{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:20:06Z","timestamp":1768526406158,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T00:00:00Z","timestamp":1409270400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s10207-014-0263-8","type":"journal-article","created":{"date-parts":[[2014,8,28]],"date-time":"2014-08-28T15:54:32Z","timestamp":1409241272000},"page":"307-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage"],"prefix":"10.1007","volume":"14","author":[{"given":"Yong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Liju","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,29]]},"reference":[{"key":"263_CR1","unstructured":"Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Incio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 1\u201358 (2013). doi: 10.1007\/s10207-013-208-7"},{"issue":"4","key":"263_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"issue":"10","key":"263_CR3","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(10), 371\u2013386 (2014)","journal-title":"Inf. Sci."},{"key":"263_CR4","unstructured":"Cloud Security Alliance, Top threats to cloud computing (2010). http:\/\/www.cloudsecurityalliance.org"},{"key":"263_CR5","doi-asserted-by":"crossref","unstructured":"Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. In: Proceedings 32nd Annual Symposium on Foundations of Computer Science (FOCS 1991), pp. 90\u201399 (1991)","DOI":"10.1109\/SFCS.1991.185352"},{"key":"263_CR6","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song,D.X.: Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference on Computer and Communications Security (ACM CCS 2007), pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"263_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1\u201334 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"263_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Pors Jr, B.S.K.: Proofs of retrievability for large files. In: Proceedings 14th ACM Conference on Computer and Communications Security (ACM CCS 2007), pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"263_CR9","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings 14th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2008), pp. 90\u2013107 (2008)","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"263_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings 14th European Symposium on Research in Computer Security (ESORDICS 2009), pp. 355\u2013370 (2009)","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"263_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings 29th Conference on Computer Communications (IEEE INFOCOM 2010), pp. 525\u2013533 (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"263_CR12","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19\u201324 (2010). doi: 10.1109\/MNET.2010.5510914","DOI":"10.1109\/MNET.2010.5510914"},{"issue":"5","key":"263_CR13","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public audibility and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"263_CR14","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"263_CR15","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717\u20131726 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"263_CR16","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Ahn, G.-J., Hu, H., Yau, S.S., An, H.G., Hu, C.-J.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227\u2013238 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"263_CR17","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1016\/j.jss.2011.12.024","volume":"85","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G.-J., Yau, S.S.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083\u20131095 (2012)","journal-title":"J. Syst. Softw."},{"key":"263_CR18","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans. Parallel Distrib. Syst. (2013). doi: 10.1109\/TPDS.2013.16","DOI":"10.1109\/TPDS.2013.16"},{"key":"263_CR19","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Pietro,R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008) (2008). doi: 10.1145\/1460877.1460889","DOI":"10.1145\/1460877.1460889"},{"key":"263_CR20","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings 17th International Workshop on Quality of Service (IWQoS 2009) (2009)","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"263_CR21","doi-asserted-by":"crossref","unstructured":"Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings 16th ACM Conference on Computer and Communications Security (ACM CCS 2009) (2009)","DOI":"10.1145\/1653662.1653688"},{"key":"263_CR22","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"issue":"8","key":"263_CR23","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Seb\u00e9","year":"2008","unstructured":"Seb\u00e9, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"263_CR24","doi-asserted-by":"crossref","unstructured":"Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432\u20131437 (2011)","DOI":"10.1109\/TKDE.2011.62"},{"key":"263_CR25","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"263_CR26","unstructured":"Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice-Hall, Upper Saddle River (2004)"},{"key":"263_CR27","doi-asserted-by":"crossref","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","DOI":"10.1007\/s001450010003"},{"key":"263_CR28","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Proceedings 8th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002), pp. 125\u2013142(2002)","DOI":"10.1007\/3-540-36178-2_8"},{"key":"263_CR29","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511814549","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2008","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2008)"},{"issue":"3\u20134","key":"263_CR30","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The MAGMA algebra system. I. The user language. J. Symb. Comput. 24(3\u20134), 235\u2013265 (1997)","journal-title":"J. Symb. Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0263-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-014-0263-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0263-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T08:04:10Z","timestamp":1565769850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-014-0263-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,29]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["263"],"URL":"https:\/\/doi.org\/10.1007\/s10207-014-0263-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,29]]}}}