{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:15:26Z","timestamp":1761621326452},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s00779-017-1052-y","type":"journal-article","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T04:01:31Z","timestamp":1498881691000},"page":"911-921","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Improved dynamic remote data auditing protocol for smart city security"],"prefix":"10.1007","volume":"21","author":[{"given":"Li","family":"Zang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yannan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yujie","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xiaoling","family":"Tao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,1]]},"reference":[{"key":"1052_CR1","volume-title":"A vision of smarter cities: how cities can lead the way into a prosperous and sustainable future","author":"S Dirks","year":"2009","unstructured":"Dirks S, Keeling M (2009) A vision of smarter cities: how cities can lead the way into a prosperous and sustainable future. IBM Global Business Services, Somers"},{"key":"1052_CR2","unstructured":"Dirks S, Gurdgiev C, Keeling M (2010) Smarter cities for smarter growth: how cities can optimize their systems for the talent-based economy. IBM Institute for Business Value"},{"key":"1052_CR3","doi-asserted-by":"crossref","unstructured":"Chourabi H, Nam T, Walker S et al (2012) Understanding smart cities: an integrative framework. In: 45th Hawaii International conference on system science (HICSS). IEEE, pp 2289\u20132297","DOI":"10.1109\/HICSS.2012.615"},{"key":"1052_CR4","unstructured":"Ballon P, Glidden J, Kranas P et al (2011) Is there a need for a cloud platform for European smart cities? eChallenges e-2011 Conference Proceedings, IIMC International Information Management Corporation"},{"key":"1052_CR5","doi-asserted-by":"crossref","unstructured":"Suciu G, Vulpe A, Halunga S et al (2013) Smart cities built on resilient cloud computing and secure internet of things. In: 19th International conference on control systems and computer science. IEEE, pp 513\u2013518","DOI":"10.1109\/CSCS.2013.58"},{"issue":"6","key":"1052_CR6","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/TSC.2014.2355201","volume":"8","author":"Y Yu","year":"2015","unstructured":"Yu Y, Ni J, Au M H, et al (2015) Comments on a public auditing mechanism for shared cloud data service[J]. Serv Comput IEEE Trans 8(6):998\u2013999","journal-title":"Serv Comput IEEE Trans"},{"issue":"3","key":"1052_CR7","doi-asserted-by":"crossref","first-page":"2321","DOI":"10.1016\/j.eswa.2011.08.048","volume":"39","author":"W Wang","year":"2012","unstructured":"Wang W, Zeng G, Tang D, et al (2012) Cloud-DLS: dynamic trusted scheduling for cloud computing. Expert Syst Appl 39(3):2321\u20132329","journal-title":"Expert Syst Appl"},{"key":"1052_CR8","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, et al (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"issue":"1","key":"1052_CR9","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese G, Burns R, Curtmola R, et al (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur (TISSEC) 14(1):12","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"1052_CR10","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski B S Jr (2007) PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"1052_CR11","first-page":"90","volume-title":"Compact proofs of retrievability. International conference on the theory and application of cryptology and information security","author":"H Shacham","year":"2008","unstructured":"Shacham H, Waters B (2008) Compact proofs of retrievability. International conference on the theory and application of cryptology and information security. Springer, Berlin, pp 90\u2013107"},{"issue":"3","key":"1052_CR12","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442\u2013483","journal-title":"J Cryptol"},{"issue":"5","key":"1052_CR13","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"C","key":"1052_CR14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.future.2016.02.003","volume":"62","author":"Y Yu","year":"2016","unstructured":"Yu Y, Xue L, Man H A et al (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Fut Gen Comput Syst 62(C):85\u201391","journal-title":"Fut Gen Comput Syst"},{"key":"1052_CR15","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K et al (2010) Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM, Proceedings IEEE. IEEE, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"2","key":"1052_CR16","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang C, Chow S S M, Wang Q et al (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362\u2013375","journal-title":"IEEE Trans Comput"},{"issue":"C","key":"1052_CR17","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.future.2014.10.006","volume":"52","author":"Y Yu","year":"2015","unstructured":"Yu Y, Zhang Y, Ni J et al (2015) Remote data possession checking with enhanced security for cloud storage. Futur Gener Comput Syst 52(C):77\u201385","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"1052_CR18","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu Y, Ahn G J, Hu H et al (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227\u2013238","journal-title":"IEEE Trans Serv Comput"},{"issue":"17","key":"1052_CR19","doi-asserted-by":"crossref","first-page":"7789","DOI":"10.1016\/j.eswa.2014.06.027","volume":"41","author":"Y Yu","year":"2014","unstructured":"Yu Y, Ni J, Au M H et al (2014) Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst Appl 41(17):7789\u20137796","journal-title":"Expert Syst Appl"},{"issue":"12","key":"1052_CR20","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y Zhu","year":"2012","unstructured":"Zhu Y, Hu H, Ahn G J et al (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231\u20132244","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1052_CR21","unstructured":"Yu Y, Man H A A, Ateniese G et al (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage PP(99): 1\u20131"},{"key":"1052_CR22","doi-asserted-by":"crossref","unstructured":"Ateniese G, Di Pietro R, Mancini L V et al (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on security and privacy in communication netowrks. ACM, pp 1\u201310","DOI":"10.1145\/1460877.1460889"},{"issue":"5","key":"1052_CR23","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K et al (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1052_CR24","doi-asserted-by":"crossref","unstructured":"Merkle R C (1980) Protocols for public key cryptosystems. IEEE Symp Secur Privacy. (3)vol 122","DOI":"10.1109\/SP.1980.10006"},{"key":"1052_CR25","doi-asserted-by":"publisher","unstructured":"Sookhak M, Gani A, Khan M K et al (2015) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci. doi: 10.1016\/j.ins.2015.09.004","DOI":"10.1016\/j.ins.2015.09.004"},{"issue":"9","key":"1052_CR26","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717\u20131726","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"1052_CR27","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1109\/TC.2014.2375190","volume":"64","author":"C Liu","year":"2015","unstructured":"Liu C, Ranjan R, Yang C, et al (2015) MUR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609\u20132622","journal-title":"IEEE Trans Comput"},{"key":"1052_CR28","doi-asserted-by":"crossref","unstructured":"Schwarz T S J, Miller E L (2006) Store, forget, and check: using algebraic signatures to check remotely administered storage. In: 26th IEEE international conference on distributed computing systems (ICDCS\u201906). IEEE, pp 12\u201312","DOI":"10.1109\/ICDCS.2006.80"},{"key":"1052_CR29","doi-asserted-by":"crossref","unstructured":"Zhang Y, Ni J, Tao X et al (2016) Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr Comput: Pract Exper (4)","DOI":"10.1002\/cpe.3573"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1052-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1052-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1052-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T03:55:45Z","timestamp":1569642945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1052-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1052"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1052-y","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}