{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:48:08Z","timestamp":1757540888469,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590154"},{"type":"electronic","value":"9783030590161"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_51","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"615-626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Changsong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaoling","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Sufang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"issue":"9","key":"51_CR1","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/LCOMM.2019.2926967","volume":"23","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Sun, W., Liu, J., Kato, N.: Physical layer security in large-scale probabilistic caching: analysis and optimization. IEEE Commun. Lett. 23(9), 1484\u20131487 (2019)","journal-title":"IEEE Commun. Lett."},{"issue":"12","key":"51_CR2","doi-asserted-by":"publisher","first-page":"3513","DOI":"10.1109\/TMC.2017.2693370","volume":"16","author":"Y Cui","year":"2017","unstructured":"Cui, Y., Lai, Z., Wang, X., Dai, N., Miao, C.: QuickSync: improving synchronization efficiency for mobile cloud storage services. IEEE Trans. Mob. Comput. 16(12), 3513\u20133526 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"51_CR3","unstructured":"C. V. Networking, Cisco global cloud index: forecast and methodology, 2016\u20132021, White paper. Cisco Public, San Jose"},{"issue":"9","key":"51_CR4","doi-asserted-by":"publisher","first-page":"2320","DOI":"10.1109\/TIFS.2018.2818651","volume":"13","author":"M Du","year":"2018","unstructured":"Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. Inf. Forensics Secur. 13(9), 2320\u20132332 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"51_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.02.005","volume":"84","author":"N Garg","year":"2017","unstructured":"Garg, N., Bawa, S.: RITS-MHT: relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. J. Netw. Comput. Appl. 84, 1\u201313 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"51_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136\u2013149. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14992-4_13"},{"issue":"1","key":"51_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","volume":"16","author":"Y Li","year":"2019","unstructured":"Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo, K.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secur. Comput. 16(1), 72\u201383 (2019)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"4","key":"51_CR8","first-page":"1","volume":"15","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Xiao, S., Wang, H., Wang, X.: New provable data transfer from provable data possession and deletion for secure cloud storage. Int. J. Distrib. Sens. Netw. 15(4), 1\u201312 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"51_CR9","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-98557-2_40","volume-title":"Advances in Intelligent Networking and Collaborative Systems","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Wang, X.A., Cao, Y., Tang, D., Yang, X.: Improved provable data transfer from provable data possession and deletion in cloud storage. In: Xhafa, F., Barolli, L., Gregu\u0161, M. (eds.) INCoS 2018. LNDECT, vol. 23, pp. 445\u2013452. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-98557-2_40"},{"key":"51_CR10","unstructured":"Mohtasebi, S., Dehghantanha, A., Choo, K.: Cloud storage forensics : analysis of data remnants on SpiderOak, JustCloud, and pCloud. arXiv: Cryptography and Security"},{"key":"51_CR11","doi-asserted-by":"publisher","unstructured":"Morales-Sandoval, M., Gonzalez-Compean, J.L., Diaz-Perez, A., Sosa-Sosa, V.J.: A pairing-based cryptographic approach for data security in the cloud. Int. J. Inf. Secur. 17(4), 441\u2013461 (2017). https:\/\/doi.org\/10.1007\/s10207-017-0375-z","DOI":"10.1007\/s10207-017-0375-z"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Ni, J., Lin, X., Zhang, K., Yu, Y., Shen, X.: Secure outsourced data transfer with integrity verification in cloud storage. In: Proceedings of the 2016 IEEE\/CIC International Conference on Communications in China, ICCC 2016, pp. 1\u20136. IEEE Computer Society, Washington, DC (2016)","DOI":"10.1109\/ICCChina.2016.7636866"},{"key":"51_CR13","unstructured":"Nakamoto, S., et al.: Bitcoin: A Peer-to-Peer Electronic Cash System"},{"issue":"2","key":"51_CR14","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSC.2011.24","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220\u2013232 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"51_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1504\/IJWGS.2018.088396","volume":"14","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Tao, X., Ni, J., Yu, Y.: Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1), 106\u2013121 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Wang. H., He. D., Fu. A, Li. Q., Wang. Q: Provable data possession with outsourced data transfer. IEEE Trans. Serv. Comput. 1\u201312 (2019)","DOI":"10.1109\/TSC.2019.2892095"},{"key":"51_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.csi.2016.08.006","volume":"54","author":"L Xue","year":"2017","unstructured":"Xue, L., Ni, J., Li, Y., Shen, J.: Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54, 46\u201354 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"51_CR18","first-page":"10","volume":"39","author":"Y Yan","year":"2018","unstructured":"Yan, Y., Wu, L., Gao, G., Wang, H., Xu, W.: A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. J. Inf. Secur. Appl. 39, 10\u201318 (2018)","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"51_CR19","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TPDS.2017.2754366","volume":"29","author":"L Yu","year":"2018","unstructured":"Yu, L., Shen, H., Cai, Z., Liu, L., Calton, P.: Towards bandwidth guarantee for virtual clusters under demand uncertainty in multi-tenant clouds. IEEE Trans. Parallel Distrib. Syst. 29(2), 450\u2013465 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"51_CR20","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.jnca.2017.11.011","volume":"103","author":"C Yang","year":"2018","unstructured":"Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185\u2013193 (2018)","journal-title":"J. Netw. Comput. Appl.."},{"issue":"2","key":"51_CR21","first-page":"446","volume":"28","author":"L Yu","year":"2017","unstructured":"Yu, L., Shen, H., Karan, S., Ye, L., Cai, Z.: CoRE: cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. IEEE Trans. Parallel Distrib. Syst. 28(2), 446\u2013461 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"51_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-030-01950-1_26","volume-title":"Information and Communications Security","author":"C Yang","year":"2018","unstructured":"Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z., Meddahi, A. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 445\u2013458. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01950-1_26"},{"issue":"2","key":"51_CR23","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1049\/cje.2020.02.015","volume":"29","author":"C Yang","year":"2020","unstructured":"Yang, C., Tao, X., Zhao, F., Wang, Y.: Secure data transfer and deletion from counting Bloom filter in cloud computing. Chin. J. Electron. 29(2), 273\u2013280 (2020)","journal-title":"Chin. J. Electron."},{"key":"51_CR24","first-page":"1","volume":"15","author":"C Yang","year":"2019","unstructured":"Yang, C., Tao, X., Zhao, F.: Publicly verifiable data transfer and deletion scheme for cloud storage. Int. J. Distrib. Sens. Netw. 15, 1\u201312 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"51_CR25","doi-asserted-by":"crossref","unstructured":"Yu, Y., Ni, J., Wu, W., Wang, Y.: Provable data possession supporting secure data transfer for cloud storage. In: Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, pp. 38\u201342. IEEE Computer Society, Washington (2015)","DOI":"10.1109\/BWCCA.2015.44"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T23:03:38Z","timestamp":1619305418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}