[1] 孙世璞.基于区块链的分布式冗余共享存储系统隐私保护算法研究[D].镇江:江苏大学, 2020. [2] Nofer M, Gomber P, Hinz O, et al.Blockchain[J].Business&Information Systems Engineering, 2017, 59(3):183-187. [3] Wilkinson S, Boshevski T, Brandoff J, et al.Storj a peer-to-peer cloud storage network[EB/OL].(2014-12-15)[2021-11-11].https://www.storj.io/storj2014.pdf. [4] Benet J.IPFS-content addressed, versioned, P2P file system[EB/OL].(2014-07-14)[2021-11-12].https://arxiv.org/abs/1407.3561. [5] Benet J, Greco N.Filecoin:a decentralized storage network[EB/OL].(2017-07-19)[2021-11-12].https://filecoin.io/filecoin.pdf. [6] Kumar R, Tripathi R.Implementation of distributed file storage and access framework using IPFS and blockchain[C]//2019 Fifth International Conference on Image Information Processing, IEEE, 2019:246-251. [7] Chen Y, Li H, Li K, et al.An improved P2P file system scheme based on IPFS and blockchain[C]//2017 IEEE International Conference on Big Data, 2017:2652-2657. [8] Zheng Q, Li Y, Chen P, et al.An innovative IPFS-based storage model for blockchain[C]//2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018:704-708. [9] BTFS Labs.The BTFS developer hub[EB/OL].(2018-09-21)[2021-09-20].https://docs.btfs.io/. [10] Vorick D, Champine L.Sia:simple decentralized storage[R/OL].(2014-11-29)[2021-11-05].https://blockchainlab.com/pdf/whitepaper3.pdf. [11] Nakamoto S.Bitcoin:a peer-to-peer electronic cash system[R/OL].(2008-10-31)[2021-08-12].https://www.debr.io/article/21260-bitcoin-a-peer-to-peer-electronic-cash-system. [12] Wattenhofer R.The science of the blockchain[M].[S.l.]:CreateSpace Independent Publishing Platform, 2016. [13] 范贤丽,范春晓,吴岳辛.基于区块链和IPFS技术实现粮食供应链隐私信息保护[J].应用科学学报, 2019, 37(2):179-190.Fan X L, Fan C X, Wu Y X.Realization of privacy protection of food supply chain based on blockchain and IPFS[J].Journal of Applied Sciences, 2019, 37(2):179-190.(in Chinese) [14] Wang Q, Wang C, Ren K, et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems, 2010, 22(5):847-859. [15] Menezes A J, Okamoto T, Vanstone S A.Reducing elliptic curve logarithms to logarithms in a finite field[J].IEEE Transactions on Information Theory, 1993, 39(5):1639-1646. [16] Boneh D, Franklin M.Identity-based encryption from the Weil pairing[C]//Annual International Cryptology Conference.Berlin, Heidelberg:Springer, 2001:213-229. [17] Joux A.A one round protocol for tripartite Diffie-Hellman[C]//International Algorithmic Number Theory Symposium.Berlin, Heidelberg:Springer, 2000:385-393. [18] Boneh D, Lynn B, Shacham H.Short signatures from the Weil pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin, Heidelberg:Springer, 2001:514-532. [19] Poon J, Dryja T.The bitcoin lightning network:scalable off-chain instant payments[EB/OL].(2016-01-14)[2021-11-01].https://www.bitcoinlightning.com/wp-content/uploads/2018/03/lightning-network-paper.pdf. [20] Seres I A, Gulyãs L, Nagy D A, et al.Topological analysis of bitcoin's lightning network[M]//Mathematical Research for Blockchain Economy.Cham:Springer, 2020:1-12. [21] Kaashoek M F, Karger D R.Koorde:a simple degree-optimal distributed Hash table[C]//International Workshop on Peer-to-Peer Systems.Berlin, Heidelberg:Springer, 2003:98-107. [22] Dimakis A G, Prabhakaran V, Ramchandran K.Decentralized erasure codes for distributed networked storage[J].IEEE Transactions on Information Theory, 2006, 52(6):2809-2816. [23] Reed I S, Solomon G.Polynomial codes over certain finite fields[J].Journal of the Society for Industrial and Applied Mathematics, 1960, 8(2):300-304. [24] 胡金平,李贵洋,李慧,等.异构去中心化存储中的LRC-RS混合编码[J].计算机工程与设计, 2021, 42(2):301-308.Hu J P, Li G Y, Li H, et al.Hybrid coding LRC-RS in heterogeneous decentralized storage[J].Computer Engineering and Design, 2021, 42(2):301-308.(in Chinese) [25] Merkle R C.A digital signature based on a conventional encryption function[C]//Conference on Theory and Application of Cryptographic Techniques.Berlin, Heidelberg:Springer, 1987:369-378. [26] Wang Y, Li S.Research and performance evaluation of data replication technology in distributed storage systems[J].Computers&Mathematics with Applications, 2006, 51(11):1625-1632. [27] 王意洁,许方亮,裴晓强.分布式存储中的纠删码容错技术研究[J].计算机学报, 2017, 40(1):236-255.Wang Y J, Xu F L, Pei X Q.Research on erased coded-based fault-tolerant technology for distributed storage[J].Chinese Journal of Computers, 2017, 40(1):236-255.(in Chinese) [28] Weatherspoon H, Kubiatowicz J D.Erasure coding vs.replication:a quantitative comparison[C]//International Workshop on Peer-to-Peer Systems.Berlin, Heidelberg:Springer, 2002:328-337. [29] Huang C, Simitci H, Xu Y, et al.Erasure coding in windows azure storage[C]//Proceedings of 2012 USENIX Conference on Annual Technical Conference, 2012:15-26. |