{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:26:25Z","timestamp":1743002785560,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319968926"},{"type":"electronic","value":"9783319968933"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-96893-3_31","type":"book-chapter","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T11:30:49Z","timestamp":1531999849000},"page":"410-424","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Decentralized Data Integrity Verification Model in Untrusted Environment"],"prefix":"10.1007","author":[{"given":"Kun","family":"Hao","sequence":"first","affiliation":[]},{"given":"Junchang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Zhiqiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhuochen","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"unstructured":"Amazon. http:\/\/aws.amazon.com","key":"31_CR1"},{"unstructured":"Apache hadoop. http:\/\/hadoop.apache.org\/","key":"31_CR2"},{"unstructured":"Baidu. http:\/\/cloud.baidu.com","key":"31_CR3"},{"unstructured":"Google. http:\/\/www.google.com","key":"31_CR4"},{"unstructured":"Microsoft azure. http:\/\/www.microsoft.com\/windowsazure","key":"31_CR5"},{"unstructured":"1e96a1b27a6cb85df68d728cf3695b0c46dbd44d: Filecoin: a cryptocurrency operated file storage network (2014)","key":"31_CR6"},{"unstructured":"Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchains. https:\/\/www.zurich.ibm.com\/dccl\/paper-s\/nelson_dccl_slides.pdf. Accessed 13 Dec 2016","key":"31_CR7"},{"doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 831\u2013843 (2014)","key":"31_CR8","DOI":"10.1145\/2660267.2660310"},{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","key":"31_CR9","DOI":"10.1145\/1315245.1315318"},{"doi-asserted-by":"crossref","unstructured":"Bajaj, S., Sion, R.: TrustedDB: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, June 2011, pp. 205\u2013216 (2011)","key":"31_CR10","DOI":"10.1145\/1989323.1989346"},{"unstructured":"Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis. Technical report. Ruhr-University Bochum (2008)","key":"31_CR11"},{"unstructured":"Brenner, S., Wulf, C., Kapitza, R.: Running zookeeper coordination services in untrusted clouds (2014)","key":"31_CR12"},{"unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform (2014)","key":"31_CR13"},{"doi-asserted-by":"crossref","unstructured":"Chen, W., Liu, M., Zhang, R., Zhang, Y., Liu, S.: Secure outsourced skyline query processing via untrusted cloud service providers. In: IEEE International Conference on Computer Communications, INFOCOM 2016, pp. 1\u20139. IEEE (2016)","key":"31_CR14","DOI":"10.1109\/INFOCOM.2016.7524509"},{"doi-asserted-by":"crossref","unstructured":"Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.L.: Blockbench: a framework for analyzing private blockchains (2017)","key":"31_CR15","DOI":"10.1145\/3035918.3064033"},{"unstructured":"Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: group collaboration using untrusted cloud resources. In: Usenix Conference on Operating Systems Design and Implementation, pp. 337\u2013350 (2010)","key":"31_CR16"},{"issue":"4","key":"31_CR17","first-page":"742","volume":"54","author":"W Jiye","year":"2017","unstructured":"Jiye, W., Lingchao, G., Aiqiang, D.: Block chain based data security sharing network architecture research. J. Comput. Res. Dev. 54(4), 742\u2013749 (2017)","journal-title":"J. Comput. Res. Dev."},{"doi-asserted-by":"crossref","unstructured":"Juels, A.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584\u2013597 (2007)","key":"31_CR18","DOI":"10.1145\/1315245.1315317"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1007\/978-3-319-55699-4_34","volume-title":"Database Systems for Advanced Applications","author":"Y Li","year":"2017","unstructured":"Li, Y., Zheng, K., Yan, Y., Liu, Q., Zhou, X.: EtherQL: a query layer for blockchain system. In: Candan, S., Chen, L., Pedersen, T.B., Chang, L., Hua, W. (eds.) DASFAA 2017. LNCS, vol. 10178, pp. 556\u2013567. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-55699-4_34"},{"unstructured":"Lowry, S., Wilkinson, J.: Metadisk: blockchain-based decentralized file storage application. https:\/\/storj.io\/metadisk.pdf. Accessed 2 March 2017","key":"31_CR20"},{"issue":"8","key":"31_CR21","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1007\/s00500-015-1918-8","volume":"21","author":"J Mao","year":"2017","unstructured":"Mao, J., Zhang, Y., Li, P., Li, T., Wu, Q., Liu, J.: A position-aware merkle tree for dynamic cloud data integrity verification. Soft. Comput. 21(8), 2151\u20132164 (2017)","journal-title":"Soft. Comput."},{"unstructured":"McConaghy, T., Marques, R.: BigchainDB: a scalable blockchain database. https:\/\/www.bigchaindb.com\/whitepaper\/bigchaindb-whitepaper.pdf. Accessed 11 Jan 2017","key":"31_CR22"},{"doi-asserted-by":"crossref","unstructured":"Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: IEEE Symposium on Security and Privacy, pp. 475\u2013490 (2014)","key":"31_CR23","DOI":"10.1109\/SP.2014.37"},{"unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)","key":"31_CR24"},{"doi-asserted-by":"crossref","unstructured":"Sengupta, B., Bag, S., Ruj, S., Sakurai, K.: Retricoin: bitcoin based on compact proofs of retrievability. In: International Conference on Distributed Computing and Networking, p. 14 (2016)","key":"31_CR25","DOI":"10.1145\/2833312.2833317"},{"issue":"3","key":"31_CR26","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Shraer, A., Cachin, C., Cidon, A., Keidar, I., Yan, M., Shaket, D.: Venus: verification for untrusted cloud storage. In: ACM Workshop on Cloud Computing Security Workshop, pp. 19\u201330 (2010)","key":"31_CR27","DOI":"10.1145\/1866835.1866841"},{"unstructured":"Tsai, W.T., Yu, L., Wang, R., Liu, N., Deng, E.Y.: Blockchain application development techniques (2017)","key":"31_CR28"},{"issue":"3","key":"31_CR29","first-page":"442","volume":"26","author":"B Waters","year":"2008","unstructured":"Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2008)","journal-title":"J. Cryptol."},{"unstructured":"Weil, S.A., Brandt, S.A., Miller, E.L., Long, D.D., Maltzahn, C.: Ceph: a scalable, high-performance distributed file system. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 307\u2013320. USENIX Association (2006)","key":"31_CR30"},{"unstructured":"Wilkinson, S., Boshexski, T.: Metadisk: blockchain-based decentralized file storage application. https:\/\/storj.io\/storj.pdf. Accessed 11 January 2017","key":"31_CR31"},{"issue":"4","key":"31_CR32","first-page":"481","volume":"42","author":"Y Yong","year":"2016","unstructured":"Yong, Y., Feiyue, W.: The development status and prospects of blockchain technology. Acta Autom. Sin. 42(4), 481\u2013494 (2016)","journal-title":"Acta Autom. Sin."},{"doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops, pp. 180\u2013184 (2015)","key":"31_CR33","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-96893-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:36:44Z","timestamp":1710326204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-96893-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319968926","9783319968933"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-96893-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conferences.cis.umac.mo\/apwebwaim2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}