{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:43:30Z","timestamp":1725914610137},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_23","type":"book-chapter","created":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:08:03Z","timestamp":1509311283000},"page":"262-274","source":"Crossref","is-referenced-by-count":2,"title":["Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications"],"prefix":"10.1007","author":[{"given":"Yuanyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jinbo","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Mingwei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-38348-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Bellare","year":"2013","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296\u2013312. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-38348-9_18"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Blasco, J., Di Pietro, R., Orfila, A., et al.: A tunable proof of ownership scheme for deduplication using bloom filters. In: IEEE CNS, pp. 481\u2013489. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997518"},{"issue":"12","key":"23_CR3","first-page":"2643","volume":"10","author":"R Chen","year":"2015","unstructured":"Chen, R., Mu, Y., Yang, G., et al.: Bl-mle: Block-level message-locked encryption for secure large file deduplication. IEEE TIFS 10(12), 2643\u20132652 (2015)","journal-title":"IEEE TIFS"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ACM CCS, pp. 81\u201382. ACM (2012)","DOI":"10.1145\/2414456.2414504"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Fu, Z., Huang, F., Sun, X., et al.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. In: IEEE TSC (2016)","DOI":"10.1109\/TSC.2016.2622697"},{"issue":"12","key":"23_CR6","first-page":"2706","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., et al.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE TIFS 11(12), 2706\u20132716 (2016)","journal-title":"IEEE TIFS"},{"key":"23_CR7","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.jnca.2014.12.004","volume":"50","author":"L Gonz\u00e1lez-Manzano","year":"2015","unstructured":"Gonz\u00e1lez-Manzano, L., Orfila, A.: An efficient confidentiality-preserving proof of ownership for deduplication. JNCA 50, 49\u201359 (2015)","journal-title":"JNCA"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., et al.: Proofs of ownership in remote storage systems. In: ACM CCS, pp. 491\u2013500. ACM (2011)","DOI":"10.1145\/2046707.2046765"},{"issue":"6","key":"23_CR9","first-page":"40","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE S&P 8(6), 40\u201347 (2010)","journal-title":"IEEE S&P"},{"issue":"99","key":"23_CR10","first-page":"1","volume":"PP","author":"T Jiang","year":"2016","unstructured":"Jiang, T., Chen, X., Wu, Q., et al.: Secure and efficient cloud data deduplication with randomized tag. IEEE TIFS PP(99), 1 (2016)","journal-title":"IEEE TIFS"},{"issue":"8","key":"23_CR11","first-page":"2386","volume":"65","author":"J Li","year":"2016","unstructured":"Li, J., Li, J., Xie, D., et al.: Secure auditing and deduplicating data in cloud. IEEE TC 65(8), 2386\u20132396 (2016)","journal-title":"IEEE TC"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Li, J., Qin, C., Lee, P.P.C., et al.: Information leakage in encrypted deduplication via frequency analysis. In: IEEE\/IFIP DSN (2017)","DOI":"10.1109\/DSN.2017.28"},{"issue":"3","key":"23_CR13","first-page":"501","volume":"8","author":"Q Li","year":"2015","unstructured":"Li, Q., Ma, J., Li, R., et al.: Large universe decentralized key-policy attribute-based encryption. SCN 8(3), 501\u2013509 (2015)","journal-title":"SCN"},{"issue":"18","key":"23_CR14","first-page":"4098","volume":"8","author":"Q Li","year":"2015","unstructured":"Li, Q., Ma, J., Li, R., et al.: Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. SCN 8(18), 4098\u20134109 (2015)","journal-title":"SCN"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Liu, J., Asokan, N., Pinkas, B.: Secure deduplication of encrypted data without additional independent servers. In: ACM CCS, pp. 874\u2013885. ACM (2015)","DOI":"10.1145\/2810103.2813623"},{"issue":"17","key":"23_CR16","first-page":"4002","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu, Q., Cai, W., Shen, J., et al.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. SCN 9(17), 4002\u20134012 (2016)","journal-title":"SCN"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Soriente, C., Karame, G.O., Ritzdorf, H., et al.: Commune: shared ownership in an agnostic cloud. In: ACM SACMAT, pp. 39\u201350. ACM (2015)","DOI":"10.1145\/2752952.2752972"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Storer, M.W., Greenan, K., Long, D.D., et al.: Secure data deduplication. In: ACM IWSS, pp. 1\u201310. ACM (2008)","DOI":"10.1145\/1456469.1456471"},{"issue":"11","key":"23_CR19","first-page":"2851","volume":"27","author":"B Tang","year":"2015","unstructured":"Tang, B., Sandhu, R., Li, Q.: Multi-tenancy authorization models for collaborative cloud services. CCPE 27(11), 2851\u20132868 (2015)","journal-title":"CCPE"},{"issue":"4","key":"23_CR20","first-page":"60:1","volume":"12","author":"D Wu","year":"2016","unstructured":"Wu, D., Yang, B., Wang, H., et al.: Privacy-preserving multimedia big data aggregation in large-scale wireless sensor networks. ACM TMCCA 12(4), 60:1\u201360:19 (2016)","journal-title":"ACM TMCCA"},{"issue":"6","key":"23_CR21","first-page":"1025","volume":"8","author":"J Xiong","year":"2015","unstructured":"Xiong, J., Li, F., Ma, J., et al.: A full lifecycle privacy protection scheme for sensitive data in cloud computing. P2PNA 8(6), 1025\u20131037 (2015)","journal-title":"P2PNA"},{"issue":"11","key":"23_CR22","first-page":"169","volume":"37","author":"J Xiong","year":"2016","unstructured":"Xiong, J., Zhang, Y., Li, F., et al.: Research progress on secure data deduplication in cloud. J. Commun. 37(11), 169\u2013180 (2016)","journal-title":"J. Commun."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:18:07Z","timestamp":1509311887000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}