1. G. Xu, Y. Yang, C. Yan, Y. Gan, A rapid locating protocol of corrupted data for cloud data storage. Ksii Trans. Internet Inf. Syst.10(10), 4703–4723 (2016).
2. C. Wang, Q. Wang, K. Ren, W. Lou, in proceedings of IEEE INFOCOM 2010. Privacy-preserving public auditing for data storage security in cloud computing (IEEESan Diego, 2010).
3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, in Proceedings of the 14th ACM conference on Computer and Communications Security. Provable data possession at untrusted stores (ACMNew York, 2007), pp. 598–609.
4. H. Shacham, B. Waters, in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securit. Compact proofs of retrievability (SpringerBerlin, 2008), pp. 90–107.
5. Y. Deswarte, J. -J. Quisquater, A. Saidane, in Proceedings of IFIP Advances in Information and Communication Technology. Remote integrity checking (SpringerBoston, 2003), pp. 1–11.