{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:08:50Z","timestamp":1746245330363,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319063195"},{"type":"electronic","value":"9783319063201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06320-1_27","type":"book-chapter","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T00:59:27Z","timestamp":1398646767000},"page":"359-372","source":"Crossref","is-referenced-by-count":2,"title":["Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures"],"prefix":"10.1007","author":[{"given":"Yong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jianbing","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Lanxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"27_CR1","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R. Buyyaa","year":"2009","unstructured":"Buyyaa, R., Yeoa, C., Broberga, J., Brandicc, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems\u00a025(6), 599\u2013616 (2009)","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D. Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation Computer Systems\u00a028(3), 583\u2013592 (2012)","journal-title":"Future Generation Computer Systems"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: Proceeding of ACM CCS 2007, Alexandria, Virginia, USA, pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"1","key":"27_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G. Ateniese","year":"2011","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Security\u00a014(1), 12 (2011)","journal-title":"ACM Trans. Inf. Syst. Security"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: Proceeding of ACM CCS 2007, Alexandria, Virginia, USA, pp. 584\u2013597. ACM (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"issue":"3","key":"27_CR7","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H. Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. Journal of Cryptology\u00a026(3), 442\u2013483 (2013)","journal-title":"Journal of Cryptology"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-10366-7_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"G. Ateniese","year":"2009","unstructured":"Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 319\u2013333. Springer, Heidelberg (2009)"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q. Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"issue":"5","key":"27_CR10","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q. Wang","year":"2012","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst.\u00a022(5), 847\u2013859 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"27_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MNET.2010.5510914","volume":"24","author":"C. Wang","year":"2010","unstructured":"Wang, C., Ren, K., Lou, W., Li, J.: Toward public auditable secure cloud data storage services. IEEE Network\u00a024(4), 19\u201324 (2010)","journal-title":"IEEE Network"},{"issue":"5","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1016\/j.jss.2011.12.024","volume":"85","author":"Y. Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G.J., Stephen, S.: Yau: efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software\u00a085(5), 1083\u20131095 (2012)","journal-title":"Journal of Systems and Software"},{"issue":"12","key":"27_CR13","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y. Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst.\u00a023(12), 2231\u20132244 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"27_CR14","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K. Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst.\u00a024(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"27_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1142\/S0218843012410018","volume":"21","author":"Y. Zhu","year":"2012","unstructured":"Zhu, Y., Wang, S.B., Hu, H., Ahn, G.J., Ma, D.: Secure collaborative integrity verification for hybrid cloud environments. Int. J. Cooperative Inf. Syst.\u00a021(3), 165\u2013198 (2012)","journal-title":"Int. J. Cooperative Inf. Syst."},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C. Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Computers\u00a062(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Computers"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R.: Robust remote data checking. In: Proceeding of Storage SS 2008, Fairfax, Virginia, USA, pp. 63\u201368. ACM (2008)","DOI":"10.1145\/1456469.1456481"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceeding of CCSW 2009, Chicago, Illinois, USA, pp. 43\u201354. ACM (2009)","DOI":"10.1145\/1655008.1655015"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-00457-5_8","volume-title":"Theory of Cryptography","author":"Y. Dodis","year":"2009","unstructured":"Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 109\u2013127. Springer, Heidelberg (2009)"},{"issue":"7","key":"27_CR20","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1016\/j.future.2012.01.004","volume":"29","author":"L. Chen","year":"2013","unstructured":"Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Generation Computer Systems\u00a029(7), 1709\u20131715 (2013)","journal-title":"Future Generation Computer Systems"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceeding of ICDCS 2006, Lisbon, Portugal, p. 12. IEEE Computer Society (2006)","DOI":"10.1109\/ICDCS.2006.80"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Ni, J., Yu, Y., Mu, Y., Xia, Q.: On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Transactions on Parallel and Distributed Systems (2013), doi:10.1109\/TPDS.2013.199","DOI":"10.1109\/TPDS.2013.199"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceeding of ACM CC 2009, Hyatt Regency Chicago, Chicago, IL, USA, pp. 213\u2013222. ACM (2009)","DOI":"10.1145\/1653662.1653688"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceeding of SecureComm 2008, Stanbul, Turkey, pp. 1\u201310. IEEE Computer Society (2008)","DOI":"10.1145\/1460877.1460889"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06320-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T15:35:20Z","timestamp":1746200120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06320-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319063195","9783319063201"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06320-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}