{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:12:54Z","timestamp":1725869574671},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_35","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"389-408","source":"Crossref","is-referenced-by-count":0,"title":["Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Jian","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jun","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"FuShan","family":"Wei","sequence":"additional","affiliation":[]},{"given":"JiGuo","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"6","key":"35_CR1","first-page":"50","volume":"53","author":"P Mell","year":"2011","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 50 (2011)","journal-title":"Commun. ACM"},{"issue":"15","key":"35_CR2","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"Z Xiao","year":"2013","unstructured":"Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(15), 843\u2013859 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"38","key":"35_CR3","doi-asserted-by":"crossref","first-page":"280","DOI":"10.3103\/S0147688211040083","volume":"38","author":"EB Dudin","year":"2011","unstructured":"Dudin, E.B., Smetanin, Y.G.: A review of cloud computing. Sci. Tech. Inf. Process. 38(38), 280\u2013284 (2011)","journal-title":"Sci. Tech. Inf. Process."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Zeng, W., Zhao, Y., Ou, K., Song, W.: Research on cloud storage architecture and key technologies. In: Proceedings of the International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24\u201326 November, pp. 1044\u20131048 (2009)","DOI":"10.1145\/1655925.1656114"},{"issue":"99","key":"35_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2016.25934446","volume":"PP","author":"Q Wang","year":"2016","unstructured":"Wang, Q., He, M., Du, M., Chow, S.S.M., Lai, R.W.F., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016). doi: 10.1109\/TDSC.2016.25934446","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"35_CR6","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599\u2013616 (2009)","journal-title":"Future Gener. Comput. Syst."},{"key":"35_CR7","volume-title":"Cloud Computing, A Practical Approach","author":"T Velte","year":"2009","unstructured":"Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, New York (2009)"},{"issue":"4","key":"35_CR8","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s11280-011-0138-0","volume":"15","author":"K Yang","year":"2011","unstructured":"Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web-Internet Web Inf. Syst. 15(4), 409\u2013428 (2011)","journal-title":"World Wide Web-Internet Web Inf. Syst."},{"issue":"5","key":"35_CR9","first-page":"813","volume":"15","author":"Z Xiao","year":"2014","unstructured":"Xiao, Z., Xiao, Y., Chen, H.: An accountable framework for sensing-oriented mobile cloud computing. J. Internet Technol. 15(5), 813\u2013822 (2014)","journal-title":"J. Internet Technol."},{"issue":"99","key":"35_CR10","first-page":"1","volume":"PP","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99), 1\u201312 (2016)","journal-title":"IEEE Syst. J."},{"issue":"1\/2","key":"35_CR11","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1504\/IJSNET.2015.069871","volume":"18","author":"Q Zhang","year":"2015","unstructured":"Zhang, Q., Chen, Z., Len, Y.: Distributed fuzzy c-means algorithms for big sensor data based on cloud computing. Int. J. Sens. Netw. 18(1\/2), 32\u201339 (2015)","journal-title":"Int. J. Sens. Netw."},{"issue":"2","key":"35_CR12","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317\u2013323 (2015)","journal-title":"J. Internet Technol."},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the IEEE International Conference on Computer Communication, pp. 2121\u20132129 (2014)","DOI":"10.1109\/INFOCOM.2014.6848154"},{"issue":"1","key":"35_CR14","first-page":"20","volume":"16","author":"J Rakesh","year":"2014","unstructured":"Rakesh, J., Krishna, J.V.: A novel approach for secure data sharing in multi-owner groups in cloud. Int. J. Comput. Trends Technol. 16(1), 20\u201323 (2014)","journal-title":"Int. J. Comput. Trends Technol."},{"issue":"1","key":"35_CR15","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"35","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S.: Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1), 71\u201377 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"35_CR16","first-page":"835","volume":"3","author":"H Baskar","year":"2015","unstructured":"Baskar, H.: Fully secure and efficient data sharing with attribute revocation for multi-owner cloud storage. Int. J. Adv. Res. Educ. Technol. 3(2), 835\u2013838 (2015)","journal-title":"Int. J. Adv. Res. Educ. Technol."