{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T19:14:13Z","timestamp":1743275653310},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T00:00:00Z","timestamp":1449532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"doctorial foundation under grant","award":["2014JY170"],"award-info":[{"award-number":["2014JY170"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11042-015-3139-7","type":"journal-article","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T03:21:37Z","timestamp":1449631297000},"page":"19411-19428","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Cryptanalysis and improvement of Panda - public auditing for shared data in cloud and internet of things"],"prefix":"10.1007","volume":"76","author":[{"given":"Tonghao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hengjun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junquan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,8]]},"reference":[{"issue":"4","key":"3139_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A et al (2010) A view of cloud computing. Commun ACM 53(4):50\u20138","journal-title":"Commun ACM"},{"key":"3139_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In Proc CCS\u201907, Alexandria, VA 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"3139_CR3","doi-asserted-by":"crossref","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Proc EUROCRYPT\u201998, Springer-Verlag 127\u201344","DOI":"10.1007\/BFb0054122"},{"issue":"4","key":"3139_CR4","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17(4):297\u2013319","journal-title":"J Cryptol"},{"key":"3139_CR5","doi-asserted-by":"crossref","unstructured":"Che L, Shahidehpour M, Alabdulwahab A, Al-Turki Y (2015) Hierarchical coordination of a community microgrid with AC and DC microgrids. IEEE Trans Smart Grid","DOI":"10.1109\/TSG.2015.2398853"},{"key":"3139_CR6","unstructured":"Che L, Zhang X, Shahidehpour M, Alabdulwahab A, Abusorrah A (2015) Optimal interconnection planning of community microgrids with renewable energy sources. IEEE Trans Smart Grid"},{"key":"3139_CR7","doi-asserted-by":"crossref","unstructured":"Chen Z, Huang W, Lv Z (2016) Towards a face recognition method based on uncorrelated discriminant sparse preserving projection. Multimed Tools Appl","DOI":"10.1007\/s11042-015-2882-0"},{"key":"3139_CR8","unstructured":"Dang S, Kakimzhanov R, Zhang M et al (2014) Smart grid-oriented graphical user interface design and data processing algorithm proposal based on LabVIEW. Environ Electr Eng (EEEIC) 14th Int Conf IEEE 323\u2013327"},{"key":"3139_CR9","doi-asserted-by":"crossref","unstructured":"Gu W, Lv Z, Hao M (2016) Change detection method for remote sensing images based on an improved Markov random field. Multimed Tools Appl","DOI":"10.1007\/s11042-015-2960-3"},{"issue":"15","key":"3139_CR10","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1016\/j.comnet.2011.06.027","volume":"55","author":"D Jiang","year":"2011","unstructured":"Jiang D, Xu Z, Chen Z et al (2011) Joint time\u2013frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533\u20133547","journal-title":"Comput Netw"},{"key":"3139_CR11","doi-asserted-by":"crossref","unstructured":"Jiang D, Xu Z, Li W, Yao C, Lv Z, Li T (2015) An energy-efficient multicast algorithm with maximum network throughput in multi-hop wireless networks. J Commun Netw","DOI":"10.1109\/JCN.2016.000101"},{"issue":"6","key":"3139_CR12","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.compeleceng.2011.06.009","volume":"37","author":"D Jiang","year":"2011","unstructured":"Jiang D, Xu Z, Xu H et al (2011) An approximation method of origin\u2013destination flow traffic from link load counts. Comput Electr Eng 37(6):1106\u20131121","journal-title":"Comput Electr Eng"},{"key":"3139_CR13","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.jnca.2013.09.014","volume":"40","author":"D Jiang","year":"2014","unstructured":"Jiang D, Xu Z, Zhang P, Zhu T (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl 40:292\u2013306","journal-title":"J Netw Comput Appl"},{"key":"3139_CR14","unstructured":"Jiang D, Ying X, Han Y et al (2015) Collaborative multi-hop routing in cognitive wireless networks. Wirel Pers Commun 1\u201323"},{"key":"3139_CR15","doi-asserted-by":"crossref","unstructured":"Juels A and Kaliski BS (2007) Pors: proofs of retrievability for large files. In Proc CCS\u201907, Alexandria, VA 