“10.1016\/j.jisa.2021.102826_b24”,“series-title”:“年度国际密码学会议”,“首页”:“129”,“文章标题”:“非交互式和信息理论安全可验证秘密共享”,“author”:“Pedersen”,”year“:”1991“}”,{”key“:“10.116\/j.jisa.2021.022826_b25”,“series-title“:”年度国际密码学会议“,”首页“:”339“,”article-title“:”主动秘密共享或:如何应对永久泄漏“,”author“:”Herzberg“,”year“:”1995“},{“key”:“10.1016\/j.jasa.2021.102826_b26”,“series-title”:“应用密码学手册”,“author”:“Menezes”,“year”:“1997”},}“key:”10.1016\/j.gisa.2021.102826_b27”,“非结构化”:“Storer MW,Greenan KM,Miller EL,Voruganti K.POTSHARDS:无加密的安全长期存储。参加:USENIX年度技术会议。2008.“},{”key“:”10.1016\/j.jisa.2021.102826_b28“,”series-title“:”年度国际密码学会议“,”首页“:”150“,”article-title“:“多秘密共享方案”,”author“:”Blundo“,”year“:”1994“}”,{“issue”:“12”,“key”:“10.1016\/j.jasa.2021.10826_b29”,“首页”:“2762”,“article-title”:“实用(t,n)多秘密et共享方案“,”volume“:”83“,”author“:”Chien“,”year“:”2000“,”journal-title“:”IEICE Trans Fundam Electron Commun Comput Sci“},{”issue“:”2“,”key“:“10.1016\/j.jisa.2021.102826_b30”,”doi-asserted-by“:”crossref“,”first page“:》483“,”doi“:”10.1016\/S0096-303(03)00355-2“,”article-title”:“A(t,n)multi-secret sharing scheme”,“volume“:”151“,”author“:”Yang“,”year“:”2004“,”journal-title“:”Appl Math Compute“},{”issue“:”6“,”key“:”10.1016\/j.jisa.2021.102826_b31“,”doi-asserted-by“:”crossref“,”first-page“:”1325“,”doi“:”101016\/j.jss.2012.01.027“,”article-title”:“高效(n,t,n)秘密共享方案”,“volume”:“85”,“author”:“Liu”,“year”:“2012”,“journal-title”w“},{”问题“:”2“,”密钥“:”10.1016\/j.jisa.2021.102826_b32“,”doi-asserted-by“:”crossref“,”first page“:”335“,”doi“:”10.1016\/j.ins.2010.09.013“,”article-title“:”节省空间的隐式数据安全秘密共享“,”volume“:“181”,“author”:“Parakh”,“year”:“2011”,“journal-title”:“Inform Sci”},{“key”:“10.1016\\j.jisa.2021.1022826_b33”,“series”title“:”密码学进展:CRYPTO\u201993”,“首页”:“136”,“文章标题”:“秘密共享很短”,“卷”:“第773卷”,“作者”:“Krawczyk”,“年份”:“1994”},{“密钥”:“10.1016\/j.jasa.2021.102826_b34”,“series-title”:“ACM SIGOPS操作系统评论”,“第一页”:”174“文章标题“:”低带宽网络文件系统“,”卷“:”第35卷“,”author”:“Muthitacharoen”,“year”:“2001”},{“key”:“10.1016\/j.gisa.2021.102826_b35”,“nonstructured”:“Anderson P,Zhang L.加密重复数据消除的快速安全笔记本电脑备份。In:Proceedings of 24th USENIX large installation system administration conference,2010.”},{“issue”:“6”,“key”:“10.1016\/j.gisa.2021.102826_b36”,doi断言为“:”crossref“,”first page“:”40“,”DOI“:”10.1109\/MSP.2010.187“,”article-title“:”云服务中的侧通道:“云存储中的重复数据消除”,“volume”:“8”,“author”:“Harnik”,“year”:“2010”,“journal-title”:“IEEE Secur Priv”},{“key”:”10.1016\/j.jisa.2021.10286_b37“,”非结构化“:”Bellare M,Keelvedhi S,Ristenpart T。DupLESS:用于重复数据消除存储的服务器辅助加密。附:第22届USENIX安全会议记录。2013.p.179\u201394.