},{"issue":"11","key":"35_CR17","doi-asserted-by":"crossref","first-page":"2104","DOI":"10.1002\/sec.922","volume":"7","author":"B Wang","year":"2013","unstructured":"Wang, B., Li, H., Liu, X., Li, X., Li, F.: Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Netw. 7(11), 2104\u20132113 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"35_CR18","first-page":"41","volume":"3","author":"J Suba","year":"2014","unstructured":"Suba, J.: Multi owner data sharing with privacy preserving in cloud security mediator. Int. J. Sci. Res. 3(3), 41\u201344 (2014)","journal-title":"Int. J. Sci. Res."},{"issue":"3","key":"35_CR19","first-page":"137","volume":"1","author":"SK Tasmiya","year":"2014","unstructured":"Tasmiya, S.K., Kausar, F.: An efficient approach to share data in cloud with multi-owner groups. Int. J. Comput. Technol. 1(3), 137\u2013141 (2014)","journal-title":"Int. J. Comput. Technol."},{"issue":"5","key":"35_CR20","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320\u2013333 (2011)","journal-title":"Comput. Secur."},{"issue":"4","key":"35_CR21","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1504\/IJSN.2012.053458","volume":"7","author":"D Sun","year":"2012","unstructured":"Sun, D., Chang, G., Miao, C., Wang, X.: Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments. Int. J. Secur. Netw. 7(4), 196\u2013210 (2012)","journal-title":"Int. J. Secur. Netw."},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Femilshini, F., Ganeshkarthikeyan, V., Janani, S.: Privacy preserving revocation update protocol for group signature in cloud. In: Proceedings of the IEEE International Conference on Engineering and Technology, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ICETECH.2015.7275034"},{"issue":"12","key":"35_CR23","first-page":"22","volume":"128","author":"P Zagade","year":"2015","unstructured":"Zagade, P., Yadav, S., Shah, A., Bachate, R.: Group user revocation and integrity auditing of shared data in cloud environment. Int. J. Comput. Appl. 128(12), 22\u201325 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"9","key":"35_CR24","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"35_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"issue":"5","key":"35_CR26","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"35_CR27","first-page":"295","volume":"2","author":"B Wang","year":"2012","unstructured":"Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 295\u2013302 (2012)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the 32nd IEEE International Conference on Computer Communication, Turin, Italy, pp. 2904\u20132912 (2013)","DOI":"10.1109\/INFCOM.2013.6567101"},{"issue":"8","key":"35_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2015.2441172","volume":"10","author":"J Yuan","year":"2015","unstructured":"Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multi-user modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"35_CR30","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MSP.2013.20","volume":"11","author":"M Green","year":"2013","unstructured":"Green, M.: The threat in the cloud. IEEE Secur. Priv. 11(1), 86\u201389 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"35_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi: 10.1109\/TPDS.2015.2506573","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"7","key":"35_CR32","doi-asserted-by":"crossref","first-page":"3411","DOI":"10.1109\/TIP.2016.2568460","volume":"25","author":"S Hu","year":"2016","unstructured":"Hu, S., Wang, Q., Wang, J., Qin, Z., Ren, K.: Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25(7), 3411\u20133425 (2016)","journal-title":"IEEE Trans. Image Process."},{"issue":"99","key":"35_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSYST.2015.2428620","volume":"PP","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. PP(99), 1\u201310 (2015)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"35_CR34","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171\u2013178 (2015)","journal-title":"J. Internet Technol."},{"issue":"1","key":"35_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJSN.2014.059328","volume":"9","author":"D Santos","year":"2014","unstructured":"Santos, D., Nascimento, T., Westphall, C., Leandro, M., Westphall, C.: Privacy-preserving identity federations in the cloud: a proof of concept. Int. J. Secur. Netw. 9(1), 1\u201311 (2014)","journal-title":"Int. J. Secur. Netw."},{"issue":"6","key":"35_CR36","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.future.2012.01.006","volume":"28","author":"MT Khorshed","year":"2012","unstructured":"Khorshed, M.T., Ali, A.B.M.