{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:06:57Z","timestamp":1758272817540},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T00:00:00Z","timestamp":1450742400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-015-0514-0","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T09:09:50Z","timestamp":1450775390000},"page":"47-56","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient chameleon hashing-based privacy-preserving auditing in cloud storage"],"prefix":"10.1007","volume":"19","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xubing","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,22]]},"reference":[{"key":"514_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, S.G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS\u201907), pp. 598\u2013609. (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"514_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Kamara, S., Katz, J.: Proofs of Storage from Homomorphic Identification Protocols. In: Proc. Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 319\u2013333. (2009)","DOI":"10.1007\/978-3-642-10366-7_19"},{"key":"514_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Proc. Adv. CryptologyCrypto, Ser. LNCS, vol. 3152, pp. 41\u201345. Springer New York (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"514_CR4","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"Dan Boneh","year":"2004","unstructured":"Boneh, Dan, Lynn, Ben, Shacham, Hovav: Short signatures from the weil pairing. J. Cryptol. 17, 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"514_CR5","doi-asserted-by":"crossref","unstructured":"Chang, E.-C., Xu, J.: Remote Integrity Check with Dishonest Storage Server. In: Proc. 13th European Symp. Research in Computer Security (ESORICS\u201908), pp. 223\u2013237. (2008)","DOI":"10.1007\/978-3-540-88313-5_15"},{"key":"514_CR6","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1109\/TPDS.2013.277","volume":"25","author":"S Guo","year":"2014","unstructured":"Guo, S., Zeng, D., Xiang, Y.: Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Trans. Parallel Distrib. Syst. 25, 2794\u20132803 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"514_CR7","unstructured":"jpbc: http:\/\/gas.dia.unisa.it\/projects\/jpbc\/"},{"key":"514_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski B.S. Jr.: Pors: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS\u201907), pp. 584\u2013597. (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"514_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Z., Li, J., Chen, X., Yang, J., Jia, C.: TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. In: ACISP 2014. LNCS, vol. 8544, pp. 115\u2013130. (2014)","DOI":"10.1007\/978-3-319-08344-5_8"},{"issue":"1","key":"514_CR10","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86\u201396 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"514_CR11","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69\u201373 (2012)","journal-title":"IEEE Internet Comput."},{"issue":"8","key":"514_CR12","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Sebe","year":"2008","unstructured":"Sebe, F., Domingo-Ferrer, J., Martnez-Balleste, A., Deswarte, Y., Quisquater, J.-J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"514_CR13","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Proc. 14th Intl Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT\u201908), pp. 90\u2013107. (2008)","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"514_CR14","unstructured":"Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to Keep Online Storage Services Honest. In: Hunt, G.C. (ed.) Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS). (2007)"},{"key":"514_CR15","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H., Li, F.: Certificateless Public Auditing for Data integrity in the Cloud. In: CNS 2013, pp. 276\u2013284. (2013)","DOI":"10.1109\/CNS.2013.6682701"},{"key":"514_CR16","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Proc. of ACNS 2012, pp. 507\u2013525","DOI":"10.1007\/978-3-642-31284-7_30"},{"key":"514_CR17","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H.: Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. In: The Proceedings of IEEE Cloud 2012, pp. 295\u2013302. (2012)","DOI":"10.1109\/CLOUD.2012.46"},{"key":"514_CR18","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H.: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. In: The Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), pp.2904\u20132912","DOI":"10.1109\/INFCOM.2013.6567101"},{"key":"514_CR19","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. IEEE INFOCOM, pp. 525\u2013533. (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"4","key":"514_CR20","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MNET.2010.5510914","volume":"24","author":"C Wang","year":"2010","unstructured":"Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19\u201324 (2010)","journal-title":"IEEE Netw."},{"issue":"5","key":"514_CR21","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"514_CR22","doi-asserted-by":"crossref","first-page":"2104","DOI":"10.1002\/sec.922","volume":"7","author":"B Wang","year":"2014","unstructured":"Wang, B., Li, H., Liu, X., Li, X., Li, F.: Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Netw. 7, 2104\u20132113 (2014). doi: 10.1002\/sec.922","journal-title":"Secur. Commun. Netw."},{"key":"514_CR23","unstructured":"Yamamoto, G., Oda, S., Aoki, K.: Fast Integrity for Large Data. In: Proc. ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption, pp. 21\u201332. (2007)"},{"issue":"1","key":"514_CR24","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.future.2013.05.005","volume":"30","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Niu, L., Yang, G., Mu, Y., Susilo, W.: On the security of auditing mechanisms for secure cloud storage. Future Gen. Comput. Syst. 30(1), 127\u2013132 (2014)","journal-title":"Future Gen. Comput. Syst."},{"key":"514_CR25","doi-asserted-by":"crossref","unstructured":"Zeng, K.: Publicly Verifiable Remote Data Integrity. In: Proc. 10th Intel Conf. Information and Comm. Security, pp. 419\u2013434. (2008)","DOI":"10.1007\/978-3-540-88625-9_28"},{"issue":"10","key":"514_CR26","doi-asserted-by":"crossref","first-page":"1894","DOI":"10.1002\/dac.2441","volume":"27","author":"J Zhang","year":"2014","unstructured":"Zhang, J., Yu, Y.: Short computational Diffie Chellman-based proxy signature scheme in the standard model. Int. J. Commun. Syst. 27(10), 1894\u20131907 (2014)","journal-title":"Int. J. Commun. Syst."},{"key":"514_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds. In: Proc. ACM Symp. Applied Computing, pp. 1550\u20131557. (2011)","DOI":"10.1145\/1982185.1982514"},{"issue":"12","key":"514_CR28","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231\u20132244 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0514-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0514-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0514-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T03:06:10Z","timestamp":1599966370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0514-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,22]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["514"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0514-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,22]]}}}