{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:06:42Z","timestamp":1742918802741,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031554704"},{"type":"electronic","value":"9783031554711"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-55471-1_5","type":"book-chapter","created":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:02:22Z","timestamp":1710565342000},"page":"55-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Cloud Data Integrity Verification Scheme with User Legitimacy Check"],"prefix":"10.1007","author":[{"given":"Dong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Chao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Meilan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Qiuming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"He","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Siwen","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,17]]},"reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/TCC.2019.2892449","volume":"9","author":"H Liang","year":"2019","unstructured":"Liang, H., Li, M., Chen, Y., et al.: Architectural protection of trusted system services for SGX enclaves in cloud computing. IEEE Trans. Cloud Comput. 9(3), 910\u2013922 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5_CR2","unstructured":"Zhang Guipeng. Research on cloud data security storage technology based on blockchain [D]. Guangdong:Guangdong University of Technology (2022("},{"issue":"2","key":"5_CR3","first-page":"289","volume":"13","author":"Y Xu","year":"2020","unstructured":"Xu, Y., Ren, J., Zhang, Y., Zhang, C., Shen, B., Zhang, Y.: Blockchain empowered arbitrable data auditing scheme for network storage as a service. IEEE Trans. Serv. Comput. 13(2), 289\u2013300 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"8","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"X Yinhao","year":"2019","unstructured":"Yinhao, X., Yizhen, J., Chunchi, L.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608\u20131631 (2019)","journal-title":"Proc. IEEE"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2020.06.007","volume":"146","author":"Y Dongdong","year":"2020","unstructured":"Dongdong, Y., Ruixuan, L., Yan, Z.: Blockchain-based verification framework for data integrity in edge-cloud storage. J. Parallel Distrib. Comput. 146, 1\u201314 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"key":"5_CR6","unstructured":"Zhang, Y.: Identity-based integrity detection scheme for cloud storage. Computer Engineering. 44(3) (2018)"},{"key":"5_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101686","volume":"92","author":"L Xiuqing","year":"2020","unstructured":"Xiuqing, L., Zhenkuan, P., Hequn, X.: An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices. Comput. Secur. 92, 101686 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR8","unstructured":"Deswarte, Y., Quisquater, J., Saidane, A.: Remote integrity checking. In: The Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) (2007)"},{"key":"5_CR9","unstructured":"Wutong, M., Zhang, D.: Hyperledger Fabric consensus mechanism optimization scheme. J. Autom. 47(8), 1885\u20131898 (2007)"},{"issue":"3","key":"5_CR10","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"S Hovav","year":"2013","unstructured":"Hovav, S., Brent, W.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds) Computer Security \u2013 ESORICS 2009. ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009).https:\/\/doi.org\/10.1007\/978-3-642-04444-1_22","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H.: An overview of blockchain technology: architecture, consensus, and future Trends, pp. 557\u2013564 (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"6","key":"5_CR13","doi-asserted-by":"publisher","first-page":"102382","DOI":"10.1016\/j.ipm.2020.102382","volume":"57","author":"J Li","year":"2020","unstructured":"Li, J., Wu, J., Jiang, G.: Blockchain-based public auditing for big data in cloud storage. Inf. Process. Manage. 57(6), 102382 (2020)","journal-title":"Inf. Process. Manage."},{"key":"5_CR14","unstructured":"Wang, Y.: Research on data integrity auditing in cloud storage[D]. Chongqing University (2021)"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Vuji\u010di\u0107, D,, Jagodi\u0107, D., Ran\u0111i\u0107, S.: Blockchain technology,bitcoin,and ethereum:a brief overview. In: Proceedings of the 2018 17th International Symposium on Infoteh-Jahorina, pp. 1\u20136 (2018).https:\/\/doi.org\/10.1109\/INFOTEH.2018.8345547","DOI":"10.1109\/INFOTEH.2018.8345547"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao, Y., Zhang, N., Lou, W.J., et al.: A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutorials 22(2), 1432\u20131465 (2020)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"5_CR17","unstructured":"Zheng, M., Wang, H., Liu, H., et al.: Survey on consensus algorithms of blockchain. Netinfo Secur. 7, 8\u201324 (2019)"},{"key":"5_CR18","unstructured":"Hai-yang, D., Zi-chen, L., Wei, B.: (k, n)halftone visual cryptography based on Shamir\u2032s secret sharing. J. China Univ. Posts Telecommun. 25(2), 60\u201376 (2018)"},{"key":"5_CR19","unstructured":"Qi-feng, S., Zhao, Z., Yan-chao, Z., et al.: Survery of enterprise blockchains. J. Softw. 30(9), 2571\u20132592 (2019("},{"key":"5_CR20","unstructured":"Yong, Y., Xiao-chun, N., Shuai, Z., et al.: Block consensus algorithms: the state of the art and future trends. Acta Automatica Sinica, 44(11), 2011\u20132022 (2018)"},{"issue":"5","key":"5_CR21","first-page":"969","volume":"41","author":"QF Shao","year":"2018","unstructured":"Shao, Q.F., Jin, C.Q., Zhang, Z., et al.: Blockchain: architecture and research progress Chinese. J. Comput. 41(5), 969\u2013988 (2018)","journal-title":"J. Comput."},{"issue":"2\u20133","key":"5_CR22","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJICA.2020.107121","volume":"11","author":"Y Bo","year":"2020","unstructured":"Bo, Y.: A chameleon hash authentication tree optimisation audit for data storage security in cloud calculation. Int. J. Innovative Comput. Appl. 11(2\u20133), 141\u2013146 (2020)","journal-title":"Int. J. Innovative Comput. Appl."},{"issue":"2","key":"5_CR23","doi-asserted-by":"publisher","first-page":"e148","DOI":"10.1002\/spy2.148","volume":"4","author":"N Mehibel","year":"2021","unstructured":"Mehibel, N., Hamadouche, M.H.: Authenticated secret session key using elliptic curve digital signature algorithm. Secur. Priv. 4(2), e148 (2021)","journal-title":"Secur. Priv."},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.ins.2019.09.001","volume":"510","author":"M Khalili","year":"2020","unstructured":"Khalili, M., Dakhilalian, M., Susilo, W.: Efficient chameleon hash functions in the enhanced collision resistant model. Inf. Sci. 510, 155\u2013164 (2020)","journal-title":"Inf. Sci."},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) Computer Security \u2013 ESORICS 2009. ESORICS 2009. Lecture Notes in Computer Science, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009).https:\/\/doi.org\/10.1007\/978-3-642-04444-1_22","DOI":"10.1007\/978-3-642-04444-1_22"},{"issue":"4","key":"5_CR26","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TCSS.2016.2517205","volume":"2","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Xu, C.X., Yu, S., et al.: SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans. Comput. Soc. Syst. 2(4), 159\u2013170 (2015)","journal-title":"IEEE Trans. Comput. Soc. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-55471-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T05:03:24Z","timestamp":1710565404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-55471-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031554704","9783031554711"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-55471-1_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MONAMI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Networks and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yingtan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"monami2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mon-ami.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}