“},{“key”:“10.1016\/j.jisa.2021.102826_b38”,“series-title”:“第24届ACM计算理论年会论文集,1992年5月4日至6日,加拿大不列颠哥伦比亚省维多利亚市”,“首页”:“699”,“文章标题”:“安全计算的通信复杂性(扩展摘要)”,“作者”:“Franklin”,“年份”:“1992”},}“问题”:“3“,”key“:”10.1016\/j.jisa.2021.102826_b39“,”doi-asserted-by“:”crossref“,”first page“:“157”,”doi“:”101007\/BF00198463“,“article-title”:“On the size of shares schemes for secret sharing schemes”,“volume”:“6”,“author”:“Capocelli”,“year”:“1993”,“journal-title“:”j Crypto“},{“key”:”10.106\/j.jisa.2021.022826_b40“,“doi-asserted-by”:“crossref”,“非结构化”:“Larsen KG,Simkin M.秘密共享下限:要么重建困难,要么共享较长。参加:网络安全和加密国际会议。2020年,p.566\u201378.“,”DOI“:”10.1007\/978-3-030-57990-6_28“},{“key”:“10.1016\/j.jisa.2021.102826_b41”,“series-title”:“计算机科学课堂讲稿(包括人工智能子系列课堂讲稿和生物信息学课堂讲稿)”,“首页”:“11”,“article-title”:”秘密共享方案:调查“,”卷“:”第6639卷“,”作者:“Beimel”,“year”:“2011”},{“key”:“10.1016\/j.jisa.2021.102826_b42”,“doi-asserted-by”:“crossref”,“unstructured”:“Desmedt Y,Frankel Y.Threshold cryptosystems.in:第九届国际密码学年会论文集,密码学进展。1990。p.307\u201315.“,”DOI“:”10.1007\/0-387-34805-0_28“},{“问题”:“4”,“密钥”:“10.1016\/j.jisa.2021.102826_b43”,“DOI-asserted-by”:“crossref”,“首页”:“449”,“DOI”:“101002\/ett.4460050407”,“文章标题”:“门限加密”,“卷”:“5”,“作者”:“Desmedt”,年:“1994”,“日志标题“:”Eur Trans Telecommun“},{”key“:”10.1016\/j.jisa.2021.102826_b44“,“series-title”:“Criptobytes-RSA实验室的技术通讯”,“首页”:“7”,“文章标题”:“阈值密码术简介”,“卷”:“卷2”,“作者”:“Gemmell”,“年份”:“1997”},{“密钥”:“10.1016\/j.jasa.2021.10826_b45”,“doi-asserted-by”:“crossref”,”首页“:“765”,“doi”:“10.1016\/S0097-8493(02)00131-0“,”article-title“:”秘密图像共享“,”volume“:”26“,”author“:”Thien“,”year“:”2002“,”journal-title”:“计算图”},{“issue”:“1”,“key”:“10.1016\/j.jisa.2021.102826_b46”,“doi-asserted-by”:“crossref”,“first page”:”11“,”doi“:”10.1109\/TDSC.2004.2“,”article-title“:“”可靠和安全计算的基本概念和分类”,“卷”:“1”,“作者”:“Avi\u017eienis”,“年份”:“2004”,“日志标题”:“IEEE Trans-dependable secure Compute”},{“问题”:“5”,“密钥”:“10.1016\/j.jisa.2021.102826_b47”,“doi-asserted-by”:“crossref”,“首页”:“657”,“doi”:“10.0007\/s00778-017-0470.9”,“文章标题”:云数据安全秘密共享:a survey“,”volume“:”26“,”author“:”Attasena“,”year“:”2017“,”journal-title“:”The VLDB J“},{“issue”:“19”,“key”:“10.1016\/J.jisa.2021.1022826_b48”,“doi-asserted-by”:“crossref”,“first page”:”3323“,”doi“10.1016 \/J.ins.2009.05.013”,“article-title”:“使用隐式安全的在线数据存储”,“volume”:“179”,“author“:”Parakh“,”year“:”2009“,”journal-title“:”Inform Sci“},{”issue“:”1“,”key“:”10.1016\/j.jisa.2021.102826_b49“,”first page“:“1”,“article-title”:“Gauss,statistics,and Gaussian exclusion”,“volume”:“4”,“author”:“Stewart”,“year”:“1995”,“journal-title”“:”j Compute Graph Statist“}”,{“issue”:“”4“,“key”:”10.12016 \/j.jisa.2021.102826_b50“,”doi-asserted-by“:”crossref“,”first-page“:”398“,”doi“:”10.1145\/571637.571640“,”article-title“:”实用拜占庭容错和主动恢复“,”volume“:”20“,”author“:”Castro“,“year”:“2002”,“journal-title”:“ACM Trans-Comput Syst”},{“key”:“10.1016\/j.jasa.2021.10286_b51”,“series-title”:”计算机系统的安全控制(u):国防科学委员会计算机安全特别工作组报告”,“作者”:“Ware”,“年份”:“1970”},{“key”:“10.1016\/j.jisa.2021.102826_b52”,“首页”:“1”,“文章标题”:“云计算v2关键关注领域的安全指南。