[1] DIMAKIS A G, GODFREY P B, Wu Y N, et al. Network Coding for Distributed Storage Systems [J]. IEEE Transactions on Information Theory, 2010, 56(9): 4539-4551. doi: 10.1109/TIT.2010.2054295
[2] TAN C B, HIJAZI M H A, LIM Y, et al. A Survey on Proof of Retrievability for Cloud Data Integrity and Availability: Cloud Storage State-of-the-art, Issues, Solutions and Future Trends [J]. Journal of Network and Computer Applications, 2018, 110: 75-86. doi: 10.1016/j.jnca.2018.03.017
[3] THAKUR N, SINGH A, SANGAL A L. Data Integrity Authentication Techniques in Cloud Computing: A Survey [M]//Soft Computing: Theories and Applications. Springer, 2020: 1255-1267.
[4] GUDEME J R, PASUPULETI S K, KANDUKURI R. Review of Remote Data Integrity Auditing Schemes in Cloud Computing: Taxonomy, Analysis, and Open Issues [J]. International Journal of Cloud Computing, 2019, 8(1): 20-49.
[5] CHEN B, CURTMOLA R, ATENIESE G, et al. Remote Data Checking for Network Coding-Based Distributed Storage Systems [C] //Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop-CCSW '10. October 8, 2010. Chicago, Illinois, USA. New York: ACM Press, 2010: 31-42.
[6] CHEN H C H, LEE P P C. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 407-416. doi: 10.1109/TPDS.2013.164
[7] REN Z W, WANG L N, WANG Q, et al. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems [J]. IEEE Transactions on Services Computing, 2018, 11(4): 685-698. doi: 10.1109/TSC.2015.2481880
[8] SENGUPTA B, RUJ S. Publicly Verifiable Secure cloud Storage for Dynamic Data Using Secure Network Coding [C] //Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security-1ASIA CCS'16. May 30-1June 3, 2016. Xi'an, China. New York: ACM Press, 2016: 107-118.
[9] LIU J, HUANG K, RONG H, et al. Privacy-Preserving Public Auditing for Regenerating-Code-based Cloud Storage [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7): 1513-1528. doi: 10.1109/TIFS.2015.2416688
[10] LIU M P, JIANG R, KONG H F. Cryptanalysis and Countermeasures on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage [C] //Proceedings of the International Conference on Communication and Electronic Information Engineering (CEIE 2016). October 15-16, 2016. Guangzhou, China. Paris, France: Atlantis Press, 2016.
[11] LE A, MARKOPOULOU A, DIMAKIS A G. Auditing for Distributed Storage Systems [J]. IEEE/ACM Transactions on Networking, 2016, 24(4): 2182-2195. doi: 10.1109/TNET.2015.2450761
[12] LAKSHMI V S, PP D. A Secure Regenerating Code-Based Cloud Storage with Efficient Integrity Verification [J]. International Journal of Communication Systems, 2019, 32(9): e3948. doi: 10.1002/dac.3948
[13] LIANG W, FAN Y K, LI K C, et al. Secure Data Storage and Recovery in Industrial Blockchain Network Environments [J]. IEEE Transactions on Industrial Informatics, 2020, 16(10): 6543-6552. doi: 10.1109/TII.2020.2966069
[14] RASHMI K V, SHAH N B, KUMAR P V. Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction [J]. IEEE Transactions on Information Theory, 2011, 57(8): 5227-5239. doi: 10.1109/TIT.2011.2159049
[15] HU Y, CHEN H C H, LEE P P C, et al. NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds [C] // Proceedings of the 10th USENIX Conf. File Storage Technol. (FAST), 2012: 265-272.
[16] MENEZES A J, VAN OORSCHOT P C, VANSTONE S A. Handbook of Applied Cryptography [M]. Boca Raton: CRC Press, 2018.