云数据中心智能管理
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

本章参考文献

[1] Wikipedia Cloud Computing [EB/OL]. [2019-07-22]. http://en.wikipedia.org/wiki/cloud_computing.

[2] ARMBRUST,MICHAEL,FOX,et al. Above the Clouds:A Berkeley View of Cloud Computing[J]. Eecs Department University of California Berkeley,2019,53(4):50-58.

[3] WANG L,LASZEWSKI G V,YOUNGE A,et al. Cloud Computing:A Perspective Study[J]. New Generation Computing,2010,28(2):137-146.

[4] 董晓霞,吕廷杰. 云计算研究综述及未来发展[J]. 北京邮电大学学报(社会科学版),2010,12(5):76-81.

[5] 云计算的概念和内涵[EB/OL]. [2019-07-22]. http://www.chinacloud.cn/show.aspx?id=14668&cid=17.

[6] 杨欢. 云数据中心构建实战:核心技术、运维管理、安全与高可用[M]. 北京:机械工业出版社,2014.

[7] SMARR L,CATLETT C E. Metacomputing[J]. Communications of the ACM,1992,35(6):44-52.

[8] 肖连兵,黄林鹏. 网格计算综述[J]. 计算机工程,2002,28(3):1-3.

[9] 郭毅. 云计算发展历程大事记[J]. 数字通信,2010,03:22.

[10] 2011年云计算大事记[EB/OL]. [2019-07-22]. http://blog.sina.com.cn/s/blog_5fc550760100yep1.html.

[11] 2013年云计算领域大事记[EB/OL]. [2019-07-22]. http://www.cstor.cn/textdetail_5906.html.

[12] 步入云计算[EB/OL]. [2019-07-22]. http://www.chinacloud.cn/show.aspx?id=22817&cid=17.

[13] 罗军舟,金嘉晖,宋爱波等. 云计算:体系架构与关键技术[J]. 通信学报,2011,32(7):3-21.

[14] 雷万云. 云计算企业信息化建设策略与实践[M]. 北京:清华大学出版社,2010.

[15] 云计算的发展史[EB/OL]. [2019-07-22]. http://blog.sina.com.cn/s/blog_99096bb001015as7. html.

[16] 虚拟化、(完)全虚拟化、半虚拟化和准虚拟化技术个人总结[EB/OL]. [2019-07-22]. http://www.cnblogs.com/hsqdboke/p/4103415. html.

[17] 云桌面及桌面虚拟化的功能[EB/OL]. [2019-07-22]. http://virtual.51cto.com/art/201412/460345.html.

[18] 平台虚拟化技术[EB/OL]. [2019-07-22]. https://www.douban.com/note/394890609/.

[19] 【深度】解析IaaS的基本资源及资源虚拟化[EB/OL]. [2019-07-22]. http://cloud.51cto.com/art/201508/489295.html.

[20] 雷万云. 云计算:技术、平台及应用案例[M]. 北京:清华大学出版社,2011.

[21] 杨娴,陈麟. 云计算环境下的应用虚拟化的研究[J]. 软件学报,2012,33(4):74-77.

[22] 顾敏,吴俊. 桌面虚拟化在移动查房中的应用[J]. 中国数字医学,2014,(4):97-98.

[23] 谈圳. 云计算虚拟化技术研究[J]. 信息技术与信息化,2012(1):54-57.

[24] 时卫东. 基于内核的虚拟机的研究[D]. 长春:吉林大学,2011.

[25] 冯文健. VMware ESX Server的特色及应用分析[J]. 科技信息,2012(24):19-19.

[26] Citrix XenServer体系架构解析[EB/OL]. [2019-07-22]. http://mp.weixin.qq.com/s?biz=MjM5NTczODkyOA==&mid=401233872&idx=1&sn=c648336681264ed19ad28c06c437f7b6&scene=4.

[27] Hyper-V [EB/OL]. [2019-07-22]. https://en.wikipedia.org/wiki/Hyper-V.

[28] Docker [EB/OL]. [2019-07-22]. http://baike.baidu.com/view/11854949.htm.

[29] Docker架构 [EB/OL]. [2019-07-22]. http://www.runoob.com/docker/docker-architecture.html.

[30] 云计算:虚拟化技术——介绍[EB/OL]. [2019-07-22]. http://www.enkj.com/idcnews/Article/201-30710/228.

