{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:39:30Z","timestamp":1771025970710,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T00:00:00Z","timestamp":1599091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T00:00:00Z","timestamp":1599091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472429"],"award-info":[{"award-number":["61472429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836209"],"award-info":[{"award-number":["U1836209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10586-020-03174-3","type":"journal-article","created":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T13:02:56Z","timestamp":1599138176000},"page":"2467-2478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A collective attestation scheme towards cloud system"],"prefix":"10.1007","volume":"26","author":[{"given":"Yuan","family":"Song","sequence":"first","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,3]]},"reference":[{"issue":"1","key":"3174_CR1","doi-asserted-by":"publisher","first-page":"e2931","DOI":"10.1002\/ett.2931","volume":"28","author":"R Petrolo","year":"2017","unstructured":"Petrolo, R., Loscri, V., Mitton, N., et al.: Towards a smart city based on cloud of things, a survey on the smart city vision and paradigms[C]. Trans. Emerg. Telecommun. Technol. 28(1), e2931 (2017)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"1","key":"3174_CR2","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.tele.2016.05.008","volume":"34","author":"SJ Miah","year":"2017","unstructured":"Miah, S.J., Hasan, J., John, G.: On-cloud healthcare clinic: an e-health consultancy approach for remote communities in a developing country. Telematics Inform. 34(1), 311\u2013322 (2017)","journal-title":"Telematics Inform."},{"issue":"1","key":"3174_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCE.2016.7448556","volume":"62","author":"YT Lee","year":"2016","unstructured":"Lee, Y.T., Hsiao, W.H., Huang, C.M., et al.: An integrated cloud-based smart home management system with community hierarchy. IEEE Trans. Consum. Electron. 62(1), 1\u20139 (2016)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"5","key":"3174_CR4","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1007\/s11227-016-1906-5","volume":"73","author":"E Ever","year":"2017","unstructured":"Ever, E.: Performability analysis of cloud computing centers with large numbers of servers. J. Supercomput. 73(5), 2130\u20132156 (2017)","journal-title":"J. Supercomput."},{"issue":"2","key":"3174_CR5","first-page":"122","volume":"6","author":"V Shukla","year":"2018","unstructured":"Shukla, V., Jain, A.: Design and analysis of high speed optical routers for next generation data centre network. J. Eng. Res. 6(2), 122\u2013137 (2018)","journal-title":"J. Eng. Res."},{"issue":"7589","key":"3174_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1038\/530144a","volume":"530","author":"MM Waldrop","year":"2016","unstructured":"Waldrop, M.M.: The chips are down for Moore\u2019s law. Nature 530(7589), 144\u2013147 (2016)","journal-title":"Nature"},{"key":"3174_CR7","unstructured":"Xiao, Y., Zhang, X., Zhang, Y., et al. One bit flips, one cloud flops: cross-VM row hammer attacks and privilege escalation. USENIX security symposium, pp. 19\u201335 (2016)."},{"key":"3174_CR8","doi-asserted-by":"crossref","unstructured":"Liao, X., Alrwais, S., Yuan, K., et al. Lurking malice in the cloud: understanding and detecting cloud repository as a malicious service. In: Computer and communications security, pp. 1541\u20131552 (2016).","DOI":"10.1145\/2976749.2978349"},{"key":"3174_CR9","unstructured":"Tak, B.C., Isci, C., Duri, S.S., et al. Understanding security implications of using containers in the cloud. USENIX annual technical conference, pp. 313\u2013319 (2017)."},{"key":"3174_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","volume":"74","author":"AS Sohal","year":"2018","unstructured":"Sohal, A.S., Sandhu, R., Sood, S.K., et al.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340\u2013354 (2018)","journal-title":"Comput. Secur."},{"key":"3174_CR11","unstructured":"Cloud Security Alliance. Top threats to cloud computing: egregious eleven. https:\/\/cloudsecurityalliance.org\/artifacts\/top-threats-to-cloud-computing-egregious-eleven, 2019-08-06\/2020-07-08."},{"key":"3174_CR12","unstructured":"Asha, B. Alteryx S3 leak leaves 123m American households exposed. https:\/\/www.zdnet.com\/article\/alteryx-s3-leak-leaves-120m-american-households-exposed\/. 2017-12-19\/2020-07-08."},{"issue":"11","key":"3174_CR13","doi-asserted-by":"publisher","first-page":"5746","DOI":"10.1007\/s11227-017-2054-2","volume":"74","author":"T Ali","year":"2018","unstructured":"Ali, T., Ismail, R., Musa, S., et al.: Design and implementation of an attestation protocol for measured dynamic behavior. J. Supercomput. 74(11), 5746\u20135773 (2018)","journal-title":"J. Supercomput."},{"key":"3174_CR14","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R. et al. Towards trusted cloud computing. In: IEEE international conference on cloud computing technology and science, pp. 1\u20135 (2009)."},{"key":"3174_CR15","unstructured":"Partha, S., Pritam, S., Sunirmal, K. A distributed approach towards trusted cloud computing platform. In: Applications and innovations in mobile computing, pp. 146\u2013151 (2005)."