{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:11:53Z","timestamp":1748751113827,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319272924"},{"type":"electronic","value":"9783319272931"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27293-1_8","type":"book-chapter","created":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T07:24:37Z","timestamp":1448695477000},"page":"78-88","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Data Sharing Mechanism via Cloud-Based Dynamic Audit for Social Internet of Vehicles"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"Ruan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,29]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ACCESS.2015.2416657","volume":"3","author":"KM Alam","year":"2015","unstructured":"Alam, K.M., Saini, M., Saddik, A.E.: Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3, 343\u2013357 (2015)","journal-title":"IEEE Access"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abbani, N., Jomaa, M., Tarhini, T., Artail, H., El-Hajj, W.: Managing social networks in vehicular networks using trust rules. In: IEEE Symposium on Wireless Technology and Applications, pp. 168\u2013173. IEEE Press, Langkawi (2011)","DOI":"10.1109\/ISWTA.2011.6089402"},{"issue":"16","key":"8_CR3","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori, L., Iera, A., Morabito, G., Nitti, M.: The social internet of things (SIoT)-When social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56(16), 3594\u20133608 (2012)","journal-title":"Comput. Netw."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Smaldone, S., Han, L., Shankar, P., Iftode, L.: RoadSpeak: enabling voice chat on roadways using vehicular social networks. In: 1st Workshop on Social Network Systems, pp. 43\u201348. IEEE Press, New York (2008)","DOI":"10.1145\/1435497.1435505"},{"key":"8_CR5","unstructured":"Kranz, M., Roalter, L., Michahelles, F.: Things that twitter: social networks and the internet of things. In: 8th International Conference on Pervasive Computing, pp. 1\u201310. IEEE Press, Mannheim (2010)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 29th IEEE INFOCOM, pp. 525\u2013533. IEEE Press, San Diego (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T.: LT Codes-based secure and reliable cloud storage service. In: 31th IEEE INFOCOM, pp. 693\u2013701. IEEE Press, Orlando (2012)","DOI":"10.1109\/INFCOM.2012.6195814"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. In: ACM ASIACCS-SCC, pp. 19\u201326. ACM Press, Hangzhou (2013)","DOI":"10.1145\/2484402.2484408"},{"issue":"4","key":"8_CR9","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2012.35","volume":"6","author":"H Wang","year":"2013","unstructured":"Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551\u2013559 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Ahn, G.-J., Hu, H., Yau, S.S., An, H.G., Chen, S.: Dynamic audit services for outsourced storage in clouds. IEEE Trans. Serv. Comput. 6(2), 227\u2013238 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"H Li","year":"2014","unstructured":"Li, H., Wang, B., Li, B.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43\u201356 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Tate, S.R., Vishwanathan, R., Everhart, L.: Multi-user dynamic proofs of data possession using trusted hardware. In: 3rd ACM CODASPY, pp. 353\u2013364. ACM Press, San Antonio (2013)","DOI":"10.1145\/2435349.2435400"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s00145-010-9082-x","volume":"25","author":"A Boldyreva","year":"2012","unstructured":"Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57\u2013115 (2012)","journal-title":"J. Cryptology"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM CCS, pp. 598\u2013610, ACM Press, Alexandria (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"3","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/s11277-014-2087-2","volume":"80","author":"R Kumar","year":"2015","unstructured":"Kumar, R., Verma, H.K., Dhir, R.: Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers. Wirel. Pers. Commun. 80(3), 1281\u20131345 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"6","key":"8_CR16","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TPDS.2012.331","volume":"24","author":"X Liu","year":"2013","unstructured":"Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182\u20131191 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Lecture Notes in Computer Science","Internet of Vehicles - Safe and Intelligent Mobility"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27293-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:51:26Z","timestamp":1748706686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27293-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319272924","9783319272931"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27293-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}