584\u201397","DOI":"10.1145\/1315245.1315317"},{"key":"3139_CR16","doi-asserted-by":"crossref","unstructured":"Li X, Lv Z, Hu J, et al (2015) Traffic management and forecasting system based on 3D GIS. 2015 15th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE","DOI":"10.1109\/CCGrid.2015.62"},{"issue":"8","key":"3139_CR17","doi-asserted-by":"crossref","first-page":"20925","DOI":"10.3390\/s150820925","volume":"15","author":"Y Lin","year":"2015","unstructured":"Lin Y, Yang J, Lv Z et al (2015) A self-assessment stereo capture model applicable to the internet of things. Sensors 15(8):20925\u201320944","journal-title":"Sensors"},{"key":"3139_CR18","doi-asserted-by":"crossref","unstructured":"S Liu, W Fu, L He et al (2015) Distribution of primary additional errors in fractal encoding method [J]. Multimed Tools Appl","DOI":"10.1007\/s11042-014-2408-1"},{"key":"3139_CR19","doi-asserted-by":"crossref","unstructured":"S Liu, Z Zhang, L Qi et al (2015) A fractal image encoding method based on statistical loss used in agricultural image compression [J]. Multimed Tools Appl","DOI":"10.1007\/s11042-014-2446-8"},{"key":"3139_CR20","doi-asserted-by":"crossref","unstructured":"Lv Z, Halawani A, Fen S et al (2015) Touch-less interactive augmented reality game on vision based wearable device. Pers Ubiquit Comput","DOI":"10.1007\/s00779-015-0844-1"},{"issue":"1s","key":"3139_CR21","first-page":"10","volume":"11","author":"Z Lv","year":"2014","unstructured":"Lv Z, Halawani A, Feng S et al (2014) Multimodal hand and foot gesture interaction for handheld devices. ACM Trans Multimed Comput Commun Appl (TOMM) 11(1s):10","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"issue":"3","key":"3139_CR22","doi-asserted-by":"crossref","first-page":"57990","DOI":"10.1371\/journal.pone.0057990","volume":"8","author":"Z Lv","year":"2013","unstructured":"Lv Z, Tek A, Da Silva F et al (2013) Game on, science-how video game technology may help biologists tackle visualization challenges. PLoS One 8(3):57990","journal-title":"PLoS One"},{"issue":"7","key":"3139_CR23","first-page":"990","volume":"6","author":"Z Lv","year":"2011","unstructured":"Lv Z, Yin T, Han Y, Chen Y et al (2011) WebVR\u2014web virtual reality engine based on P2P network. J Netw 6(7):990\u2013998","journal-title":"J Netw"},{"key":"3139_CR24","doi-asserted-by":"crossref","unstructured":"Ou W, Lv Z, Xie Z (2015) Spatially regularized latent topic model for simultaneous object discovery and segmentation. The 2015 I.E. International Conference on Systems, Man, and Cybernetics (SMC2015). IEEE","DOI":"10.1109\/SMC.2015.511"},{"key":"3139_CR25","doi-asserted-by":"crossref","unstructured":"Shacham H, Waters B (2008) Compact proofs of retrievability. Proc ASIACRYPT\u201908 Springer-Verlag 90\u2013107","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"3139_CR26","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cag.2015.07.019","volume":"54","author":"T Su","year":"2016","unstructured":"Su T, Wang W, Lv Z et al (2016) Rapid Delaunay triangulation for randomly distributed point cloud data using adaptive Hilbert curve. Comput Graph 54:65\u201374","journal-title":"Comput Graph"},{"key":"3139_CR27","first-page":"353","volume":"13","author":"SR Tate","year":"2013","unstructured":"Tate SR, Vishwanathan R, Everhart L (2013) Multi-user dynamic proofs of data possession using trusted hardware. Proc ACM CODASPY 13:353\u201364","journal-title":"Proc ACM CODASPY"},{"key":"3139_CR28","first-page":"124","volume":"13","author":"B Wang","year":"2013","unstructured":"Wang B, Chow SS, Li M, Li H (2013) Storing shared data on the cloud via security-mediator. Proc IEEE ICDCS 13:124\u201333","journal-title":"Proc IEEE ICDCS"},{"key":"3139_CR29","first-page":"295","volume":"12","author":"B Wang","year":"2012","unstructured":"Wang B, Li B, Li H (2012) Oruta: privacy-preserving public auditing for shared data in the cloud. Proc IEEE Cloud 12:295\u2013302","journal-title":"Proc IEEE Cloud"},{"key":"3139_CR30","doi-asserted-by":"crossref","unstructured":"Wang B, Li H, Li M (2013) Privacy-preserving public auditing for shared cloud data supporting group dynamics. Proc IEEE ICC\u201913, Budapest, Hungary 1946\u201350","DOI":"10.1109\/ICC.2013.6654808"},{"key":"3139_CR31","first-page":"2904","volume":"13","author":"B Wang","year":"2013","unstructured":"Wang B, Li B, Li H (2013) Public auditing for