{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T23:40:02Z","timestamp":1748994002798,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319421070"},{"type":"electronic","value":"9783319421087"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42108-7_4","type":"book-chapter","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T07:25:04Z","timestamp":1467357904000},"page":"45-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Pinheiro","sequence":"first","affiliation":[]},{"given":"Edna Dias","family":"Canedo","sequence":"additional","affiliation":[]},{"suffix":"Jr.","given":"Rafael Tim\u00f3teo","family":"de Sousa","sequence":"additional","affiliation":[]},{"given":"Robson","family":"de Oliveira Albuquerque","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"issue":"8","key":"4_CR1","first-page":"449","volume":"2","author":"ST Tandel","year":"2014","unstructured":"Tandel, S.T., Shah, V.K., Hiranwal, S.: An implementation of effective XML based dynamic data integrity audit service in cloud. Int. J. Soc. Appl. Comput. Sci. 2(8), 449\u2013553 (2014)","journal-title":"Int. J. Soc. Appl. Comput. Sci."},{"issue":"6","key":"4_CR2","doi-asserted-by":"publisher","first-page":"329","DOI":"10.7753\/IJCATR0306.1002","volume":"3","author":"P Dabas","year":"2014","unstructured":"Dabas, P., Wadhwa, D.: A recapitulation of data auditing approaches for cloud data. Int. J. Comput. Appl. Technol. Res. (IJCATR) 3(6), 329\u2013332 (2014)","journal-title":"Int. J. Comput. Appl. Technol. Res. (IJCATR)"},{"key":"4_CR3","volume-title":"Cloud Computing Web-Based Applications that Change the Way You Work and Collaborate online","author":"M Miller","year":"2008","unstructured":"Miller, M.: Cloud Computing Web-Based Applications that Change the Way You Work and Collaborate online. Que Publishing, Pearson Education, Canada (2008)"},{"key":"4_CR4","volume-title":"Cloud Computing, A Practical Approach","author":"T Velte","year":"2009","unstructured":"Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, Inc., New York (2009)"},{"doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Zeng, D., Qian, W.: Services in the cloud computing era: a survey. In: 4th International Universal Communication, Symposium (IUCS), pp. 40\u201346. IEEE Shanghai, China (2010)","key":"4_CR5","DOI":"10.1109\/IUCS.2010.5666772"},{"doi-asserted-by":"crossref","unstructured":"Jing, X., Jian-jun, Z.: A brief survey on the security model of cloud computing. In: Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), pp. 475\u2013478. IEEE Hong Kong (2010)","key":"4_CR6","DOI":"10.1109\/DCABES.2010.103"},{"unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. Technical report, National Institute of Standards and Technology (2009)","key":"4_CR7"},{"key":"4_CR8","volume-title":"Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements","author":"M Bellare","year":"2000","unstructured":"Bellare, M.: Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Springer, Heidelberg (2000)"},{"unstructured":"Marsh, S.P.: Formalizing trust as a computational concept. Department of Computing Science and Mathematics, University of Stirling, Doctorate Thesis (1994)","key":"4_CR9"},{"unstructured":"Gambetta, D.: Can we trust trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, Chap. 13, Electronic edn., pp. 213\u2013237. Department of Sociology, University of Oxford (2008)","key":"4_CR10"},{"unstructured":"J\u03c6sang, A., Knapskog, S.J.: A metric for trusted systems. In: Global IT Security, pp. 541\u2013549 (1998)","key":"4_CR11"},{"unstructured":"Bose, R.: Information Theory, Coding and Cryptography, 2nd Edn., pp. 297\u2013298. Tata McGraw-Hill, New Delhi (2008)","key":"4_CR12"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communication Security (CCS), Alexandria, VA, pp. 584\u201359 (2007)","key":"4_CR13","DOI":"10.1145\/1315245.1315317"},{"unstructured":"Kumar, R.S., Saxena, A.: Data integrity proofs in cloud storage. In: Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore (2011)","key":"4_CR14"},{"doi-asserted-by":"crossref","unstructured":"George, R.S., Sabitha, S.: Data anonymization and integrity checking in cloud computing. In: Fourth International Conference on Computing (ICCCNT), Communications and Networking Technologies, Tiruchengode (2013)","key":"4_CR15","DOI":"10.1109\/ICCCNT.2013.6726813"},{"doi-asserted-by":"crossref","unstructured":"Kavuri, S.K.S.V.A., Kancherla, G.R., Bobba, B.R.: Data authentication and integrity verification techniques for trusted\/untrusted cloud servers. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, pp. 2590\u20132596 (2014)","key":"4_CR16","DOI":"10.1109\/ICACCI.2014.6968657"},{"doi-asserted-by":"crossref","unstructured":"Al-Jaberi, M.F., Zainal, A.: Data integrity and privacy model in cloud computing. In: International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, pp. 280\u2013284 (2014)","key":"4_CR17","DOI":"10.1109\/ISBAST.2014.7013135"},{"doi-asserted-by":"crossref","unstructured":"Kay, H., et al.: An efficient public batch auditing protocol for data security in multi-cloud storage. In: 8th ChinaGrid Annual Conference (ChinaGrid), Changchun, pp. 51\u201356 (2013)","key":"4_CR18","DOI":"10.1109\/ChinaGrid.2013.13"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Jord\u00e3o, R., Martins, V.A., Buiati, F., Sousa Jr., R.T., Deus, F.E.: Secure data storage in distributed cloud environments. In: IEEE International Conference on Big Data (IEEE BigData), Washington DC, USA, pp. 6\u201312 (2014)","key":"4_CR20","DOI":"10.1109\/BigData.2014.7004383"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42108-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T23:26:58Z","timestamp":1748993218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42108-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319421070","9783319421087"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42108-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"12 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}