[31] 时卫东. 基于内核的虚拟机的研究[D]. 长春:吉林大学,2011.

[32] 马玮骏,吴海佳,刘鹏. MassCloud云存储系统构架及可靠性机制[J]. 河海大学学报(自然科学版),2011,39(3):348-352.

[33] RIPEANU M,FOSTER I,IAMNITCHI A. Mapping the Gnutella Network:Properties of large-Scale Peer-to-Peer Systems and Implications for System Design[J]. IEEE Internet Computing,2002,6(1):50-57.

[34] 周静岚. 云存储数据隐私保护机制的研究[D]. 南京:南京邮电大学,2014.

[35] 宋凯,耿义良. 云存储技术[J]. 才智,2010(4):65-65.

[36] Hadoop. Hadoop Homepage[EB/OL].[2019-07-22]. http://hadoop. apache. org/.

[37] JIN N,BAI S,KHOSRAVI E,et al. A Hadoop Approach to Advanced Sampling Algorithms in Molecular Dynamics Simulation on Cloud Computing[C]. IEEE International Conference on Bioinformatics & Biomedicine,2014.

[38] HUA X Y,WU H,LI Z,et al. Enhancing Throughput of the Hadoop Distributed File System for Interaction-Intensive tasks[J]. Journal of Parallel and Distributed Computing,2014,74(8):2770-2779.

[39] 黄其华. 多数据中心云存储环境下多副本管理策略的研究[D]. 厦门:厦门大学,2014.

[40] GHEMAWAT S,GOBIOFF H,LEUNG S. The Google file system[C]. ACM SIGOPS Operating Systems Review. ACM,2003.

[41] MCKUSICK K,QUINLAN S. GFS:Evolution on Fast-forward[J]. Communications of the ACM,2010,53(3):42-49.

[42] 刘通. 基于HDFS的小文件处理与副本策略优化研究[D]. 青岛:中国海洋大学,2014.

[43] HASHEN I A T,YAQOOB I,ANUAR N B,et al. The Rise of "Big Data" on Cloud Computing:Review and Open Research Issues[J]. INFORMATION SYSTEMS,2014,47:98-115.

[44] 吴贵鑫. 云计算中的MapReduce并行编程模式研究[D]. 焦作:河南理工大学,2010.

[45] 徐婧. 云存储环境下副本策略研究[D]. 合肥:中国科学技术大学,2011.

[46] 邵军. 云端融合计算环境中的多副本管理机制研究[D]. 南京:南京邮电大学,2015.

[47] 冯登国,张敏,张妍等. 云计算安全研究[J]. 软件学报,2011,22(1):71-83.

[48] CRAMPTON J,MARTIN K,WILD P. On Key Assignment for Hierarchical Access Control[C]. the 19th IEEE Computer Security Foundations Workshop,2006.

[49] AMANI E D,VIMERCATI S,FORESTI S,et al. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing[C]. New Approaches for Security,Privacy and Trust in Complex Environments,Proceedings of the IFIP TC-11 22nd International Information Security Conference,2007.

[50] GOYAL V,PANDEY O,SAHAI A,et al. Attribute-based Encryption for Fine-Grained Access Control of Encrypted Data[C]. 13th ACM Conference on Computer and Communications Security,2006.

[51] BETHENCOURT J,SAHAI A,WATERS B. Ciphertext-Policy Attribute-Based Encryption[C]. 2007 IEEE Symp. on Security and Privacy,2007.

[52] CHANG Y C,MITZENMACHER M . Privacy Preserving Keyword Searches on Remote Encrypted Data[C].Applied Cryptography and Network Security,Third International Conference,2005.

[53] MALEK B,MIRI A. Combining Attribute-Based and Access Systems[C]. 12th IEEE Intel Conf. on Computational Science and Engineering. IEEE Computer Society,2009.

[54] OSTROVSKY R,SAHAI A,WATERS B. Attribute-Based Encryption with non-Monotonic Access Structures[C]. 2007 ACM Conf. on Computer and Communications Security,2007.

[55] YU S,REN K,LOU W,et al. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems[C]. 5th International ICST Conference,SecureComm,2009.

[56] HONG C,ZHANG M,FENG D G. AB-ACCS:A cryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development,2010,47(Supplementary issue I):259-265.

[57] GOH E J. Secure indexes[D]. Stanford University,2003.

