{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:10:08Z","timestamp":1750032608395,"version":"3.41.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,3,3]],"date-time":"2017-03-03T00:00:00Z","timestamp":1488499200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10586-017-0804-9","type":"journal-article","created":{"date-parts":[[2017,3,3]],"date-time":"2017-03-03T09:58:55Z","timestamp":1488535135000},"page":"2641-2653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Achieving public verifiability and data dynamics for cloud data in the standard model"],"prefix":"10.1007","volume":"20","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongxin","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"804_CR1","unstructured":"Dropbox. https:\/\/www.dropbox.com"},{"key":"804_CR2","unstructured":"GoogleDrive. http:\/\/www.google.com\/drive\/index.html"},{"key":"804_CR3","unstructured":"Yuan, J.: Secure and verifiable data storage and utilization in cloud computing, Ph.D. dissertation, Stanford University (2015). http:\/\/pages.erau.edu\/~yuanj\/cloud-research.html"},{"key":"804_CR4","doi-asserted-by":"publisher","unstructured":"Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo K-K.R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable and Secure Comput. doi: 10.1109\/TDSC.2017.2662216","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"804_CR5","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.future.2016.04.017","volume":"62","author":"Kim-Kwang Raymond Choo","year":"2016","unstructured":"Choo, Kim-Kwang Raymond, Domingo-Ferrer, Josep, Zhang, Lei: Cloud cryptography: theory, practice and future research directions. Future Gener. Comput. Syst. 62, 51\u201353 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"804_CR6","doi-asserted-by":"crossref","unstructured":"Juliadotter, N.V., Choo, K.K.R.: Cloud Attack. IEEE Cloud Computing, 2(1): 14\u201320","DOI":"10.1109\/MCC.2015.2"},{"key":"804_CR7","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","volume":"67","author":"Opeyemi Osanaiyea","year":"2016","unstructured":"Osanaiyea, Opeyemi, Choo, Kim-Kwang Raymond, Dlodloa, Mqhele: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67, 147\u2013165 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"804_CR8","doi-asserted-by":"crossref","unstructured":"Ateniese, S.G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proceedings of 14th ACM Conference Computer and Communication Security (CCS 07), pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"804_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr., B.S.: PORs: Proofs of retrievability for large files. In: Proceedings of 14th ACM Conference Computer and Communication Security (CCS\u201907), pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"804_CR10","doi-asserted-by":"crossref","unstructured":"Erway, C.C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of 16th ACM Conference Computer and Communication Security, pp. 213\u2013222 (2009)","DOI":"10.1145\/1653662.1653688"},{"key":"804_CR11","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of 14th International Conference Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT\u201908), pp. 90\u2013107 (2008)","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"804_CR12","doi-asserted-by":"crossref","unstructured":"Xiong, H., Beznosov, K., Qin, Z., Ripeanu, M.: Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In: IEEE-ICC, pp. 1\u20136 (2010)","DOI":"10.1109\/ICC.2010.5502673"},{"issue":"1","key":"804_CR13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69\u201373 (2012)","journal-title":"IEEE Internet Comput."},{"key":"804_CR14","doi-asserted-by":"publisher","unstructured":"Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. doi: 10.1049\/iet-ifs.2012.0271","DOI":"10.1049\/iet-ifs.2012.0271"},{"issue":"8","key":"804_CR15","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Sebe","year":"2008","unstructured":"Sebe, F., Domingo-Ferrer, J., Martnez-Balleste, A., Deswarte, Y., Quisquater, J.-J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"804_CR16","unstructured":"Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Hunt, G.C. (ed.), Proceedings of 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS) (2007)"},{"key":"804_CR17","doi-asserted-by":"crossref","unstructured":"Chang, E.