{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:28:35Z","timestamp":1761157715873,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615445"},{"type":"electronic","value":"9789819615452"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_2","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:38Z","timestamp":1739379338000},"page":"12-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Fine-Grained Ownership Transfer Protocol for\u00a0Cloud EMRs Auditing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8560-0194","authenticated-orcid":false,"given":"Yamei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3882-7041","authenticated-orcid":false,"given":"Yuexin","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7060-5820","authenticated-orcid":false,"given":"Weijing","family":"You","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1336-8111","authenticated-orcid":false,"given":"Yunru","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1388-7715","authenticated-orcid":false,"given":"Derui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"5","key":"2_CR2","doi-asserted-by":"publisher","first-page":"3782","DOI":"10.1109\/TSC.2023.3270580","volume":"16","author":"R Ding","year":"2023","unstructured":"Ding, R., Xu, Y., Zhong, H., Cui, J., Sha, K.: Towards fully anonymous integrity checking and reliability authentication for cloud data sharing. IEEE Trans. Serv. Comput. 16(5), 3782\u20133795 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"22","key":"2_CR3","doi-asserted-by":"publisher","first-page":"20065","DOI":"10.1109\/JIOT.2023.3282939","volume":"10","author":"C Gai","year":"2023","unstructured":"Gai, C., Shen, W., Yang, M., Yu, J.: PPADT: Privacy-preserving identity-based public auditing with efficient data transfer for cloud-based IoT data. IEEE Internet Things J. 10(22), 20065\u201320079 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"2_CR4","doi-asserted-by":"publisher","first-page":"3774","DOI":"10.1109\/TDSC.2021.3106780","volume":"19","author":"X Gao","year":"2021","unstructured":"Gao, X., Yu, J., Chang, Y., Wang, H., Fan, J.: Checking only when it is necessary: enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Trans. Dependable Secure Comput. 19(6), 3774\u20133789 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"103738","DOI":"10.1016\/j.cose.2024.103738","volume":"139","author":"Y Huang","year":"2024","unstructured":"Huang, Y., Shen, W., Qin, J.: Certificateless cloud storage auditing supporting data ownership transfer. Comput. Secur. 139, 103738 (2024)","journal-title":"Comput. Secur."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski\u00a0Jr, B.S.: PoRs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TCC.2019.2929045","volume":"10","author":"J Li","year":"2019","unstructured":"Li, J., Yan, H., Zhang, Y.: Efficient identity-based provable multi-copy data possession in multi-cloud storage. IEEE Trans. Cloud Comput. 10(1), 356\u2013365 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"11","key":"2_CR8","doi-asserted-by":"publisher","first-page":"2843","DOI":"10.1109\/TPDS.2023.3306150","volume":"34","author":"L Li","year":"2023","unstructured":"Li, L., Shen, J., Wu, B., Zhou, Y., Wang, X., Li, K.: Adaptive data placement in multi-cloud storage: a non-stationary combinatorial bandit approach. IEEE Trans. Parallel Distrib. Syst. 34(11), 2843\u20132859 (2023)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"2_CR9","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1109\/TSC.2023.3262563","volume":"16","author":"T Li","year":"2023","unstructured":"Li, T., Zhang, J., Shen, Y., Ma, J.: Hierarchical and multi-group data sharing for cloud-assisted industrial internet of things. IEEE Trans. Serv. Comput. 16(5), 3425\u20133438 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TPDS.2022.3216614","volume":"34","author":"T Li","year":"2022","unstructured":"Li, T., Chu, J., Hu, L.: Cia: A collaborative integrity auditing scheme for cloud data with multi-replica on multi-cloud storage providers. IEEE Trans. Parallel Distrib. Syst. 34(1), 154\u2013162 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"3663","DOI":"10.1109\/TIFS.2022.3211642","volume":"17","author":"Y Miao","year":"2022","unstructured":"Miao, Y., Huang, Q., Xiao, M., Susilo, W.: Blockchain assisted multi-copy provable data possession with faults localization in multi-cloud storage. IEEE Trans. Inf. Forensics Secur. 17, 3663\u20133676 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"2711","DOI":"10.1109\/TCC.2022.3224440","volume":"11","author":"J Shen","year":"2023","unstructured":"Shen, J., Chen, X., Wei, J., Guo, F., Susilo, W.: Blockchain-based accountable auditing with multi-ownership transfer. IEEE Trans. Cloud Comput. 11(3), 2711\u20132724 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-030-58951-6_30","volume-title":"Computer Security \u2013 ESORICS 2020","author":"J Shen","year":"2020","unstructured":"Shen, J., Guo, F., Chen, X., Susilo, W.: Secure cloud auditing with efficient ownership transfer. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 611\u2013631. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_30"},{"issue":"6","key":"2_CR15","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TSC.2019.2892095","volume":"14","author":"H Wang","year":"2019","unstructured":"Wang, H., He, D., Fu, A., Li, Q., Wang, Q.: Provable data possession with outsourced data transfer. IEEE Trans. Serv. Comput. 14(6), 1929\u20131939 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"2_CR16","doi-asserted-by":"publisher","first-page":"13614","DOI":"10.1038\/s41598-023-40682-9","volume":"13","author":"Y Yuan","year":"2023","unstructured":"Yuan, Y., Zhang, Z.: Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data. Sci. Rep. 13(1), 13614 (2023)","journal-title":"Sci. Rep."},{"issue":"4","key":"2_CR17","doi-asserted-by":"publisher","first-page":"2252","DOI":"10.1109\/TCC.2021.3057771","volume":"10","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Xu, Y., Hu, Y., Wu, J., Ren, J., Zhang, Y.: A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans. Cloud Comput. 10(4), 2252\u20132263 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"2","key":"2_CR18","first-page":"1118","volume":"19","author":"L Zhou","year":"2020","unstructured":"Zhou, L., Fu, A., Yang, G., Wang, H., Zhang, Y.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secure Comput. 19(2), 1118\u20131132 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:41Z","timestamp":1739379341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}