{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:14:01Z","timestamp":1725851641064},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811004476"},{"type":"electronic","value":"9789811004483"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0448-3_71","type":"book-chapter","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T03:34:03Z","timestamp":1458358443000},"page":"853-866","source":"Crossref","is-referenced-by-count":2,"title":["An Improved Privacy-Preserving Public Auditing for Secure Cloud Storage"],"prefix":"10.1007","author":[{"given":"Mukund N.","family":"Kulkarni","sequence":"first","affiliation":[]},{"given":"Bharat A.","family":"Tidke","sequence":"additional","affiliation":[]},{"family":"Rajeev Arya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"key":"71_CR1","doi-asserted-by":"crossref","unstructured":"Wang, C.: Privacy-preserving public auditing for storage security in cloud computing. In: Proceedings IEEE INFOCOM 10, March 2010","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"71_CR2","unstructured":"Mell, P., Grance, T.: Draft NIST Working Definition of Cloud Computing (2009)"},{"key":"71_CR3","first-page":"3","volume-title":"Computer Communications and Networks","author":"Siani Pearson","year":"2012","unstructured":"Pearson, S.: Privacy, security and trust in cloud computing. In: Privacy and Security for Cloud Computing (2012)"},{"key":"71_CR4","unstructured":"Cloud Security Alliance: Top Threats to Cloud Computing"},{"key":"71_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Burton, J., Kaliski, S.: PORs: proofs of retrievability for large files. In: Proceedings ACM Conference Computer and Communication Security (CCS \u201907), pp. 584\u2013597, Oct. 2007","DOI":"10.1145\/1315245.1315317"},{"key":"71_CR6","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. Proc. Theory Cryptograph. Conf. Theor. Cryptograph. (TCC), pp. 109\u2013127 (2009)","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"71_CR7","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"Hovav Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings International Conferrence Theory and Application of Cryptography and Information Security: Advances in Cryptography (Asiacrypt), vol. 5350, pp. 90\u2013107, Dec 2008"},{"key":"71_CR8","unstructured":"Marium, S., Nazir, Q., Ahmed, A., Ahthasham, S., Mirza, A.M.: Implementation of EAP with RSA for enhancing the security of cloud computing"},{"key":"71_CR9","unstructured":"Kiran Kumar, K., Padmaja, K., Radha Krishna, P.: Automatic protocol blocker for privacy-preserving public auditing in cloud computing. Int. J. Comput. Sci. Technol. 3, pp. 936\u2013940. ISSN. 0976-8491 (Online). ISSN: 2229-4333 (Print), March 2012"},{"key":"71_CR10","doi-asserted-by":"crossref","unstructured":"Cong, W., Sherman S.-M., Chow, Q.W., Kui, R., Wenjing, L.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput 62(2), 2013","DOI":"10.1109\/TC.2011.245"},{"key":"71_CR11","unstructured":"Shrinivas, D.: Privacy-preserving public auditing in cloud storage security. Int. J. Comput. Sci. Inf. Technol. 2(6), 2691\u20132693. ISSN: 0975-9646 (2011)"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security (CCS\u201907), pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"71_CR13","doi-asserted-by":"crossref","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS\u201909), pp. 213\u2013222. ACM (2009)","DOI":"10.1145\/1653662.1653688"},{"issue":"5","key":"71_CR14","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Qian Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"12","key":"71_CR15","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Yan Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12) 2231\u20132244 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"71_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC\u201911), pp. 1550\u20131557. ACM (2011)","DOI":"10.1145\/1982185.1982514"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fifth International Conference on Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0448-3_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T19:33:59Z","timestamp":1559417639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0448-3_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811004476","9789811004483"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0448-3_71","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}