{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:52:46Z","timestamp":1743137566437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105086"},{"type":"electronic","value":"9783319105093"}],"license":[{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-10509-3_9","type":"book-chapter","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T23:45:02Z","timestamp":1411515902000},"page":"115-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Novel Data Integrity Verification Schemes in\u00a0Cloud Storage"],"prefix":"10.1007","author":[{"given":"Thanh Cuong","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Wenfeng","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhaokai","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhou","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Weimin","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,23]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.S.Jr: PORs : proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Sravan Kumar, R., Saxena, A.: Data integrity proofs in cloud storage. In: 2011 3rd International Conference on Communication Systems and Networks (COMSNETS), pp.1\u20134 (2011)","DOI":"10.1109\/COMSNETS.2011.5716422"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, T.C., Shen, W., et al.: A probabilistic integrity checking scheme for dynamic data in untrusted cloud storage. In: 12th IEEE\/ACIS International Conference on Computer and Information Science (ICIS 2013), Niigata, Japan, pp. 179\u2013183 (2013)","DOI":"10.1109\/ICIS.2013.6607837"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Pietro Di, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th iIternational Conference on Security and Privacy in Communication Networks - SecureComm 08, pp. 1\u201310 (2008)","DOI":"10.1145\/1460877.1460889"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Li, C., Chen, Y., Tan, P., Yang, G.: An efficient provable data possession scheme with data dynamics. International Conference on Computer Science & Service System (CSSS), pp. 706\u2013710 (2012)","DOI":"10.1109\/CSSS.2012.182"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-7901-X_1","volume":"140","author":"Y Deswarte","year":"2004","unstructured":"Deswarte, Y., Quisquater, J.: Remote integrity checking. IFIP Int. Fed. Inf. Process. 140, 1\u201311 (2004)","journal-title":"IFIP Int. Fed. Inf. Process."},{"issue":"8","key":"9_CR7","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Sebe","year":"2008","unstructured":"Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: ASIACRYPT \u201908 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 90\u2013107 (2008)","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security - CCS \u201907, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and Communications Security - CCS \u201909, pp. 213\u2013234 (2009)","DOI":"10.1145\/1653662.1653688"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Liu, F., Gu, D., Lu, H., Chris, C.: An improved dynamic provable data possession model. In: IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 290\u2013295 (2011)","DOI":"10.1109\/CCIS.2011.6045077"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, pp. 355\u2013370 (2009)","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Security and Privacy\u201980, pp. 122\u2013133 (1980)","DOI":"10.1109\/SP.1980.10006"},{"issue":"5","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1016\/j.jss.2011.12.024","volume":"85","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G., Yau, S.S.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083\u20131095 (2012)","journal-title":"J. Syst. Softw."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Dan, B.: The decision Diffie-Hellman problem. In: Proceedings of the 3rd Algorithmic Number Theory Symposium. Lecture Notes in Computer Science 1423, pp. 48\u201363 (1998)","DOI":"10.1007\/BFb0054851"},{"key":"9_CR16","unstructured":"Shoup, V.: NTL: a library for doing number theory. http:\/\/www.shoup.net\/ntl\/. Accessed 29 Dec 2013"}],"container-title":["Studies in Computational Intelligence","Computer and Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10509-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T02:38:43Z","timestamp":1675996723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10509-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,23]]},"ISBN":["9783319105086","9783319105093"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10509-3_9","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,23]]},"assertion":[{"value":"23 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}