{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:48Z","timestamp":1725771288650},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_1","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"1-15","source":"Crossref","is-referenced-by-count":8,"title":["Collaborative Approach for Data Integrity Verification in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Rajat","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Somnath","family":"Dey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. 14th ACM Conf. Computer and Comm. Security, pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: ACM SecureCom (2008)","DOI":"10.1145\/1460877.1460889"},{"issue":"8","key":"1_CR3","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F. Sebe","year":"2008","unstructured":"Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowledge and Data Eng.\u00a020(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic Provable Data Possession. In: Proc. 16th ACM Conf. Computer and Communication Security (CCS 2009), pp. 213\u2013222 (2009)","DOI":"10.1145\/1653662.1653688"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Generation Computer Systems (December 2012)","DOI":"10.1016\/j.future.2012.01.004"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.S.: PORs: Proofs of retrievability for large files. In: ACM Conf. Computer and Comm. Security (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. In: ACM TCC-2009, pp. 109\u2013127 (2009)","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: ACM Workshop on Cloud Computing Security, pp. 43\u201345 (2009)","DOI":"10.1145\/1655008.1655015"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: HAIL: A high-availability and integrity layer for cloud storage. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 187\u2013198 (2009)","DOI":"10.1145\/1653662.1653686"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. IEEE INFOCOM. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"5","key":"1_CR12","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q. Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. IEEE Transactions on Parallel and Distributed Systems\u00a022(5), 847\u2013859 (2011)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Hao, Z., Zhong, S., Yu, N.: A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Transactions on Knowledge and Data Engineering\u00a023(9) (September 2011)","DOI":"10.1109\/TKDE.2011.62"},{"key":"1_CR14","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Cooperative Provable Data Possession. In: Cryptology ePrint Archive, Report 2012\/234, pp. 257\u2013265 (2012)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Schwarz, T.J.E., Miller, E.L.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS 2006, p. 12 (2006)","DOI":"10.1109\/ICDCS.2006.80"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Litwin, W., Schwarz, T.J.E.: Algebraic signatures for scalable, distributed data structures. In: ICDE 2004, Boston, MA, pp. 412\u2013423 (2004)","DOI":"10.1109\/ICDE.2004.1320015"},{"issue":"4","key":"1_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4156\/jdcta.vol5.issue4.6","volume":"5","author":"L. Chen","year":"2011","unstructured":"Chen, L., Guo, G.: An efficient remote data possession checking in cloud storage. JDCTA: International Journal of Digital Content Technology and its Applications\u00a05(4), 43\u201350 (2011)","journal-title":"JDCTA: International Journal of Digital Content Technology and its Applications"},{"key":"1_CR18","unstructured":"Saxena, R., Ruj, S., Sarma, M.: Collaborative Model for Privacy Preservation and Data Integrity Verification in Cloud Computing. In: Proceedings of the Security and Privacy Symposium, IIT Kanpur, Kanpur, India, February 28-March 2 (2013)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T12:34:18Z","timestamp":1565181258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}