{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:09:41Z","timestamp":1742944181814,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030622220"},{"type":"electronic","value":"9783030622237"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_51","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"578-592","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1958-3117","authenticated-orcid":false,"given":"Haining","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4912-3197","authenticated-orcid":false,"given":"Ye","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2380-0396","authenticated-orcid":false,"given":"Jing","family":"Qin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6870-048X","authenticated-orcid":false,"given":"Jinhua","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7669-8922","authenticated-orcid":false,"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","key":"51_CR1","DOI":"10.1145\/1315245.1315318"},{"issue":"5","key":"51_CR2","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Secure Comput. 12(5), 546\u2013556 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"10","key":"51_CR3","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","volume":"65","author":"X Chen","year":"2015","unstructured":"Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65(10), 3184\u20133195 (2015)","journal-title":"IEEE Trans. Comput."},{"doi-asserted-by":"crossref","unstructured":"Dewan, H., Hansdah, R.: A survey of cloud storage facilities. In: 2011 IEEE World Congress on Services, pp. 224\u2013231. IEEE (2011)","key":"51_CR4","DOI":"10.1109\/SERVICES.2011.43"},{"issue":"1","key":"51_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2017.16","volume":"15","author":"M Kolhar","year":"2017","unstructured":"Kolhar, M., Abu-Alhaj, M.M., Abd El-atty, S.M.: Cloud data auditing techniques with a focus on privacy and security. IEEE Secur. Privacy 15(1), 42\u201351 (2017)","journal-title":"IEEE Secur. Privacy"},{"issue":"11","key":"51_CR6","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/TIFS.2016.2587242","volume":"11","author":"J Li","year":"2016","unstructured":"Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11), 2572\u20132583 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"51_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","volume":"16","author":"Y Li","year":"2017","unstructured":"Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo, K.K.R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 16(1), 72\u201383 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"51_CR8","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2016.09.003","volume":"78","author":"Y Li","year":"2018","unstructured":"Li, Y., Yu, Y., Yang, B., Min, G., Wu, H.: Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78, 789\u2013798 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"51_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ins.2018.09.067","volume":"475","author":"M Miao","year":"2019","unstructured":"Miao, M., Wang, J., Wen, S., Ma, J.: Publicly verifiable database scheme with efficient keyword search. Inf. Sci. 475, 18\u201328 (2019)","journal-title":"Inf. Sci."},{"doi-asserted-by":"publisher","unstructured":"Oqaily, M., et al.: SegGuard: segmentation-based anonymization of network data in clouds for privacy-preserving security auditing. IEEE Trans. Dependable Secure Comput. (2019). https:\/\/doi.org\/10.1109\/TDSC.2019.2957488","key":"51_CR10","DOI":"10.1109\/TDSC.2019.2957488"},{"issue":"8","key":"51_CR11","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Seb\u00e9","year":"2008","unstructured":"Seb\u00e9, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"51_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89255-7_7"},{"issue":"10","key":"51_CR13","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","volume":"12","author":"J Shen","year":"2017","unstructured":"Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402\u20132415 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"51_CR14","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen, W., Qin, J., Yu, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331\u2013346 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"51_CR15","doi-asserted-by":"publisher","first-page":"44359","DOI":"10.1109\/ACCESS.2020.2977721","volume":"8","author":"W Shen","year":"2020","unstructured":"Shen, W., Su, Y., Hao, R.: Lightweight cloud storage auditing with deduplication supporting strong privacy protection. IEEE Access 8, 44359\u201344372 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"51_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2764465","volume":"47","author":"M Sookhak","year":"2015","unstructured":"Sookhak, M., et al.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. (CSUR) 47(4), 1\u201334 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"5","key":"51_CR17","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","volume":"10","author":"H Tian","year":"2015","unstructured":"Tian, H., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701\u2013714 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"51_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2018.12.004","volume":"127","author":"H Tian","year":"2019","unstructured":"Tian, H., Nan, F., Chang, C.C., Huang, Y., Lu, J., Du, Y.: Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J. Netw. Comput. Appl. 127, 59\u201369 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"51_CR19","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.ins.2018.09.009","volume":"472","author":"H Tian","year":"2019","unstructured":"Tian, H., Nan, F., Jiang, H., Chang, C.C., Ning, J., Huang, Y.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107\u2013125 (2019)","journal-title":"Inf. Sci."},{"issue":"1","key":"51_CR20","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2013","unstructured":"Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92\u2013106 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE Infocom, pp. 1\u20139. IEEE (2010)","key":"51_CR21","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"5","key":"51_CR22","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TSC.2016.2633260","volume":"12","author":"H Wang","year":"2019","unstructured":"Wang, H., He, D., Yu, J., Wang, Z.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput. 12(5), 824\u2013835 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"51_CR23","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"51_CR24","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1504\/IJWGS.2018.088396","volume":"14","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Tao, X., Ni, J., Yu, Y.: Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1), 106\u2013121 (2018)","journal-title":"Int. J. Web Grid Serv."},{"issue":"4","key":"51_CR25","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767\u2013778 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"51_CR26","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TIFS.2015.2501728","volume":"11","author":"Y Yu","year":"2015","unstructured":"Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658\u2013659 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Secure and constant cost public cloud storage auditing with deduplication. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 145\u2013153. IEEE (2013)","key":"51_CR27","DOI":"10.1109\/CNS.2013.6682702"},{"issue":"8","key":"51_CR28","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TIFS.2015.2423264","volume":"10","author":"J Yuan","year":"2015","unstructured":"Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717\u20131726 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"51_CR29","first-page":"1","volume":"343","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1\u201314 (2016)","journal-title":"Inf. Sci."},{"issue":"10","key":"51_CR30","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1007\/s00500-017-3000-1","volume":"23","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Wang, B., He, D., Wang, X.A.: Improved secure fuzzy auditing protocol for cloud data storage. Soft. Comput. 23(10), 3411\u20133422 (2019)","journal-title":"Soft. Comput."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:21:14Z","timestamp":1605003674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}