1“,”author“:”Brunette“,”year“:”2009“,”journal-title“:”Cloud Secure Alliance“},”{“key”:“10.1016\/j.jisa.2021.102826_b53”,“series-title”:“Apache jclouds\u00ae”,“author”:“Foundation”,“year”:“2018”},“key“:”10.1016\/j.jasa.2021.10826_b54“,”unstructured“:”神谕。Java平台,标准版安全开发人员\u2019s指南。https:\/\/docs.oracle.com/javase\/9\/security\/oracleproviders.htm。“},{”key“:”10.1016\/j.jisa.2021.102826_b55“,”unstructured“:”Oracle.Java Standard Edition Security Platform,Developer\u2019s Guide.https:\//docs.Oracle.com/javase\/9\/Security\/toc.htm.“}”,{“key”:“10.1016\/j.jasa.2021.10826_b56”,“doi-asserted-by”:“crossref”,“unstructure”:“Georges A,Buytaert D,Eeckhout L。统计上严格的java性能评估。收录:第22届ACM SIGPLAN面向对象编程系统年会论文集。2007年,第57\u201376页。“,”DOI“:”10.1145\/1297027.1297033“},{“key”:“10.1016\/j.jisa.2021.102826_b57”,“非结构化”:“Amazon S3区域和端点。https:\/\/docs.aws.Amazon.com\/general\/latest\/gr\/rande.html.”},“key“:”101016\/j.jisa.2021.10226_b58“,”非结构化“:”亚马逊。亚马逊EC2地区列表。https:\/\/docs.aws.amazon.com/AWSEC2\/latest\/UserGuide\/using-regions-availability-zones.html。“}],”container-title“:[”Journal of Information Security and Applications“],”original-title”:[],”language“:”en“,”link“:[{”URL“:”https:\\/api.elsevier.com/content\/article\/PII:S2214212621000636?httpAccept=text\/xml“,”content-type“:”text\/.xml“,”content-version“:”vor“,”intended-application“:”text-mining“},”{“URL”:“”https:\/\/api.elsevier.com/content\/article\/PII:S2214212621000636?httpAccept=text\\/plain”,“内容类型”:“text\\/plain”,“内容版本”:“vor”,“预期应用程序”:“文本挖掘”}],“已存储”:{“日期部分”:[[2023,5,2]],“日期时间”:“2023-05-02T16:27:19Z”,“时间戳”:1683044839000},“分数”:1,“资源”:{“主要”:{“URL”:“https://linkinghub.elsevier.com/retrieve\\/pii\\S2214212621000636”},“副标题”:[],”shorttitle“:[],”issued“:{”date-parts“:[2021,6]]},”references-count“:58,”alternative-id“:[”S2214212621000636“],”URL“:”http://\/dx.doi.org\/10.1016\/j.jisa.2021.102826“,”relationship“:{},“ISSN”:[”2214-2126“],“ISSN-type”:[{“value”:“2214-2116”,“type”:“print”}],“subject”:[],“published”:{“date-parts”:[[2021,6]]},“assertion”:[{“value”:“Elsevier”,“name”:“publisher“,”label“:”本文由“},{”value“:”使用节省空间的秘密共享保护云中云存储“,”name“:”articletitle“,”标签“:”文章标题“}、{”value“:”Journal of Information Security and Applications“,”name:“journaltitle”,“label”:“Journal Title”},“value”:“https:\/\/doi.org\/101016\/j.jisa.2021.10286”,“name”:“”articlelink“,”label“:”CrossRef DOI link to publisher maintained version“},{”value“:”article“,”name“:”content_type“,”标签“:”content-type“}”,{“value”:“\u00a9 2021 Published by Elsevier Ltd.”,“name”:“copyright”,“label”:“copyright“}],”文章编号“:”102826“}