[1] Park Ji Soo, Yi Ki Jung, Park Jong Hyuk. SSP-MCloud: a study on security service protocol for smartphone centric mobile cloud computing [C]//Lecture Notes in Electrical Engineering. Springer, 2012, 107:165-172.
[2] Feng Jun, Chen Yu, Summerville D, et al. Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol[C]//2011 IEEE Consumer Communications and Networking Conference. New York, USA, 2011:521-522.
[3] Bermbach D. Meta storage: a federated cloud storage system to manage consistency-latency tradeoffs [C]//2011 IEEE 4th International Conference on Cloud Computing. Washington DC, USA, 2011:452-459.
[4] Zhang Xinwen, Joshua Schiffman, Simon Gibbs, et al. Securing elastic applications on mobile devices for cloud computing [C]//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, USA, 2009:127-134.
[5] Park Ki-Woong, Han Jaesun, Chung Jae Woong, et al. THEMIS: towards mutually verifiable billing transactions in the cloud computing environment[C]//2010 IEEE 3rd International Conference on Cloud Computing. Miami, USA, 2010:139-147.
[6] Hsueh Sue-Chen, Lin Jing-Yan, Lin Ming-Yen. Secure cloud storage for convenient data archive of smart phones [C]//2011 IEEE 15th International Symposium on Consumer Electronics. Singapore, 2011: 251-258.
[7] Ruiz-Alvarez A, Humphrey M. An automated approach to cloud storage service selection [C]//Proceedings of the 2nd International Workshop on Scientific Cloud Computing. New York, USA, 2011: 39-48.
[8] Feng Jun, Chen Yu, Ku Wei-Shinn, et al. Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms [C]//2010 39th International Conference on Parallel Processing Workshops. San Diego, USA, 2010: 251-258.
[9] Ren Wei, Yu Linchen, Gao Ren, et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing [J]. Tsingha Science and Technology, 2011, 16(5): 520-528.