[58] BONEH D,FRANKLIN M. Identity-Based Encryption From the Weil pairing[J]. SIAM Journal on Computing,2003,32(3):586-615.

[59] IBRAIMI L,PETKOVIC M,NIKOVA S,et al. Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes[D]. Enschede,University of Twente,2009.

[60] ROY S,CHUAH M. Secure Data Retrieval Based on Ciphertext Policy Attribute-Based Encryption(CP-ABE)System for the DTNs[R]. Technical Report,2009.

[61] CHOW R,GOLLE P,JAKOBSSON M,et al. Controlling Data in the Cloud:Outsourcing Computation Without Outsourcing Control[C]. 2009 ACM Workshop on Cloud Computing Security,2009.

[62] SONG D,WAGNER D,PERRIG A. Practical Techniques for Searches on Encrypted Data[C]. IEEE Computer Society Symp. on Research in Security and Privacy,2000.

[63] GENTRY C. Fully Homomorphic Encryption Using Ideal Lattices[C]. 2009 ACM Int’l Symp. On Theory of Computing. New York:Association for Computing Machinery,2009.

[64] DAN B,CRESCENZO G D,OSTROVSKY R,et al. Public Key Encryption with Keyword Search[C].International Conference on the Theory and Applications of Cryptographic Techniques,Interlaken,Switzerland,2004.

[65] JUELS A,KALISKI B. Pors:Proofs of Retrievability for Large Files[C]. 2007 ACM Conf. on Computer and Communications Security,2007.

[66] ATENIESE G,BURNS R,CURTMOLA R. Provable Data Possession at Untrusted Stores[C]. 2007 ACM Conf. on Computer and Communications Security,2007.

[67] PIETRO D R,MANCINI L V,ATENIESE G. Scalable and Efficient Provable Data Possession[C]. The 4th Int’l Conf. on Security and Privacy in Communication Netowrks,2008.

[68] ZENG K . Publicly Verifiable Remote Data Integrity[J]. ICICS,2008.

[69] YUN A,SHI C,KIM Y . On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage[C]. ACM Workshop on Cloud Computing security,2009.

[70] QIAN W,CONG W,JIN L,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]. European Symposium on Research in Computer Security,2009.

[71] SCHWARZ T,ETHAN S J,MILLER L. Store,Forget,and Check:Using Algebraic Signatures to Check Remotely Administered Storage[C]. 26th IEEE Intel Conf. on Distributed Computing Systems. IEEE Press,2006.

[72] ROY I,RAMADAN H E,SETTY S T V,et al. Airavat:Security and Privacy for MapReduce[C]. 7th Usenix Symp. on Networked Systems Design and Implementation,2010.

[73] BOWERS K D,JUELS A,OPREA A. Proofs of Retrievability:Theory and Implementation[C]. 16th ACM Computer and Communications Security Conf.,2009.

[74] ELANGOP S,DUSSEAUAETAL A. Deploying Virtual Machines as Sandboxes for the Grid[C]. 2nd Workshop on Real,Large Distributed Systems,2005.

[75] MUNTÉS-MULERO V,NIN J. Privacy and Anonymization for Very Large Datasets[C]. ACM 18th Intel Conf. on Information and Knowledge Management,2009.

[76] RAYKOVA M,VO B,BELLOVIN S M,et al. Secure Anonymous Database Search[C]. 2009 ACM Workshop on Cloud Computing Security,2009.

[77] RAJ H,NATHUJI R,SINGH A,et al. Resource Management for Isolation Enhanced Cloud Services[C]. 2009 ACM Workshop on Cloud Computing Security,2009.

[78] WEI J,ZHANG X,AMMONS G,et al. Managing Security of Virtual Machine Images in a Cloud Environment[C]. 2009 ACM Workshop on Cloud Computing Security,2009.

[79] GONG L,QIAN X L. The Complexity and Composability of Secure Interoperation[C]. The 94 IEEE Symp. on Security and Privacy,1994.

[80] 伊沃纳·布兰蒂奇,托尼·马斯泰利奇,刘世杰. 云计算 节能之路[J]. 环球科学,2015(8):22-29.

[81] BONATTI P,VIMERCATI S C,SAMARATI P. An Algebra for Composing Access Control Policies[J]. ACM Trans. on Information and System Security,2002,5(1):1-35.

