{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:34:41Z","timestamp":1742985281106,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819947546"},{"type":"electronic","value":"9789819947553"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-4755-3_37","type":"book-chapter","created":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T00:02:38Z","timestamp":1690675358000},"page":"425-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CL-BOSIC: A Distributed Agent-Oriented Scheme for Remote Data Integrity Check and Forensics in Public Cloud"],"prefix":"10.1007","author":[{"given":"Xiaolei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Huilin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhonghai","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,30]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., et al.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE Infocom, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"9","key":"37_CR3","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2012","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"37_CR4","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/TIFS.2016.2587242","volume":"11","author":"J Li","year":"2016","unstructured":"Li, J., Zhang, L., Liu, J.K., et al.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11), 2572\u20132583 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"37_CR5","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","volume":"23","author":"Z Hao","year":"2011","unstructured":"Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432\u20131437 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"37_CR6","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10207-014-0263-8","volume":"14","author":"Y Yu","year":"2014","unstructured":"Yu, Y., et al.: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Secur. 14(4), 307\u2013318 (2014). https:\/\/doi.org\/10.1007\/s10207-014-0263-8","journal-title":"Int. J. Inf. Secur."},{"key":"37_CR7","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2017","unstructured":"Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12, 767\u2013778 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR8","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TSC.2014.1","volume":"8","author":"H Wang","year":"2015","unstructured":"Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Ser. Comput. 8, 328\u2013340 (2015)","journal-title":"IEEE Trans. Ser. Comput."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D.; Franklin, M.: Identity-based encryption from the weil pairing. In: Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19\u201323 August 2001; pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"6","key":"37_CR10","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TPDS.2012.331","volume":"24","author":"X Liu","year":"2012","unstructured":"Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182\u20131191 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"37_CR11","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2013","unstructured":"Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92\u2013106 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Asiacrypt. 2894, pp. 452\u2013473 (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"37_CR13","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers 21. Springer International Publishing, pp. 357\u2013375 (2017)","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Dong, C., Wang, Y., Aldweesh, A., et al.: Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 211\u2013227 (2017)","DOI":"10.1145\/3133956.3134032"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"37_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.jpdc.2021.06.001","volume":"156","author":"JR Gudeme","year":"2021","unstructured":"Gudeme, J.R., Pasupuleti, S., Kandukuri, R.: Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage. J. Parallel Distributed Comput. 156, 163\u2013175 (2021)","journal-title":"J. Parallel Distributed Comput."},{"key":"37_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-030-73194-6_5","volume-title":"Database Systems for Advanced Applications","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Cui, J., Zhong, H., Gu, C., Liu, L.: Secure and efficient certificateless provable data possession for cloud-based data management systems. In: Jensen, C.S., et al. (eds.) DASFAA 2021. LNCS, vol. 12681, pp. 71\u201387. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73194-6_5"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S.; Paterson, K.G.: Certificateless public key cryptography. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 30 November\u20134 December 2003, pp. 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Fiege, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of computing, pp. 210\u2013217 (1987)","DOI":"10.1145\/28395.28419"},{"issue":"11","key":"37_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CC.2014.7004528","volume":"11","author":"P Yanguo","year":"2014","unstructured":"Yanguo, P., Jiangtao, C., Changgen, P., et al.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100\u2013113 (2014)","journal-title":"China Commun."},{"key":"37_CR22","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 44\u201355. IEEE (2000)"},{"key":"37_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"37_CR24","doi-asserted-by":"publisher","first-page":"158765","DOI":"10.1109\/ACCESS.2020.3020841","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang, X., Chen, G., Wang, M., et al.: Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access 8, 158765\u2013158777 (2020)","journal-title":"IEEE Access"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X.L., Chen, S., et al.: Blockchain based data integrity service framework for IoT data. In: 2017 IEEE International Conference on Web Services (ICWS). IEEE, pp. 468\u2013475 (2017)","DOI":"10.1109\/ICWS.2017.54"},{"issue":"2","key":"37_CR26","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen, W., Qin, J., Yu, J., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331\u2013346 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-4755-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T23:19:46Z","timestamp":1690931986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-4755-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819947546","9789819947553"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-4755-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2023\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}