1. Provable data possession at untrusted stores[c];Ateniese,2007
2. Scalable and efficient provable data possession;Ateniese,2008
3. Technical issues of forensic investigations in cloud computing environments;Birk,2011
4. Cloud computing security incident. 2018. Available online: http://cio.zol.com.cn/228/2281017.html (accessed on 09 November.