shared data with efficient user revocation in the cloud. Proc IEEE INFOCOM 13:2904\u201312","journal-title":"Proc IEEE INFOCOM"},{"issue":"1","key":"3139_CR32","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2015","unstructured":"Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92\u2013106","journal-title":"IEEE Trans Serv Comput"},{"key":"3139_CR33","doi-asserted-by":"crossref","unstructured":"Wang Y, Su Y, Agrawal G (2015) A novel approach for approximate aggregations over arrays. Proceedings of the 27th International Conference on Scientific and Statistical Database Management. ACM 4","DOI":"10.1145\/2791347.2791349"},{"issue":"5","key":"3139_CR34","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u201359","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3139_CR35","first-page":"525","volume":"10","author":"C Wang","year":"2010","unstructured":"Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. Proc IEEE INFOCOM 10:525\u201333","journal-title":"Proc IEEE INFOCOM"},{"key":"3139_CR36","doi-asserted-by":"crossref","unstructured":"Wang K et al (2015) Load\u2010balanced and locality\u2010aware scheduling for data\u2010intensive workloads at extreme scales. Concurrency and Computation: Practice and Experience","DOI":"10.1002\/cpe.3617"},{"key":"3139_CR37","doi-asserted-by":"crossref","unstructured":"Wang K et al (2015) Overcoming Hadoop scaling limitations through distributed task execution. Proc IEEE Int Conf Clust Comput","DOI":"10.1109\/CLUSTER.2015.42"},{"key":"3139_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.10.004","author":"SG Worku","year":"2013","unstructured":"Worku SG, Xu C, Zhao J, He X (2013) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng. doi: 10.1016\/j.compeleceng.2013.10.004","journal-title":"Comput Electr Eng"},{"key":"3139_CR39","doi-asserted-by":"crossref","unstructured":"Xu C, He X, Abraha-Weldemariam D (2012) Cryptanalysis of wang\u2019s auditing protocol for data storage security in cloud computing. Proc. ICICA\u201912, Springer-Verlag 422\u201328","DOI":"10.1007\/978-3-642-34041-3_59"},{"issue":"8","key":"3139_CR40","doi-asserted-by":"crossref","first-page":"19618","DOI":"10.3390\/s150819618","volume":"15","author":"J Yang","year":"2015","unstructured":"Yang J, Chen B, Zhou J et al (2015) A low-power and portable biomedical device for respiratory monitoring with a stable power source. Sensors 15(8):19618\u201319632","journal-title":"Sensors"},{"key":"3139_CR41","doi-asserted-by":"crossref","unstructured":"Yang J, He S, Lin Y, Lv Z (2016) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl","DOI":"10.1007\/s11042-015-2967-9"},{"issue":"9","key":"3139_CR42","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717\u201326","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3139_CR43","first-page":"2724","volume":"2014","author":"S Zhang","year":"2014","unstructured":"Zhang S, Jing H (2014) Fast log-Gabor-based nonlocal means image denoising methods. IEEE Int Conf Image Proc (ICIP) 2014:2724\u20132728","journal-title":"IEEE Int Conf Image Proc (ICIP)"},{"key":"3139_CR44","doi-asserted-by":"crossref","first-page":"6798","DOI":"10.1109\/CDC.2013.6760966","volume":"2013","author":"X Zhang","year":"2013","unstructured":"Zhang X, Xu Z, Henriquez C et al (2013) Spike-based indirect training of a spiking neural network-controlled virtual insect. IEEE 52nd Annu Conf Decis Control (CDC) 2013:6798\u20136805","journal-title":"IEEE 52nd Annu Conf Decis Control (CDC)"},{"key":"3139_CR45","doi-asserted-by":"crossref","unstructured":"Zhang S, Zhang X, Ou X (2014) After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud. Proc 9th ACM Symp Inf Comput Commun Sec. ACM 317\u2013328","DOI":"10.1145\/2590296.2590300"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3139-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3139-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3139-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3139-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,28]],"date-time":"2022-05-28T16:18:49Z","timestamp":1653754729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3139-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,8]]},"references-count":45,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["3139"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3139-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,8]]}}}