},{"key":"3174_CR16","doi-asserted-by":"crossref","unstructured":"Asokan, N., Brasser, F., Ibrahim, A., et al. SEDA: scalable embedded device attestation. In: Computer and communications security, pp. 964\u2013975 (2015).","DOI":"10.1145\/2810103.2813670"},{"issue":"5","key":"3174_CR17","doi-asserted-by":"publisher","first-page":"12459","DOI":"10.1007\/s10586-017-1657-y","volume":"22","author":"A Stephen","year":"2019","unstructured":"Stephen, A., Benedict, S., Kumar, R.P., et al.: Monitoring IaaS using various cloud monitors. Cluster Comput. 22(5), 12459\u201312471 (2019)","journal-title":"Cluster Comput."},{"issue":"3","key":"3174_CR18","doi-asserted-by":"publisher","first-page":"6927","DOI":"10.1007\/s10586-018-1805-z","volume":"22","author":"V Balasubramanian","year":"2019","unstructured":"Balasubramanian, V., Mala, T.: Cloud data integrity checking using bilinear pairing and network coding. Cluster Comput. 22(3), 6927\u20136935 (2019)","journal-title":"Cluster Comput."},{"issue":"5","key":"3174_CR19","doi-asserted-by":"publisher","first-page":"10789","DOI":"10.1007\/s10586-017-1176-x","volume":"22","author":"K Vijayakumar","year":"2019","unstructured":"Vijayakumar, K., Arun, C.: Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. Cluster Comput. 22(5), 10789\u201310800 (2019)","journal-title":"Cluster Comput."},{"issue":"1","key":"3174_CR20","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s10586-017-0877-5","volume":"21","author":"T Ali","year":"2018","unstructured":"Ali, T., Nauman, M., Jan, S., et al.: Trust in IoT: dynamic remote attestation through efficient ehaviour capture. Cluster Comput. 21(1), 409\u2013421 (2018)","journal-title":"Cluster Comput."},{"key":"3174_CR21","unstructured":"Nunes, I.O., Dessouky, G., Ibrahim, A., et al. Towards systematic design of collective remote attestation protocols. In: International conference on distributed computing systems, pp. 1188\u20131198 (2019)."},{"key":"3174_CR22","doi-asserted-by":"crossref","unstructured":"Ibrahim, A. Collective attestation: for a stronger security in embedded networks. In: Symposium on reliable distributed systems, pp. 267\u2013268 (2018).","DOI":"10.1109\/SRDS.2018.00039"},{"key":"3174_CR23","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.cose.2018.10.008","volume":"81","author":"H Tan","year":"2019","unstructured":"Tan, H., Tsudik, G., Jha, S., et al.: MTRA: multi-tier randomized remote attestation in IoT networks. Comput Secur 81, 78\u201393 (2019)","journal-title":"Comput Secur"},{"key":"3174_CR24","doi-asserted-by":"publisher","first-page":"3123","DOI":"10.1109\/TIFS.2020.2983282","volume":"15","author":"E Dushku","year":"2020","unstructured":"Dushku, E., et al.: SARA: Secure asynchronous remote attestation for IoT systems. IEEE Trans. Inf. Forensics Secur. 15, 3123\u20133136 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3174_CR25","unstructured":"Sailer, R., Zhang, X., Jaeger, T., et al. Design and implementation of a TCG-based integrity measurement architecture. USENIX security symposium, pp. 16\u201316 (2004)."},{"issue":"5","key":"3174_CR26","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1002\/cpe.3273","volume":"27","author":"B Xing","year":"2015","unstructured":"Xing, B., Han, Z., Chang, X., et al.: OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurr. Comput. 27(5), 1092\u20131109 (2015)","journal-title":"Concurr. Comput."},{"issue":"10","key":"3174_CR27","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1016\/j.jss.2010.05.071","volume":"83","author":"K Shim","year":"2010","unstructured":"Shim, K.: An ID-based aggregate signature scheme with constant pairing computations. J. Syst. Softw. 83(10), 1873\u20131880 (2010)","journal-title":"J. Syst. Softw."},{"key":"3174_CR28","doi-asserted-by":"crossref","unstructured":"Schuster, F., Costa, M., Fournet, C., et al. VC3: Trustworthy data analytics in the cloud using SGX. In: IEEE symposium on security and privacy, pp. 38\u20135, (2015).","DOI":"10.1109\/SP.2015.10"},{"key":"3174_CR29","unstructured":"Hua, Z., Gu, J., Xia, Y., et al. vTZ: virtualizing {ARM} TrustZone. USENIX security symposium, pp. 541\u2013556 2017()."},{"issue":"3","key":"3174_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann, A., Peinado, M., Hunt, G.C., et al.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. 33(3), 1\u201326 (2015)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"3174_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TCAD.2017.2750067","volume":"37","author":"J Wang","year":"2018","unstructured":"Wang, J., Hong, Z., Zhang, Y., et al.: Enabling security-enhanced attestation with intel SGX for remote terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1), 88\u201396 (2018)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"3174_CR32","unstructured":"Arnautov, S., Trach, B., Gregor, F., et al. SCONE: secure Linux containers with Intel SGX. Operating systems design and implementation, pp. 689\u2013703 (2016)."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03174-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03174-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03174-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T20:20:10Z","timestamp":1693081210000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-020-03174-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,3]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["3174"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03174-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,3]]},"assertion":[{"value":"21 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}