-C., Xu, J.: Remote integrity check with dishonest storage server. In: Proceedings of 13th European Symposium Research in Computer Security (ESORICS\u201908), pp. 223\u2013237 (2008)","DOI":"10.1007\/978-3-540-88313-5_15"},{"key":"804_CR18","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.jnca.2013.09.016","volume":"40","author":"Darren Quick","year":"2014","unstructured":"Quick, Darren, Choo, Kim-Kwang Raymond: Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40, 179\u2013193 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"804_CR19","volume-title":"Cloud Storage Forensics","author":"D Quick","year":"2013","unstructured":"Quick, D., Martini, B., Choo, K.K.R.: Cloud Storage Forensics. Syngress Publishing, Elsevier, Waltham (2013)"},{"issue":"2","key":"804_CR20","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Dynamic audit services for outsourced storage in clouds. IEEE Trans. Serv. Comput. 6(2), 227\u2013238 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"804_CR21","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V Daza","year":"2009","unstructured":"Daza, V., Domingo-Ferrer, J., Seb, F., Viejo, A.: Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 58(4), 1876\u20131886 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"804_CR22","doi-asserted-by":"crossref","unstructured":"Gamage, C., Gras, B., Tanenbaum, A.S.: An identity-based ring signature scheme with enhanced privacy. In: Proceedings of IEEE SecureComm Conference, pp. 1\u20135 (2006)","DOI":"10.1109\/SECCOMW.2006.359554"},{"key":"804_CR23","doi-asserted-by":"crossref","unstructured":"Chen, L., Morrissey, P., Smart, N.P.: DAA: Fixing the pairing based protocols. Cryptology ePrint Archive: Report 2009\/198. http:\/\/eprint.iacr.org\/2009\/198 . Accessed 10 Dec 2009","DOI":"10.1109\/CINC.2009.116"},{"issue":"4","key":"804_CR24","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1109\/T-WC.2008.080280","volume":"8","author":"Y Jiang","year":"2009","unstructured":"Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular communications using binary authentication tree. IEEE Trans. Wirel. Commun. 8(4), 1974\u20131983 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"804_CR25","doi-asserted-by":"crossref","unstructured":"Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.\u00d8.: On the practicality of short signature batch verification. http:\/\/eprint.iacr.org\/2008\/015","DOI":"10.1007\/978-3-642-00862-7_21"},{"key":"804_CR26","doi-asserted-by":"crossref","unstructured":"Gritti(B), C., Susilo, W., Plantard, T.: Efficient dynamic provable data possession with public verifiability and data privacy. In: ACISP 2015, LNCS 9144, pp. 395\u2013412 (2015)","DOI":"10.1007\/978-3-319-19962-7_23"},{"key":"804_CR27","doi-asserted-by":"crossref","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: EUROCRYPT. LNCS, vol. 1070, pp. 387\u2013398 (1996)","DOI":"10.1007\/3-540-68339-9_33"},{"key":"804_CR28","doi-asserted-by":"crossref","unstructured":"Goh, E.-J., Jarecki, S.: A signature scheme as secure as the Diffie\u2013Hellman problem. In: EUROCRYPT. LNCS, vol. 2656, pp. 401\u2013415 (2003)","DOI":"10.1007\/3-540-39200-9_25"},{"key":"804_CR29","doi-asserted-by":"crossref","unstructured":"Yu, Y. Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., Min, G.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensic Secur. 12, 767\u2013778 (2017)","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"804_CR30","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: CODASPY\u201911, ACM, pp. 237\u2013248 (2011)","DOI":"10.1145\/1943513.1943546"},{"key":"804_CR31","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.4028\/www.scientific.net\/KEM.439-440.1265","volume":"439\u2013440","author":"JH Zhang","year":"2010","unstructured":"Zhang, J.H., Chen, H., Yang, Y.X.: Efficient blind signature scheme based on modified generalized bilinear inversion. Key Eng. Mater. 439\u2013440, 1265\u20131270 (2010)","journal-title":"Key Eng. Mater."},{"issue":"10","key":"804_CR32","doi-asserted-by":"crossref","first-page":"2760","DOI":"10.1109\/TPDS.2013.199","volume":"25","author":"Jianbing Ni","year":"2014","unstructured":"Ni, Jianbing, Yong, Yu., Yi, Mu, Xia, Qi: On the security of an efficient dynamic auditing protocol in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(10), 2760\u20132761 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"804_CR33","first-page":"1234-123","volume":"E84\u2013A","author":"A Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. E84\u2013A(5), 1234-123 (2001)","journal-title":"IEICE Trans. Fundam."},{"issue":"5","key":"804_CR34","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0804-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0804-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0804-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:46:02Z","timestamp":1750031162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0804-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,3]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["804"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0804-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,3,3]]}}}