{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:56:37Z","timestamp":1725540997527},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_36","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"264-274","source":"Crossref","is-referenced-by-count":2,"title":["An Integrity Verification Scheme for Multiple Replicas in Clouds"],"prefix":"10.1007","author":[{"given":"La","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qingzhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenxiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q. Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 355\u2013370. Springer, Heidelberg (2009)"},{"key":"36_CR2","first-page":"1","volume-title":"17th IEEE International Workshop on Quality of Service (IWQoS 2009)","author":"C. Wang","year":"2009","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1\u20139. IEEE Press, New York (2009)"},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1653662.1653686","volume-title":"Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009)","author":"K. Bowers","year":"2009","unstructured":"Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009), pp. 187\u2013198. ACM, New York (2009)"},{"key":"36_CR4","first-page":"1550","volume-title":"The 26th Symposium On Applied Computing","author":"Y. Zhu","year":"2011","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G., Hu, H., Yau, S.: Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds. In: The 26th Symposium On Applied Computing, pp. 1550\u20131556. ACMSAC, Taiwan (2011)"},{"key":"36_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-16515-3_30","volume-title":"Web Information Systems and Mining","author":"Y. Shi","year":"2010","unstructured":"Shi, Y., Zhang, K., Li, Q.: A New Data Integrity Verification Mechanism for SaaS. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol.\u00a06318, pp. 236\u2013243. Springer, Heidelberg (2010)"},{"key":"36_CR6","first-page":"173","volume":"5","author":"Y. Shi","year":"2011","unstructured":"Shi, Y., Zhang, K., Li, Q.: Meta-data Driven Data Chunk Based Secure Data Storage for SaaS. International Journal of Digital Content Technology and its Applications\u00a05, 173\u2013185 (2011)","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"36_CR7","unstructured":"Pinkas, B., Shulman-Peleg, A., Halevi, S., Harnik, D.: Proofs of ownership in remote storage systems. Cryptology ePrint Archive, Report 2011\/207 (2011)"},{"issue":"2","key":"36_CR8","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.cose.2011.12.005","volume":"31","author":"D. Xiao","year":"2012","unstructured":"Xiao, D., Yang, Y., Yao, W., Wu, C., Liu, J., Yang, Y.: Multiple-File Remote Data Checking for cloud storage. Computers and Security\u00a031(2), 192\u2013205 (2012)","journal-title":"Computers and Security"},{"key":"36_CR9","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1145\/1315245.1315317","volume-title":"Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS 2007)","author":"A. Juels","year":"2007","unstructured":"Juels, A., Kaliski Jr., B.: PORs: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS 2007), pp. 584\u2013597. ACM, New York (2007)"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1145\/1315245.1315318","volume-title":"Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007)","author":"G. Ateniese","year":"2007","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007), pp. 598\u2013609. ACM, New York (2007)"},{"key":"36_CR11","first-page":"411","volume-title":"The 28th International Conference on Distributed Computing Systems","author":"C. Reza","year":"2008","unstructured":"Reza, C., Osama, K., Randal, B., Giuseppe, A.: MR-PDP: Multiple-Replica Provable Data Possession. In: The 28th International Conference on Distributed Computing Systems, pp. 411\u2013420. IEEE Press, Beijing (2008)"},{"issue":"6","key":"36_CR12","first-page":"1107","volume":"47","author":"H. Xian","year":"2010","unstructured":"Xian, H., Feng, D.: An Integrity Checking Scheme in Outsourced Database Model. Journal of Computer Research and Development\u00a047(6), 1107\u20131115 (2010)","journal-title":"Journal of Computer Research and Development"},{"key":"36_CR13","first-page":"122","volume-title":"Proc. of IEEE Symposium on Security and Privacy","author":"R.C. Merkle","year":"1980","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: Proc. of IEEE Symposium on Security and Privacy, pp. 122\u2013134. IEEE Computer Society, Washington (1980)"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:10:49Z","timestamp":1620130249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}