{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:38:37Z","timestamp":1725824317320},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319199610"},{"type":"electronic","value":"9783319199627"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19962-7_23","type":"book-chapter","created":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T04:28:10Z","timestamp":1435120090000},"page":"395-412","source":"Crossref","is-referenced-by-count":13,"title":["Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy"],"prefix":"10.1007","author":[{"given":"Cl\u00e9mentine","family":"Gritti","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Plantard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,25]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Proc. of CCS 2007 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proc. of CCS 2007 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.E.: Scalable and efficient provable data possession. In: Proc. of SecureComm 2008 (2008)","DOI":"10.1145\/1460877.1460889"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM 2010 (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"9","key":"23_CR6","first-page":"1432","volume":"23","author":"Z Hao","year":"2011","unstructured":"Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE TKDE 23(9), 1432\u20131437 (2011)","journal-title":"IEEE TKDE"},{"issue":"1","key":"23_CR7","first-page":"43","volume":"2","author":"B Wang","year":"2012","unstructured":"Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE TCC 2(1), 43\u201356 (2012)","journal-title":"IEEE TCC"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-642-31284-7_30","volume-title":"Applied Cryptography and Network Security","author":"B Wang","year":"2012","unstructured":"Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 507\u2013525. Springer, Heidelberg (2012)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Erway, C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proc. of CCS 2009 (2009)","DOI":"10.1145\/1653662.1653688"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proc. of SAC 2011 (2011)","DOI":"10.1145\/1982185.1982514"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Yu, Y., Au, M.H., Mu, Y., Tang, S., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. IJIS, 1\u201312 (2014)","DOI":"10.1007\/s10207-014-0263-8"},{"issue":"2","key":"23_CR13","first-page":"227","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Ahn, G.-J., Hu, H., Yau, S.S., An, H.G., Hu, C.-J.: Dynamic audit services for outsourced storages in clouds. IEEE TSC 6(2), 227\u2013238 (2013)","journal-title":"IEEE TSC"},{"key":"23_CR14","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proc. of IWQoS 2009 (2009)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Le, A., Markopoulou, A.: Nc-audit: Auditing for network coding storage. CoRR, abs\/1203.1730 (2012)","DOI":"10.1109\/NETCOD.2012.6261901"},{"issue":"2","key":"23_CR16","first-page":"220","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE TSC 5(2), 220\u2013232 (2012)","journal-title":"IEEE TSC"},{"issue":"1","key":"23_CR17","first-page":"127","volume":"30","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Niu, L., Yang, G., Mu, Y., Susilo, W.: On the security of auditing mechanisms for secure cloud storage. GCS 30(1), 127\u2013132 (2014)","journal-title":"GCS"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19962-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,14]],"date-time":"2022-05-14T22:15:10Z","timestamp":1652566510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19962-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319199610","9783319199627"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19962-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}