{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T05:45:54Z","timestamp":1745646354386,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000110"},{"type":"electronic","value":"9783030000127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00012-7_31","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T14:15:30Z","timestamp":1536761730000},"page":"335-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Using Blockchain for Data Auditing in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Chunhua","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiaqi","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuanzhang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"31_CR1","unstructured":"G Wood Ethereum: a secure decentralised generalised transaction. http:\/\/www.ethereum.Org"},{"key":"31_CR2","volume-title":"Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing, ACM CCS","author":"C Dong","year":"2017","unstructured":"Dong, C., Wang, Y., Aldweesh, A., et al.: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing, ACM CCS. ACM, New York (2017)"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gen. Comput. Syst. (2017)","DOI":"10.1016\/j.future.2017.08.020"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 575\u2013584. IEEE Computer Society (2007)","DOI":"10.1109\/DSN.2007.103"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: The 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC (2009)","DOI":"10.1109\/DASC.2009.139"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"8","key":"31_CR7","first-page":"1","volume":"21","author":"H Tian","year":"2016","unstructured":"Tian, H., Chen, Z., Chang, C.C., et al.: Enabling public auditability for operation behaviors in cloud storage. Soft. Comput. 21(8), 1\u201313 (2016)","journal-title":"Soft. Comput."},{"key":"31_CR8","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic ash system. Technical report (2009). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Sengupta, B., Bag, S., Ruj, S., et al.: Retricoin: bitcoin based on compact proofs of retrievability. In: The 17th International Conference on Distributed Computing and Networking (2016)","DOI":"10.1145\/2833312.2833317"},{"key":"31_CR10","unstructured":"Ramachandran, A., Kantarcioglu, D.: Using Blockchain and smart contracts for secure data provenance management (2017)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103 (2017)","DOI":"10.1016\/j.jnca.2017.11.011"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Dagher, G.G., Mohler, J., Milojkovic, M., et al.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology, sustainable cities & society (2018)","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-319-49806-5_19","volume-title":"Information Systems Security","author":"S Ghoshal","year":"2016","unstructured":"Ghoshal, S., Paul, G.: Exploiting block-chain data structure for auditorless auditing on cloud data. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 359\u2013371. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49806-5_19"},{"key":"31_CR14","unstructured":"Fu, Y.: Meta-key: a secure data-sharing protocol under blockchain-based decentralised storage architecture (2017)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Security and Privacy (1980)","DOI":"10.1109\/SP.1980.10006"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00012-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T00:03:40Z","timestamp":1571875420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00012-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000110","9783030000127"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00012-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}