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833\u2013851 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"35_CR37","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DAB Fernandes","year":"2014","unstructured":"Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Incio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113\u2013170 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"35_CR38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-38586-5_1","volume-title":"Cloud Security: State of the Art, Security, Privacy and Trust in Cloud Systems","author":"LFB Soares","year":"2014","unstructured":"Soares, L.F.B., Fernandes, D.A.B., Gomes, J.V., Freire, M.M., Incio, P.R.: Cloud Security: State of the Art, Security, Privacy and Trust in Cloud Systems, pp. 3\u201344. Springer, Heidelberg (2014)"},{"key":"35_CR39","doi-asserted-by":"crossref","unstructured":"Chraibi, M., Harroud, H., Maach, A.: Classification of security issues and solutions in cloud environments. In: Proceedings of the International Conference on Information Integration and Web-Based Applications & Services. ACM (2013)","DOI":"10.1145\/2539150.2539222"},{"issue":"2010","key":"35_CR40","first-page":"2010","volume":"20","author":"Y Chen","year":"2010","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: What\u2019s new about cloud computing security. Univ. Calif. Berkeley Rep. 20(2010), 2010\u20132015 (2010)","journal-title":"Univ. Calif. Berkeley Rep."},{"issue":"2","key":"35_CR41","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1504\/IJSNET.2014.065860","volume":"16","author":"H Ju","year":"2014","unstructured":"Ju, H.: Intelligent disaster recovery structure and mechanism for cloud computing network. Int. J. Sens. Netw. 16(2), 70\u201376 (2014)","journal-title":"Int. J. Sens. Netw."},{"issue":"2\/3","key":"35_CR42","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1504\/IJSN.2011.043666","volume":"6","author":"M Barua","year":"2011","unstructured":"Barua, M., Liang, X., Lu, R., Shen, X.: ESPAC: enabling security and patient-centric access control for eHealth in cloud computing. Int. J. Secur. Netw. 6(2\/3), 67\u201376 (2011)","journal-title":"Int. J. Secur. Netw."},{"key":"35_CR43","unstructured":"Boampong, P.A., Wahsheh, L.A.: Different facets of security in the cloud. In: Proceedings of the 15th Communications and Networking Simulation Symposium. Society for Computer Simulation International (2012)"},{"issue":"14","key":"35_CR44","doi-asserted-by":"crossref","first-page":"682","DOI":"10.1109\/JCN.2012.00034","volume":"14","author":"J Shen","year":"2012","unstructured":"Shen, J., Moh, S., Chung, I.: Identity-based key agreement protocol employing a symmetric balanced incomplete block design. J. Commun. Netw. 14(14), 682\u2013691 (2012)","journal-title":"J. Commun. Netw."},{"issue":"1","key":"35_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.future.2013.07.001","volume":"30","author":"Z Xiao","year":"2014","unstructured":"Xiao, Z., Xiao, Y.: Achieving accountable MapReduce in cloud computing. Future Gener. Comput. Syst. 30(1), 1\u201313 (2014). (Elsevier)","journal-title":"Future Gener. Comput. Syst."},{"key":"35_CR46","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/978-3-319-05555-8_16","volume-title":"Applied Statistical Methods in Agriculture, Health and Life Sciences","author":"B Lawal","year":"2014","unstructured":"Lawal, B.: Incomplete block design. In: Lawal, B. (ed.) Applied Statistical Methods in Agriculture, Health and Life Sciences, pp. 639\u2013659. Springer International Publishing, Heidelberg (2014)"},{"issue":"15","key":"35_CR47","doi-asserted-by":"crossref","first-page":"2148","DOI":"10.1016\/j.ins.2005.09.004","volume":"176","author":"O Lee","year":"2006","unstructured":"Lee, O., Yoo, S., Park, B., Chung, I.: The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design. Inf. Sci. 176(15), 2148\u20132160 (2006)","journal-title":"Inf. Sci."},{"issue":"5","key":"35_CR48","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen, J., Moh, S., Chung, I.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453\u2013462 (2015)","journal-title":"J. Commun. Netw."},{"key":"35_CR49","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xiao, Y.: Accountable MapReduce in cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1082\u20131087 (2011)","DOI":"10.1109\/INFCOMW.2011.5928788"},{"key":"35_CR50","first-page":"363","volume":"17","author":"JI Mbegbu","year":"2013","unstructured":"Mbegbu, J.I.: Some designs from symmetric balanced incomplete block design. J. Niger. Assoc. Math. Phy. 17, 363\u2013366 (2013)","journal-title":"J. Niger. Assoc. Math. Phy."},{"issue":"6","key":"35_CR51","first-page":"682","volume":"14","author":"J Shen","year":"2012","unstructured":"Shen, J., Zheng, W., Wang, J., Zheng, Y., Sun, X.: An efficient verifiably encrypted signature from Weil pairing. J. Internet Technol. 14(6), 682\u2013691 (2012)","journal-title":"J. Internet Technol."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:25:08Z","timestamp":1498343108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}