{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:37:28Z","timestamp":1759991848031,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_4","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"67-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with\u00a0Incremental Updates for\u00a0Handheld Mobile Devices"],"prefix":"10.1007","author":[{"given":"Yichi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Futai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shaojun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"PSLM Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515\u2013532. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_28"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"4_CR4","unstructured":"Elaine: Mobile Device Security: Startling Statistics on Data Loss and Data Breaches $$|$$ The ChannelPro Network (2023). https:\/\/www.channelpronetwork.com\/article\/mobile-device-security-startling-statistics-data-loss-and-data-breaches"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"102961","DOI":"10.1016\/j.sysarc.2023.102961","volume":"142","author":"Y Gao","year":"2023","unstructured":"Gao, Y., Chen, L., Han, J., Wu, G., Liu, S.: Similarity-based deduplication and secure auditing in IoT decentralized storage. J. Syst. Architect. 142, 102961 (2023)","journal-title":"J. Syst. Architect."},{"key":"4_CR6","unstructured":"GSMA: The Mobile Economy 2023 (2023). https:\/\/www.gsma.com\/mobileeconomy\/wp-content\/uploads\/2023\/03\/270223-The-Mobile-Economy-2023.pdf"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"102913","DOI":"10.1016\/j.sysarc.2023.102913","volume":"141","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Zhang, K., Wei, L., Chen, S., Wang, L.: RDIMM: revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage. J. Syst. Architect. 141, 102913 (2023)","journal-title":"J. Syst. Architect."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski\u00a0Jr, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"issue":"01","key":"4_CR9","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TCC.2019.2929045","volume":"10","author":"J Li","year":"2022","unstructured":"Li, J., Yan, H., Zhang, Y.: Efficient identity-based provable multi-copy data possession in multi-cloud storage. IEEE Trans. Cloud Comput. 10(01), 356\u2013365 (2022)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: An identity-based data integrity auditing scheme for cloud-based maritime transportation systems. IEEE Trans. Intell. Transp. Syst. 24(2) (2023)","DOI":"10.1109\/TITS.2022.3179991"},{"issue":"5","key":"4_CR11","doi-asserted-by":"publisher","first-page":"3978","DOI":"10.1109\/JIOT.2021.3102236","volume":"9","author":"Y Lin","year":"2021","unstructured":"Lin, Y., Li, J., Kimura, S., Yang, Y., Ji, Y., Cao, Y.: Consortium blockchain-based public integrity verification in cloud storage for IoT. IEEE Internet Things J. 9(5), 3978\u20133987 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-030-58951-6_30","volume-title":"Computer Security \u2013 ESORICS 2020","author":"J Shen","year":"2020","unstructured":"Shen, J., Guo, F., Chen, X., Susilo, W.: Secure cloud auditing with efficient ownership transfer. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020, Part I. LNCS, vol. 12308, pp. 611\u2013631. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_30"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen, W., Qin, J., Yu, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331\u2013346 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"4_CR15","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TDSC.2022.3228699","volume":"20","author":"W Shen","year":"2022","unstructured":"Shen, W., Yu, J., Yang, M., Hu, J.: Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage. IEEE Trans. Dependable Secure Comput. 20(6), 4593\u20134606 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR16","unstructured":"Stamford, C.: Gartner Forecasts Worldwide Device Shipments to Decline 4% in 2023 (2023). https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-01-31-gartner-forecasts-worldwide-device-shipments-to-decline-four-percent-in-2023"},{"issue":"4","key":"4_CR17","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.1109\/TDSC.2021.3075984","volume":"19","author":"Y Su","year":"2021","unstructured":"Su, Y., Li, Y., Yang, B., Ding, Y.: Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Trans. Dependable Secure Comput. 19(4), 2838\u20132850 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"119255","DOI":"10.1016\/j.ins.2023.119255","volume":"644","author":"Y Tian","year":"2023","unstructured":"Tian, Y., Tan, H., Shen, J., Pandi, V., Gupta, B.B., Arya, V.: Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management. Inf. Sci. 644, 119255 (2023)","journal-title":"Inf. Sci."},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TSC.2014.1","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328\u2013340 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"6","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TIFS.2016.2520886","volume":"11","author":"H Wang","year":"2016","unstructured":"Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11(6), 1165\u20131176 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"102953","DOI":"10.1016\/j.sysarc.2023.102953","volume":"142","author":"M Wang","year":"2023","unstructured":"Wang, M., Xu, L., Hao, R., Yang, M.: Secure auditing and deduplication with efficient ownership management for cloud storage. J. Syst. Architect. 142, 102953 (2023)","journal-title":"J. Syst. Architect."},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-24632-9_20","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"F Zhang","year":"2004","unstructured":"Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277\u2013290. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24632-9_20"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2018.09.013","volume":"472","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Wang, H., Xu, C.: Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. 472, 223\u2013234 (2019)","journal-title":"Inf. Sci."},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSC.2019.2942297","volume":"15","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhao, J., Xu, C., Wang, H., Zhang, Y.: DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans. Serv. Comput. 15(1), 334\u2013345 (2019)","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:10:40Z","timestamp":1729156240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}