{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:13Z","timestamp":1742913553508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_1","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments"],"prefix":"10.1007","author":[{"given":"Feng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yingwen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. Internet Comput. 16(1), 69\u201373 (2012)","journal-title":"Internet Comput."},{"issue":"4","key":"1_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"1_CR3","first-page":"2904","volume":"2013","author":"B Wang","year":"2013","unstructured":"Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. Infocom 2013, 2904\u20132912 (2013)","journal-title":"Infocom"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Hohenberger, S.: Proxy re-signature: new definitions, algorithm and applications. In: Proceedings of ACM CCS, pp. 310\u2013319 (2005)","DOI":"10.1145\/1102120.1102161"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proceedings of the 6th Working Conference on Integrity and Internal Control in Information Systems, pp. 1\u201311, Lausanne, Switzerland (2003)","DOI":"10.1007\/1-4020-7901-X_1"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Erway, C., Kupcu. A, Papamanthou, C. et al.: Dynamic provable data possession. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 213\u2013222, Chicago, USA (2009)","DOI":"10.1145\/1653662.1653688"},{"issue":"8","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Sebe","year":"2008","unstructured":"Sebe, F., Domingo, J., Martinez, A., Deswarte, Y., Quisquater, J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","volume":"23","author":"Z Hao","year":"2011","unstructured":"Hao, Z., Zhong, Z., Yu, N.: A privacypreserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432\u20131437 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR10","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of ACM\/IEEE IWQoS 2009, pp. 1\u20139 (2009)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of InfoCom 2010. IEEE, March 2010","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"1_CR13","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Li, J., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parall. Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parall. Distrib. Syst."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/978-3-642-31284-7_30","volume-title":"Applied Cryptography and Network Security","author":"B Wang","year":"2012","unstructured":"Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 507\u2013525. Springer, Heidelberg (2012)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storage in clouds. In: Proceedings of ACM SAC 2011, pp. 1550\u20131557 (2011)","DOI":"10.1145\/1982185.1982514"},{"issue":"7","key":"1_CR16","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1016\/j.future.2012.01.004","volume":"29","author":"L Chen","year":"2013","unstructured":"Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29(7), 1709\u20131715 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T04:20:00Z","timestamp":1675138800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}