{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:47Z","timestamp":1725888467342},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_61","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"611-617","source":"Crossref","is-referenced-by-count":0,"title":["On the Security of a Cloud Data Storage Auditing Protocol IPAD"],"prefix":"10.1007","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoshuang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jindan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"61_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM CCS 2007, pp. 598\u2013609. ACM Press, Alexandria (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"1","key":"61_CR2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr, B.S.: PORS: proofs of retrievability for large files. In: Ning, P., di Vimercati S.D.C., Syverson P.F. (eds.) ACM CCS 2007, pp. 584\u2013597. ACM Press, Alexandria (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"61_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013, pp. 325\u2013336. ACM Press, Berlin (2013)","DOI":"10.1145\/2508859.2516669"},{"key":"61_CR6","doi-asserted-by":"crossref","unstructured":"Cash, D., K\u00fcp\u00e7\u00fc, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 279\u2013295. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-38348-9_17"},{"issue":"5","key":"61_CR7","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2012","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"61_CR8","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Wang, B., Baochun, L., Hui, L.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the 33th Conference on Information Communications (INFOCOM 2013), pp. 2750\u20132758. IEEE Press (2013)","DOI":"10.1109\/INFCOM.2013.6567101"},{"key":"61_CR10","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing, Cloud Computing, pp. 19\u201326 (2013)","DOI":"10.1145\/2484402.2484408"},{"issue":"2","key":"61_CR11","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"61_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2014.10.006","volume":"52","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Zhang, Y., Ni, J., Au, M., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77\u201385 (2014). doi:\n10.1016\/j.future.2014.10.006","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"61_CR13","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., Min, G.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767\u2013778 (2016). doi:\n10.1109\/TIFS.2016.2615853","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"61_CR14","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231\u20132244 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"61_CR15","doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) ACM CCS 2011, pp. 491\u2013500. ACM Press, Chicago (2011)","DOI":"10.1145\/2046707.2046765"},{"key":"61_CR16","unstructured":"Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. Cryptology ePrint Archive, Report 2011\/529 (2011). \nhttp:\/\/eprint.iacr.org\/2011\/529"},{"issue":"8","key":"61_CR17","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TIFS.2015.2423264","volume":"10","author":"J Yuan","year":"2015","unstructured":"Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multi-user modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717\u20131726 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"61_CR18","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1109\/TIFS.2015.2501728","volume":"11","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on \u201cpublic integrity auditing for dynamic data sharing with multi-user modification\u201d. IEEE Trans. Inf. Forensics Secur. 11(3), 658\u2013659 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"61_CR19","doi-asserted-by":"crossref","first-page":"403","DOI":"10.3233\/JCS-150525","volume":"23","author":"J Yuan","year":"2015","unstructured":"Yuan, J., Yu, S.: PCPOR: public and constant-cost proofs of retrievability in cloud. J. Comput. Secur. 23, 403\u2013425 (2015)","journal-title":"J. Comput. Secur."},{"key":"61_CR20","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the 33rd Conference on Information Communications (INFOCOM 2014), pp. 2121\u20132129. IEEE Press (2014)","DOI":"10.1109\/INFOCOM.2014.6848154"},{"issue":"2\/3","key":"61_CR21","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1504\/IJSSC.2011.040340","volume":"1","author":"M Puzar","year":"2015","unstructured":"Puzar, M., Plagemann, T.: Data sharing in mobile ad-hoc networks-a study of replication and performance in the MIDAS data space. Int. J. Space-Based Situated Comput. 1(2\/3), 137\u2013150 (2015)","journal-title":"Int. J. Space-Based Situated Comput."},{"issue":"4","key":"61_CR22","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1504\/IJGUC.2013.057120","volume":"4","author":"R Petrlic","year":"2013","unstructured":"Petrlic, R., Sekula, S., Sorge, C.: A privacy-friendly architecture for future cloud computing. Int. J. Grid Util. Comput. 4(4), 265\u2013277 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"1","key":"61_CR23","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Du, J., Cheng, X., Liu, Z., Lin, K.: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22\u201328 (2016)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2\/3","key":"61_CR24","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1504\/IJGUC.2013.056252","volume":"4","author":"X Ye","year":"2013","unstructured":"Ye, X., Khoussainov, B.: Fine-grained access control for cloud computing. Int. J. Grid Util. Comput. 4(2\/3), 160\u2013168 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"1","key":"61_CR25","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10586-015-0511-3","volume":"19","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Li, P., Mao, J.: IPad: ID-based public auditing for the outsourced data in the standard model. Cluster Comput. 19(1), 127\u2013138 (2016). doi:\n10.1007\/s10586-015-0511-3","journal-title":"Cluster Comput."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:50:31Z","timestamp":1495853431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_61","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}