{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T23:06:04Z","timestamp":1747868764693},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_19","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"359-371","source":"Crossref","is-referenced-by-count":6,"title":["Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data"],"prefix":"10.1007","author":[{"given":"Sanat","family":"Ghoshal","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-17040-4_3","volume-title":"Foundations and Practice of Security","author":"N Alkhojandi","year":"2015","unstructured":"Alkhojandi, N., Miri, A.: Privacy-preserving public auditing in cloud computing with data deduplication. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P.W.L. (eds.) FPS 2014. LNCS, vol. 8930, pp. 35\u201348. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-17040-4_3"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Ning, P., et al. [13], pp. 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"19_CR3","unstructured":"Coelho, F.: An (almost) constant-effort solution-verification proof-of-work protocol based on merkle trees. IACR Cryptology ePrint Archive 2007:433 (2007)"},{"key":"19_CR4","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-7901-X_1","volume-title":"Integrity and Internal Control in Information Systems VI","author":"Y Deswarte","year":"2004","unstructured":"Deswarte, Y., Quisquater, J.-J., Sa\u00efdane, A.: Remote integrity checking. In: Jajodia, S., Strous, L. (eds.) Integrity and Internal Control in Information Systems VI. IIFIP, vol. 140, pp. 1\u201311. Springer, Heidelberg (2004). doi: 10.1007\/1-4020-7901-X_1"},{"key":"19_CR5","unstructured":"Ederov, B.: Merkle tree traversal techniques. Bachelor thesis, Technische Universit\u00e4t Darmstadt (2007)"},{"issue":"4","key":"19_CR6","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4), 15 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"19_CR7","unstructured":"Gazzoni Filho, D.L., Barreto, P.S.L.M.: Demonstrating data possession, uncheatable data transfer. IACR Cryptology ePrint Archive, 2006:150 (2006)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Ning, P., et al. [13], pp. 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Li, L., Xu, L., Li, J., Zhang, C.: Study on the third-party audit in cloud storage service. In: Proceedings of the International Conference on Cloud and Service Computing, CSC 2011, pp. 220\u2013227. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/CSC.2011.6138525"},{"key":"19_CR10","unstructured":"Merkle, R.C.: Secrecy, Authentication, and Public Key Systems. PhD thesis, Stanford, CA, USA, AAI8001972 (1979)"},{"key":"19_CR11","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, May 2009"},{"issue":"1","key":"19_CR12","doi-asserted-by":"crossref","first-page":"2:1","DOI":"10.1145\/1462153.1462155","volume":"56","author":"M Naor","year":"2009","unstructured":"Naor, M., Rothblum, G.N.: The complexity of online memory checking. J. ACM 56(1), 2:1\u20132:46 (2009)","journal-title":"J. ACM"},{"key":"19_CR13","unstructured":"Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) Proceedings of the ACM Conference on Computer and Communications Security, CCS, Alexandria, Virginia, USA, 28\u201331 October 2007. ACM (2007)"},{"key":"19_CR14","doi-asserted-by":"publisher","unstructured":"Tian, H., Chen, Y., Chang, C.-C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. (2016). doi: 10.1109\/TSC.2015.2512589","DOI":"10.1109\/TSC.2015.2512589"},{"issue":"4","key":"19_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MNET.2010.5510914","volume":"24","author":"C Wang","year":"2010","unstructured":"Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Network 24(4), 19\u201324 (2010)","journal-title":"IEEE Network"},{"issue":"5","key":"19_CR16","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"19_CR17","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/s11280-011-0138-0","volume":"15","author":"K Yang","year":"2012","unstructured":"Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409\u2013428 (2012)","journal-title":"World Wide Web"},{"issue":"9","key":"19_CR18","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"19_CR19","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Ahn, G.-J., Hongxin, H., Yau, S.S., An, H.G., Changjun, H.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227\u2013238 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"12","key":"19_CR20","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hongxin, H., Ahn, G.-J., Mengyang, Y.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231\u20132244 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:18:18Z","timestamp":1498349898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}