[82] WIJESEKERA D,JAJODIA S. A Propositional Policy Algebra for Access Control[J]. ACM Trans. on Information and System Security,2003,6(2):286-325.

[83] AGARWAL S,SPRICK B. Access Control for Semantic Web Services[C]. IEEE Intel Conf. on Web Services,2004.

[84] SHAFIQ B,JOSHI J B D,BERTINO E,et al. Secure Interoperation in a Multidomain Environment Employing RBAC Policies[J]. IEEE Trans. on Knowledge and Data Engineering,2005,17(11):1557-1577.

[85] SANTOS N,GUMMADI K P,RODRIGUES R. Towards Trusted Cloud Computing[C]. Workshop on Hot Topics in Cloud Computing,2009.

[86] SADEGHI A R,SCHNEIDER T,WINANDY M. Token-Based Cloud Computing:Secure Outsourcing of Data and Arbitrary Computations with Lower Latency[C]. 3rd Intel Conf. on Trust and Trustworthy Computing,2010.

[87] 南京农业大学图书与信息中心. 数据中心功耗及其指标[EB/OL]. [2019-07-22] http://szxy.hhu.edu.cn/s/6/t/5/ad/f6/info110070.html.

[88] 张栖桐. 面向绿色云计算的虚拟机迁移机制的研究[D]. 南京:南京邮电大学,2017.

[89] 林伟伟,吴文泰. 面向云计算环境的功耗测量和管理方法[J]. 软件学报,2016,27(4):1026-1041.

[90] 吕继祥,王铁军,赵丽,等. 基于自然冷却技术应用的数据中心空调节能分析[J]. 制冷学报,2016,37(3):113-118.

[91] 中国日报. 绿色云计算——让科技与环保同行[EB/OL]. [2019-07-22] http://www.chinacloud.cn/show.aspx?id=8046&cid=12, 2011.

[92] GARZON E M,MORENO J J,MARTINEZ J A. An Approach to Optimise the Energy Efficiency of Iterative Computation on Integrated GPU-CPU Systems[J]. Journal of Supercomputing,2017,73(1):114-125.

[93] 南京农业大学图书与信息中心. 数据中心功耗及其指标[EB/OL]. [2019-07-22] http://szxy.hhu.edu.cn/s/6/t/5/ad/f6/info110070.html, 2014.

[94] 郭荣佐,郭进,黎明. 绿色计算与绿色嵌入式系统[J]. 计算机科学,2015,42(8):13-21.

[95] 谢孟晓,刘金祥,牛晓峰,等. 数据中心机架式服务器选型对其热环境的影响及优化分析[J]. 低温与超导,2016,(8):74-78.

[96] GARZON E M,MORENO J J,MARTINEZ J A. An Approach to Optimise the Energy Efficiency of Iterative Computation on Integrated GPU-CPU Systems[J]. Journal of Supercomputing,2017,73(1):114-125.

[97] Intel. Ssd-320-specification [EB/OL]. [2019-07-22]. http://www. intel. eu/content/www/eu/en/solid-state-drives/ssd-320-specification. html.

[98] SALVO D,ANDRÉ L A,AGOSTINHO F,et al. Can Cloud Computing be Labeled as“Green”? Insights Under an Environmental Accounting Perspective[J]. Renewable and Sustainable Energy Reviews,2017,69:514-526.

[99] Garzon E M,Moreno J J,Martinez J A. An Approach to Optimise the Energy Efficiency of Iterative Computation on Integrated GPU-CPU Systems[J]. Journal of Supercomputing,2017,73(1):114-125.

[100] 刘鹏. 云计算[M]. (2版). 北京:电子工业出版社,2011.

[101] NONDE L,EL-GORASHI T E H,ELMIRGHANI J M H. Energy Efficient Virtual Network Embedding for Cloud Networks[J]. Journal of Lightwave Technology,2015,33(9):1.

[102] TZIRITAS N,XU C Z,LOUKOPOULOS T,et al. Application-Aware Workload Consolidation to Minimize both Energy Consumption and Network Load in Cloud Environments[C]. 2013 42nd International Conference on Parallel Processing,2013.

[103] NUNEZYANEZ J,HOSSEINABABY M,BELDACHI A. Energy Optimization in Commercial FPGAs with Voltage,Frequency and Logic Scaling[J]. IEEE Transactions on Computers,2016,65(5):1.

[104] MEI J,LI K L,OUYANG A,et al. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing[J]. IEEE Transactions on Computers,2015,64(11):3064-3078.

