{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:29:58Z","timestamp":1743074998515,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_7","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"122-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Public Auditing with\u00a0Aggregated Tags for\u00a0Multiple Users"],"prefix":"10.1007","author":[{"given":"Yumei","family":"Li","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Fuchun","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"7_CR1","unstructured":"Anthoine, G., et al.: Dynamic proofs of retrievability with low server storage. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 537\u2013554 (2021)"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2767005","volume":"48","author":"CA Ardagna","year":"2015","unstructured":"Ardagna, C.A., Asal, R., Damiani, E., Vu, Q.H.: From security to assurance in the cloud: a survey. ACM Comput. Surv. (CSUR) 48(1), 1\u201350 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 831\u2013843 (2014)","DOI":"10.1145\/2660267.2660310"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609. ACM (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-10366-7_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"G Ateniese","year":"2009","unstructured":"Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319\u2013333. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_19"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/11967668_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"M Bellare","year":"2006","unstructured":"Bellare, M., Neven, G.: Identity-based multi-signatures from RSA. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 145\u2013162. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11967668_10"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-030-03329-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Drijvers, M., Neven, G.: Compact multi-signatures for smaller blockchains. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 435\u2013464. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_15"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_30"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BFb0054117","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"D Boneh","year":"1998","unstructured":"Boneh, D., Venkatesan, R.: Breaking RSA may not be equivalent to factoring. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 59\u201371. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054117"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-015-9216-2","volume":"30","author":"D Cash","year":"2017","unstructured":"Cash, D., K\u00fcp\u00e7\u00fc, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. J. Cryptol. 30, 22\u201357 (2017)","journal-title":"J. Cryptol."},{"issue":"12","key":"7_CR11","doi-asserted-by":"publisher","first-page":"15815","DOI":"10.1109\/TVT.2020.3036631","volume":"69","author":"M Cui","year":"2020","unstructured":"Cui, M., Han, D., Wang, J., Li, K.C., Chang, C.C.: ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Trans. Veh. Technol. 69(12), 15815\u201315827 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR12","unstructured":"Reinsel, D., Gantz, J., Rydning, J.: Data age 2025: the digitization of the world from edge to core. Int.Data Corporation, Needham, White Paper (2018). https:\/\/www.seagate.com\/files\/www-content\/our-story\/ trends\/files\/idc-seagate-dataage-whitepaper.pdf"},{"key":"7_CR13","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-7901-X_1","volume-title":"Integrity and Internal Control in Information Systems VI","author":"Y Deswarte","year":"2004","unstructured":"Deswarte, Y., Quisquater, J.-J., Sa\u00efdane, A.: Remote integrity checking. In: Jajodia, S., Strous, L. (eds.) Integrity and Internal Control in Information Systems VI. IIFIP, vol. 140, pp. 1\u201311. Springer, Boston, MA (2004). https:\/\/doi.org\/10.1007\/1-4020-7901-X_1"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Drijvers, M., et al.: On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1084\u20131101. IEEE (2019)","DOI":"10.1109\/SP.2019.00050"},{"issue":"12","key":"7_CR15","doi-asserted-by":"publisher","first-page":"3631","DOI":"10.1109\/TC.2016.2560812","volume":"65","author":"K He","year":"2016","unstructured":"He, K., Chen, J., Du, R., Wu, Q., Xue, G., Zhang, X.: DeyPoS: deduplicatable dynamic proof of storage for multi-user environments. IEEE Trans. Comput. 65(12), 3631\u20133645 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR16","unstructured":"Intel: What is storage as a service? https:\/\/www.intel.com\/content\/www\/us\/en\/cloud-computing\/storage-as-a-service.html"},{"key":"7_CR17","unstructured":"Juels, A., Kaliski Jr, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, 28\u201331 October 2007, pp. 584\u2013597 (2007)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Le, T., Huang, P., Yavuz, A.A., Shi, E., Hoang, T.: Efficient dynamic proof of retrievability for cold storage (2023)","DOI":"10.14722\/ndss.2023.23307"},{"issue":"8","key":"7_CR19","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TC.2015.2389960","volume":"65","author":"J Li","year":"2015","unstructured":"Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386\u20132396 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"2564","DOI":"10.1109\/TIFS.2021.3059270","volume":"16","author":"S Li","year":"2021","unstructured":"Li, S., Zhang, Y., Xu, C., Chen, K.: Cryptoanalysis of an authenticated data structure scheme with public privacy-preserving auditing. IEEE Trans. Inf. Forensics Secur. 16, 2564\u20132565 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Liu, X., Sun, W., Lou, W., Pei, Q., Zhang, Y.: One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp.\u00a01\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056999"},{"key":"7_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119279","volume":"644","author":"L Peng","year":"2023","unstructured":"Peng, L., Yan, Z., Liang, X., Yu, X.: SecDedup: secure data deduplication with dynamic auditing in the cloud. Inf. Sci. 644, 119279 (2023)","journal-title":"Inf. Sci."},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89255-7_7"},{"issue":"3","key":"7_CR24","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1109\/TCC.2020.3002553","volume":"10","author":"Y Su","year":"2020","unstructured":"Su, Y., Sun, J., Qin, J., Hu, J.: Publicly verifiable shared dynamic electronic health record databases with functional commitment supporting privacy-preserving integrity auditing. IEEE Trans. Cloud Comput. 10(3), 2050\u20132065 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"6","key":"7_CR25","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1109\/TDSC.2021.3114160","volume":"19","author":"G Tian","year":"2021","unstructured":"Tian, G., et al.: Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Dependable Secure Comput. 19(6), 3941\u20133954 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, San Diego, CA, USA, 15\u201319 March 2010, pp. 525\u2013533. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TETC.2020.3005610","volume":"9","author":"Y Xu","year":"2020","unstructured":"Xu, Y., Zhang, C., Wang, G., Qin, Z., Zeng, Q.: A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans. Emerg. Top. Comput. 9(3), 1421\u20131432 (2020)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Secure and constant cost public cloud storage auditing with deduplication. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 145\u2013153. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682702"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 2121\u20132129. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848154"},{"issue":"4","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TCC.2019.2927219","volume":"9","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362\u20131375 (2019)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"3","key":"7_CR31","first-page":"608","volume":"17","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608\u2013619 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 1\u201312 (2012)","DOI":"10.1145\/2133601.2133603"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:11:02Z","timestamp":1729156262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}