{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:41:46Z","timestamp":1761324106373},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s00779-017-1048-7","type":"journal-article","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T03:52:51Z","timestamp":1498881171000},"page":"949-962","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Secure public data auditing scheme for cloud storage in smart city"],"prefix":"10.1007","volume":"21","author":[{"given":"Libing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,1]]},"reference":[{"key":"1048_CR1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.cities.2013.12.010","volume":"38","author":"P Neirotti","year":"2014","unstructured":"Neirotti P, De Marco A, Cagliano A C, Mangano G, Scorrano F (2014) Current trends in smart city initiatives Somestylised facts. Cities 38:25\u201336","journal-title":"Cities"},{"issue":"5","key":"1048_CR2","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1109\/TC.2015.2470247","volume":"65","author":"Y Li","year":"2016","unstructured":"Li Y, Dai W, Ming Z, Qiu M (2016) Privacy protection for preventing data over-collection in smart city. IEEE Trans Comput 65(5):1339\u20131350","journal-title":"IEEE Trans Comput"},{"key":"1048_CR3","unstructured":"Yamamoto S, Matsumoto S, Nakamura M (2012) Using cloud technologies for large-scale house data in smart city 2012 IEEE 4th international conference on cloud computing technology and science (CloudCom). IEEE, pp 141\u2013148"},{"key":"1048_CR4","unstructured":"Dey S, Chakraborty A, Naskar S, Misra P (2012) Smart city surveillance: Leveraging benefits of cloud data stores 2012 IEEE 37th conference on local computer networks workshops (LCN Workshops). IEEE, pp 868\u2013876"},{"key":"1048_CR5","doi-asserted-by":"crossref","unstructured":"Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput","DOI":"10.1109\/MIC.2012.14"},{"key":"1048_CR6","doi-asserted-by":"crossref","unstructured":"Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. Computer","DOI":"10.1109\/MC.2012.1"},{"key":"1048_CR7","unstructured":"Behl A, Behl K (2012) An analysis of cloud computing security issues 2012 world congress on information and communication technologies (WICT). IEEE, pp 109\u2013114"},{"key":"1048_CR8","unstructured":"Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing 2012 data international conference on computer science and electronics engineering (ICCSEE), volume 1. IEEE, pp 647\u2013651"},{"key":"1048_CR9","unstructured":"Tate S R, Vishwanathan R, Everhart L (2013) Multi-user dynamic proofs of data possession using trusted hardware Proceedings of the 3rd ACM conference on data and application security and privacy. ACM, pp 353\u2013364"},{"key":"1048_CR10","unstructured":"Yuan J, Yu S (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud Proceedings of the 2013 international workshop on security in cloud computing. ACM, pp 19\u201326"},{"issue":"5","key":"1048_CR11","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"1048_CR12","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/CC.2014.6969712","volume":"11","author":"T Shuang","year":"2014","unstructured":"Shuang T, Lin T, Li X, Yan J (2014) An efficient method for checking the integrity of data in the cloud. Commun China 11(9):68\u201381","journal-title":"Commun China"},{"issue":"2","key":"1048_CR13","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013323","journal-title":"J Internet Technol"},{"issue":"1","key":"1048_CR14","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Qi L, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"issue":"2","key":"1048_CR15","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"1048_CR16","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546\u20132559","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"1048_CR17","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Geng X, Chang S K, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929\u2013935","journal-title":"J Internet Technol"},{"issue":"1","key":"1048_CR18","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171\u2013178","journal-title":"J Internet Technol"},{"key":"1048_CR19","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Kumar N, Lee J H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi: 10.1109\/JSYST.2016.2544805","DOI":"10.1109\/JSYST.2016.2544805"},{"issue":"7","key":"1048_CR20","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1049\/iet-ifs.2012.0176","volume":"7","author":"D