[105] SUN D W,ZHANG G Y,YANG S L,et al. Re-Stream:Real-Time and Energy-Efficient Resource Scheduling in Big Data Stream Computing Environments[J]. Information Sciences,2015,319:92-112.

[106] 谌运. 云系统节点与网络资源管理机制的研究与实现[D]. 南京:南京邮电大学,2017.

[107] GORANSSON P,BLACK C. 软件定义网络:原理、技术与实践[M]. 电子工业出版社,2016.

[108] 魏凯. 基于蚁群算法SDN负载均衡的研究[D]. 长春:吉林大学,2015.

[109] 胡留赟. 软件定义网络中流表优化及攻击检测机制研究与应用[D]. 南京:南京邮电大学,2019.

[110] VARGHESE B,BUYYA R. Next Generation Cloud Computing:New Trends and Research Directions[J]. Future Generation Computer Systems,2018,79(3):849-861.

[111] WANG X,FAN J X,LIN C K,et al. BCDC:A High-Performance,Server-Centric Data Center Network[J]. Jouranl of Computer Science and Technology,2018,33(2):400-416.

[112] WANG J H,WANG D H,QIU M K,et al. A locality-aware shuffle optimization on Fat-Tree Data Centers[J]. Future Generation Computer Systems,2018,89:31-43.

[113] 刘晓茜,杨寿保,郭良敏,等. 雪花结构:一种新型数据中心网络结构[J]. 计算机学报,34(1):76-86,2011.

[114] 张朝昆,崔勇,唐翯祎,等. 软件定义网络(SDN)研究进展[J]. 软件学报,2015,26(1):62-81.

[115] LI CH,WU Y,YUAN XY,et al. Detection and Defense of DDoS Attack-Based on Deep Learning in OpenFlow-Based SDN[J]. International Journal of Communication Systems,2018,31(5):3497.

[116] MORZHOV S,ALEKSEEV I,NIKITINSKIY M. Firewall Application for Floodlight SDN Controller[C]. International Siberian Conference on Control & Communications(SIBCON),2016.

[117] WANG L,RUAN H W,LI H,et al. Combining Neutron and OpenDaylight for Management of Networking[C]. IEEE 41st Annual Computer Software and Applications Conference(COMPSAC),2017.

[118] LAM J H,LEE S G,LEE H J,et al. Design,Implementation and Performance Evaluation of Identity-Based Cryptography in ONOS[J]. International Journal of Network Management,2017,28(1):1990.

[119] MEERA A,SWAMYNATHAN S. Agent Based Resource Monitoring System in IaaS Cloud Environment[J]. Procedia Technology,2013,10(2):200-207.

[120] 李林哲,周佩雷,程鹏等. 边缘计算的架构、挑战与应用[J]. 大数据,2019,5(02):6-19.

[121] WEIN J M,KLONINGER J J,NOTTINGHAM M C,et al. Content Delivery Network(CDN)Content Server Request Handling Mechanism with Metadata Framework Support:20130297735[P]. 2013.

[122] 施巍松,张星洲,王一帆,等. 边缘计算:现状与展望[J]. 计算机研究与发展,2019(1):1-21.

[123] SHI W S,CAO J,ZHANG Q,et al. Edge Computing:Vision and Challenges[J]. IEEE Internet of Things Journal,2016,3(5):637-646.

[124] PORTILLA J,MUJICA G,LEE J,et al. The Extreme Edge at the Bottom of the Internet of Things:a Review[J]. IEEE Sensors Journal,2019(1):1-20.

[125] YU W,LIANG F,HE X,et al. A Survey on the Edge Computing for the Internet of Things[J]. IEEE Access,2018(6):6900-6919.

[126] SHI W S,CAO J,ZHANG Q,et al. Edge Computing:Vision and Challenges[J]. IEEE Internet of Things Journal,2016,3(5):637-646.

[127] 施巍松,孙辉,曹杰,等. 边缘计算:万物互联时代新型计算模型[J]. 计算机研究与发展,2017,54(5):907-924.

[128] BONOMI F,MILITO R,ZHU J,et al. Fog Computing and its Role in the Internet of Things[C]. MCC Workshop on Mobile Cloud Computing,2012.

