{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T03:33:28Z","timestamp":1768534408830,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:00:00Z","timestamp":1578528000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:00:00Z","timestamp":1578528000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572267"],"award-info":[{"award-number":["61572267"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572412"],"award-info":[{"award-number":["61572412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s00500-019-04661-5","type":"journal-article","created":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T08:02:57Z","timestamp":1578556977000},"page":"12197-12214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Secure auditing and deduplication for encrypted cloud data supporting ownership modification"],"prefix":"10.1007","volume":"24","author":[{"given":"Jianli","family":"Bai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0574-7803","authenticated-orcid":false,"given":"Jia","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,9]]},"reference":[{"key":"4661_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: ACM conference on computer and communications security, pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"4661_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication networks, pp 1\u201310","DOI":"10.1145\/1460877.1460889"},{"key":"4661_CR3","doi-asserted-by":"crossref","unstructured":"Baracaldo N, Androulaki E, Glider J, Sorniotti A (2014) Reconciling end-to-end confidentiality and data reduction in cloud storage. In: CCSW \u201914 proceedings of the 6th edition of the ACM workshop on cloud computing security, pp 21\u201332","DOI":"10.1145\/2664168.2664176"},{"key":"4661_CR4","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013a) DupLESS: server-aided encryption for deduplicated storage. In: Usenix conference on security, pp 179\u2013194"},{"key":"4661_CR5","doi-asserted-by":"crossref","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013b) Message-locked encryption and secure deduplication. In: International conference on the theory and applications of cryptographic techniques, pp 296\u2013312","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"4661_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MPRV.2013.72","volume":"12","author":"CK Chu","year":"2013","unstructured":"Chu CK, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervasive Comput 12:50\u201357","journal-title":"IEEE Pervasive Comput"},{"key":"4661_CR7","doi-asserted-by":"crossref","unstructured":"Douceur JR, Adya A, Bolosky WJ, Simon P (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: International conference on distributed computing systems, 2002. Proceedings, pp 617\u2013624","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"4661_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway CC, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. Acm Trans Inf Syst Secur 17:15","journal-title":"Acm Trans Inf Syst Secur"},{"key":"4661_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2896258","author":"X Ge","year":"2019","unstructured":"Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secur Comput. https:\/\/doi.org\/10.1109\/TDSC.2019.2896258","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"4661_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik D, Pinkas B, Shulmanpeleg A (2010) Side channels in cloud services: deduplication in cloud storage. IEEE Secur Priv 8:40\u201347","journal-title":"IEEE Secur Priv"},{"key":"4661_CR11","first-page":"491","volume":"8","author":"S Halevi","year":"2011","unstructured":"Halevi S, Harnik B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. IEEE 8:491\u2013500","journal-title":"IEEE"},{"key":"4661_CR12","doi-asserted-by":"crossref","unstructured":"He K, Huang C, Yang K, Shi J (2015) Identity-preserving public auditing for shared cloud data. In: IEEE international symposium on quality of service, pp 159\u2013164","DOI":"10.1109\/IWQoS.2015.7404727"},{"key":"4661_CR13","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1109\/TKDE.2016.2580139","volume":"28","author":"J Hur","year":"2016","unstructured":"Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28:3113\u20133125","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4661_CR14","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TCC.2016.2525998","volume":"6","author":"H Jin","year":"2016","unstructured":"Jin H, Jiang H, Zhou K (2016) Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans Cloud Comput 6:680\u2013693","journal-title":"IEEE Trans Cloud Comput"},{"key":"4661_CR15","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. In: ACM conference on computer and communications security, pp 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"4661_CR16","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TC.2015.2389960","volume":"65","author":"J Li","year":"2016","unstructured":"Li J, Li J, Xie D, Cai Z (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65:2386\u20132396","journal-title":"IEEE Trans Comput"},{"key":"4661_CR17","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","volume":"16","author":"Y Li","year":"2017","unstructured":"Li Y, Yu Y, Min G, Susilo W, Ni J, Choo KKR (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secur Comput 16:72\u201383","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"4661_CR18","doi-asserted-by":"crossref","unstructured":"Liu X, Sun W, Lou W, Pei Q, Zhang Y (2017) One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE international conference on computer communications","DOI":"10.1109\/INFOCOM.2017.8056999"},{"key":"4661_CR19","unstructured":"Ng WK, Wen Y, Zhu H (2012) Private data deduplication protocols in cloud