He","year":"2013","unstructured":"He D, Huang B, Chen J (2013) New certificateless short signature scheme. IET Inf Secur 7(7):113\u2013117","journal-title":"IET Inf Secur"},{"issue":"6","key":"1048_CR21","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TIFS.2015.2390497","volume":"10","author":"JY Hwang","year":"2015","unstructured":"Hwang J Y, Chen L, Cho H S, Nyang D H (2015) Short dynamic group signature scheme supporting controllable linkability. IEEE Trans Inf Forensics Secur 10(6):1109\u20131124","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1048_CR22","doi-asserted-by":"publisher","unstructured":"He D, Kumar N, Choo K-K R, Wu W (2016) Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans Inf Forensics Secur. doi: 10.1109\/TIFS.2016.2622682","DOI":"10.1109\/TIFS.2016.2622682"},{"key":"1048_CR23","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 598\u2013609"},{"key":"1048_CR24","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski Jr B S (2007) Pors: Proofs of retrievability for large files Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"1048_CR25","doi-asserted-by":"crossref","unstructured":"Shacham H (2008) Compact proofs of retrievability. Trans ASIACRYPT (2008)","DOI":"10.1007\/978-3-540-89255-7_7"},{"issue":"3","key":"1048_CR26","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442\u2013483","journal-title":"J Cryptol"},{"key":"1048_CR27","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi: 10.1109\/JSYST.2015.2428620","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"1048_CR28","doi-asserted-by":"crossref","unstructured":"Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing Advances in cryptology\u2014ASIACRYPT 2001. Springer, pp 514\u2013532","DOI":"10.1007\/3-540-45682-1_30"},{"key":"1048_CR29","doi-asserted-by":"crossref","unstructured":"Wang B, Li H, Li M (2013) Privacy-preserving public auditing for shared cloud data supporting group dynamics 2013 IEEE international conference on communications (ICC). IEEE, pp 1946\u20131950","DOI":"10.1109\/ICC.2013.6654808"},{"key":"1048_CR30","doi-asserted-by":"crossref","unstructured":"Wang B, Li B, Li H, Li F (2013) Certificateless public auditing for data integrity in the cloud 2013 IEEE conference on communications and network security (CNS). IEEE, pp 136\u2013144","DOI":"10.1109\/CNS.2013.6682701"},{"issue":"1","key":"1048_CR31","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2015","unstructured":"Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92\u2013106","journal-title":"IEEE Trans Serv Comput"},{"key":"1048_CR32","doi-asserted-by":"crossref","unstructured":"Yang T, Yu B, Wang H, Li J, Lv Z (2015) Cryptanalysis and improvement of panda-public auditing for shared data in cloud and internet of things. Multimedia Tools and Applications","DOI":"10.1007\/s11042-015-3139-7"},{"key":"1048_CR33","unstructured":"Wang B, Chow S S M, Li M, Li H (2013) Storing shared data on the cloud via security-mediator 2013 IEEE 33rd international conference on distributed computing systems (ICDCS). IEEE, pp 124\u2013133"},{"key":"1048_CR34","unstructured":"Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud IEEE INFOCOM. IEEE, pp 2904\u20132912"},{"key":"1048_CR35","doi-asserted-by":"crossref","unstructured":"Li A, Tan S, Jia Y (2016) A method for achieving provable data integrity in cloud computing. J Supercomput","DOI":"10.1007\/s11227-015-1598-2"},{"key":"1048_CR36","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.future.2016.02.003","volume":"62","author":"Y Yu","year":"2016","unstructured":"Yu Y, Xue L, Au M H, Susilo W, Ni J, Zhang Y, Vasilakos A V, Shen J (2016) Cloud data integrity checking with an identity-based auditing mechanism from rsa. Futur Gener Comput Syst 62:85\u201391","journal-title":"Futur Gener Comput Syst"},{"key":"1048_CR37","doi-asserted-by":"crossref","unstructured":"Tang C-M, Zhang X-J (2015) A new publicly verifiable data possession on remote storage. J Supercomput:1\u201315","DOI":"10.1007\/s11227-015-1556-z"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1048-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1048-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1048-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T03:54:54Z","timestamp":1569642894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1048-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1048"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1048-7","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}