{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T00:16:16Z","timestamp":1770509776243,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642161605","type":"print"},{"value":"9783642161612","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16161-2_22","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T22:17:14Z","timestamp":1290809834000},"page":"380-397","source":"Crossref","is-referenced-by-count":72,"title":["FADE: Secure Overlay Cloud Storage with File Assured Deletion"],"prefix":"10.1007","author":[{"given":"Yang","family":"Tang","sequence":"first","affiliation":[]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[]},{"given":"Radia","family":"Perlman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Amazon. SmugMug Case Study: Amazon Web Services (2006), http:\/\/aws.amazon.com\/solutions\/case-studies\/smugmug\/"},{"key":"22_CR2","unstructured":"Amazon Simple Storage Service (Amazon S3), http:\/\/aws.amazon.com\/s3\/"},{"key":"22_CR3","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB\/EECS-2009-28, EECS Department, University of California, Berkeley (February 2009)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proc. of SecureComm. (2008)","DOI":"10.1145\/1460877.1460889"},{"key":"22_CR5","unstructured":"Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing Data Privacy with Self-Destructing Data. In: Proc. of USENIX Security Symposium (August 2009)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In: Proc. of ACM CCS (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"22_CR7","unstructured":"JungleDisk, http:\/\/www.jungledisk.com\/"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Proc. of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization (2010)","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"22_CR9","unstructured":"LibAWS++, http:\/\/aws.28msec.com\/"},{"key":"22_CR10","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (October 1996)"},{"key":"22_CR11","unstructured":"MyAsiaCloud, http:\/\/www.myasiacloud.com\/"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Nair, S., Dashti, M.T., Crispo, B., Tanenbaum, A.S.: A Hybrid PKI-IBC Based Ephemerizer System. In: IFIP International Federation for Information Processing, vol.\u00a0232, pp. 241\u2013252 (2007)","DOI":"10.1007\/978-0-387-72367-9_21"},{"key":"22_CR13","unstructured":"OpenSSL, http:\/\/www.openssl.org\/"},{"key":"22_CR14","unstructured":"Perlman, R.: File System Design with Assured Delete. In: ISOC NDSS (2007)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Perlman, R., Kaufman, C., Perlner, R.: Privacy-Preserving DRM. In: IDtrust (2010)","DOI":"10.1145\/1750389.1750399"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure Attribute-Based Systems. In: ACM CCS (2006)","DOI":"10.1145\/1180405.1180419"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"issue":"11","key":"22_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. CACM\u00a022(11), 612\u2013613 (1979)","journal-title":"CACM"},{"key":"22_CR19","unstructured":"SmugMug, http:\/\/www.smugmug.com\/"},{"key":"22_CR20","volume-title":"Cryptography and Network Security","author":"W. Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and Network Security. Prentice-Hall, Englewood Cliffs (2006)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Vrable, M., Savage, S., Voelker, G.M.: Cumulus: Filesystem backup to the cloud. ACM Trans. on Storage (ToS)\u00a05(4) (December 2009)","DOI":"10.1145\/1629080.1629084"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for storage security in cloud computing. In: Proc. of IEEE INFOCOM (March 2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and Efficient Access to Outsourced Data. In: ACM Cloud Computing Security Workshop (CCSW) (November 2009)","DOI":"10.1145\/1655008.1655016"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Yun, A., Shi, C., Kim, Y.: On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage. In: ACM Cloud Computing Security Workshop (CCSW) (November 2009)","DOI":"10.1145\/1655008.1655017"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16161-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T11:45:38Z","timestamp":1559821538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16161-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642161605","9783642161612"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16161-2_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}