storage. In: Acm symposium on applied computing, pp 441\u2013446"},{"key":"4661_CR20","first-page":"1047","volume":"33","author":"R Sakai","year":"2008","unstructured":"Sakai R, Furukawa J (2008) Identity-based broadcast encryption. J Electron Inf Technol 33:1047\u20131050","journal-title":"J Electron Inf Technol"},{"key":"4661_CR21","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26:442\u2013483","journal-title":"J Cryptol"},{"key":"4661_CR22","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","volume":"12","author":"J Shen","year":"2016","unstructured":"Shen J, Shen J, Chen X, Huang X, Susilo W (2016) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12:2402\u20132415","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4661_CR23","first-page":"99","volume-title":"A secure data deduplication scheme for cloud storage","author":"J Stanek","year":"2014","unstructured":"Stanek J, Sorniotti A, Androulaki E, Kencl L (2014) A secure data deduplication scheme for cloud storage. IBM Corporation, New York, pp 99\u2013118"},{"key":"4661_CR24","doi-asserted-by":"crossref","unstructured":"Storer MW, Greenan K, Long DDE, Miller EL (2008). Secure data deduplication. In: ACM international workshop on storage security and survivability, pp 1\u201310","DOI":"10.1145\/1456469.1456471"},{"key":"4661_CR25","doi-asserted-by":"crossref","unstructured":"Wang B, Chow SSM, Li M, Li H (2013) Storing shared data on the cloud via security-mediator. In: IEEE international conference on distributed computing systems, pp 124\u2013133","DOI":"10.1109\/ICDCS.2013.60"},{"key":"4661_CR26","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2012","unstructured":"Wang C, Chow SSM, Wang Q, Ren K, Lou W (2012) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62:362\u2013375","journal-title":"IEEE Trans Comput"},{"key":"4661_CR27","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22:847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4661_CR28","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TIFS.2016.2646913","volume":"12","author":"Y Wang","year":"2016","unstructured":"Wang Y, Wu Q, Qin B, Shi W, Deng RH, Hu J (2016) Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans Inf Forensics Secur 12:940\u2013952","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4661_CR29","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1016\/j.compeleceng.2013.10.004","volume":"40","author":"SG Worku","year":"2014","unstructured":"Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40:1703\u20131713","journal-title":"Comput Electr Eng"},{"key":"4661_CR30","doi-asserted-by":"crossref","unstructured":"Xu J, Chang EC, Zhou J (2013) Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: ACM Sigsac symposium on information, computer and communications security, pp 195\u2013206","DOI":"10.1145\/2484313.2484340"},{"key":"4661_CR31","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jss.2015.11.044","volume":"113","author":"G Yang","year":"2016","unstructured":"Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130\u2013139","journal-title":"J Syst Softw"},{"key":"4661_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2912379","author":"J Yu","year":"2019","unstructured":"Yu J, Hao R (2019) Comments on sepdp: secure and efficient privacy preserving provable data possession in cloud storage. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2019.2912379","journal-title":"IEEE Trans Serv Comput"},{"key":"4661_CR33","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TIFS.2015.2400425","volume":"10","author":"J Yu","year":"2017","unstructured":"Yu J, Ren K, Wang C, Varadharajan V (2017) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10:1167\u20131179","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4661_CR34","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1109\/TIFS.2017.2695449","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensics Secur 12:1931\u20131940","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4661_CR35","doi-asserted-by":"crossref","unstructured":"Yuan J, Yu S (2013). Secure and constant cost public cloud storage auditing with deduplication. In: Communications and network security, pp 145\u2013153","DOI":"10.1109\/CNS.2013.6682702"},{"key":"4661_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2829880","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Yu J, Hao R, Wang C, Ren K (2018) Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Secur Comput. https:\/\/doi.org\/10.1109\/TDSC.2018.2829880","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"4661_CR37","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TIFS.2019.2922277","volume":"15","author":"P Zhao","year":"2019","unstructured":"Zhao P, Yu J, Zhang H, Qin Z, Wang C (2019) How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans Inf Forensics Secur 15:315\u2013328","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4661_CR38","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, Chen S (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6:227\u2013238","journal-title":"IEEE Trans Serv Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04661-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04661-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04661-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T00:46:36Z","timestamp":1610066796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04661-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,9]]},"references-count":38,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["4661"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04661-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,9]]},"assertion":[{"value":"9 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}