[129] BONOMI F,MILITO R,NATARAJAN P,et al. Fog Computing:a Platform for Internet of Things and Analytics[M]//NIK BESSIS,CIPRIAN DOBRE. Big data and Internet of Things:a Roadmap for Smart Environments. Heidelberg:Springer,2014:169-186.

[130] STOJMENOVIC I,WEN S. The Fog Computing Paradigm:Scenarios and Security Issues[C]. 2014 Federated Conference on Computer Science and Information Systems(FedCSIS),2014.

[131] REN J,GUO H,XU C,et al. Serving at the Edge:a Scalable IoT Architecture Based on Transparent Computing[J]. IEEE Network,2017,31(5):96-105.

[132] TALEB T,SAMDANIS K,MADA B,et al. On Multi-Access Edge Computing:a Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration[J]. IEEE Communications Surveys and Tutorials,2017,19(3):1657-1681.

[133] GARCIA LOPEZ P,MONTRESOR A,EPEMA D,et al. Edge-Centric Computing:Vision and Challenges[J]. ACM SIGCOMM Computer Communication Review,2015,45(5):37-42.

[134] 安星硕,曹桂兴,苗莉,等. 智慧边缘计算安 全综述[J]. 电信科学,2018,34(7):135-147.

[135] 王纪萍. 雾计算中数据处理延迟与功耗最优化研究[D]. 曲阜:曲阜师范大学,2018.

[136] 程冬梅,李志. 基于雾计算的医院信息服务系统[J]. 计算机科学,2015,42(7):170-173.

[137] KHAKIMOV,MUTHANNA A A,MUTHANNA M. Study of Fog Computing Structure[C]. IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering,2018.

[138] HE S,CHENG,WANG B H,et al. Proactive Personalized Services Through Fog-Cloud Computing in Large-Scale IoT-Based Healthcare Application[J]. China communications,2017,14(11):1-16.

[139] SKIRELIS J D,NAVAKAUSKAS. Edge Computing in IoT:Preliminary Results on Modeling and Performance Analysis[C]. IEEE Workshop on Advances in Information,Electronic and Electrical Engineering,2017.

[140] 铙着译. 移动边缘计算及视频分析应用研究[D]. 北京:北京邮电大学,2017.

[141] GUDIPATI A,PERRY D,LI L E,et al. SoftRAN:Software Defined radio Access Network [C]. ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING. ACM,2013.

[142] SATYANARAYANAN M,BAHL P,DAVIES N. The Case for VM-Based Cloudlets in Mobile Computing[J]. IEEE Pervasive Computing,2009,8(4):14-23.

[143] DINH H T,LEE C,NIYATO D,et al. A Survey of Mobile Cloud Computing:Architecture,Applications,and Approaches [J]. Wireless Communications & Mobile Computing,2013,13(18):1587-1611.

[144] ZHANG Y,NIYATO D 5,WANG P,et al. Dynamic Offloading Algorithm. in Intermittently Connected Mobile Cloudlet Systems [C]. IEEE International Conference onCommunications. IEEE,2014.

[145] IBM Corporation,Smarter Wireless Networks:Add Intelligence to the Mobilenetwork Edge,2013.

[146] 益言. 区块链的发展现状、银行面临的挑战及对策分析[J]. 金融会计,2016,4:46-50.

[147] 顾燕. 基于区块链的身份认证系统的设计与实现[D]. 北京:北京邮电大学,2018.

[148] 周平,杜宇,李斌,等. 中国区块链技术和应用发展白皮书[R]. 中国区块链技术和产业发展论坛,2016.

[149] 张波. 国外区块链技术的运用情况及相关启示 [J]. 金融科技时代,2016,5:35-38.

[150] Technical Report by the UK Government Chief Scientific Adviser [EB/OL]. [2019-07-22] https://www.gov.uk/government/uploads/system/uploads/attachment__data/file/492972/gs-16-1-distributed-ledger-technology.

[151] 袁勇,王飞跃. 区块链技术发展现状与展望 [J]. 自动化学报,2016,4:478-494.

[152] 任安军. 运用区块链改造我国票据市场的思考 [J]. 南方金融,2016,3:39-42.

[153] NAKAMOTO S. Bitcoin:A Peer-to-peer Electronic Cash System [EB/OL]. [2019-07-22] https://bitcoin. org/bitcoin.

[154] 刘广沛. 基于区块链的云数据完整性保护机制[D]. 南京:南京邮电大学,2018.