{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:35Z","timestamp":1759133495830,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2017,4,29]],"date-time":"2017-04-29T00:00:00Z","timestamp":1493424000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501333","61572379"],"award-info":[{"award-number":["61501333","61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11227-017-2061-3","type":"journal-article","created":{"date-parts":[[2017,4,29]],"date-time":"2017-04-29T07:22:30Z","timestamp":1493450550000},"page":"4923-4930","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security analysis of a publicly verifiable data possession scheme for remote storage"],"prefix":"10.1007","volume":"73","author":[{"given":"Zhiyan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Libing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,29]]},"reference":[{"issue":"8","key":"2061_CR1","doi-asserted-by":"crossref","first-page":"2911","DOI":"10.1007\/s11227-015-1394-z","volume":"72","author":"W Zhang","year":"2016","unstructured":"Zhang W, Lu G, He H, Zhang Q, Yu C (2016) Exploring large-scale small file storage for search engines. J Supercomput 72(8):2911\u20132923","journal-title":"J Supercomput"},{"issue":"2","key":"2061_CR2","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"12","key":"2061_CR3","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forens Secur 11(12):2706\u20132716","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2061_CR4","doi-asserted-by":"publisher","unstructured":"Fu Z, Huang F, Sun X, Vasilakos A, Yang C-N (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. doi:\n                        10.1109\/TSC.2016.2622697","DOI":"10.1109\/TSC.2016.2622697"},{"issue":"1","key":"2061_CR5","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu. J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"issue":"11","key":"2061_CR6","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forens Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"17","key":"2061_CR7","doi-asserted-by":"crossref","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002\u20134012","journal-title":"Secur Commun Netw"},{"key":"2061_CR8","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 598\u2013609. ACM","DOI":"10.1145\/1315245.1315318"},{"key":"2061_CR9","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski Jr BS (2007) PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 584\u2013597. ACM","DOI":"10.1145\/1315245.1315317"},{"key":"2061_CR10","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 proceedings IEEE on Infocom, pp 1\u20139. IEEE","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"1","key":"2061_CR11","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D (2011) Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC) 14(1):12","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"2061_CR12","doi-asserted-by":"crossref","unstructured":"Tate SR, Vishwanathan R, Everhart L (2013) Multi-user dynamic proofs of data possession using trusted hardware. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp 353\u2013364. ACM","DOI":"10.1145\/2435349.2435400"},{"issue":"9","key":"2061_CR13","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Tran Parallel Distrib Syst 24(9):1717\u20131726","journal-title":"IEEE Tran Parallel Distrib Syst"},{"issue":"5","key":"2061_CR14","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1016\/j.compeleceng.2013.10.004","volume":"40","author":"SG Worku","year":"2014","unstructured":"Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40(5):1703\u20131713","journal-title":"Comput Electr Eng"},{"issue":"1","key":"2061_CR15","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TCC.2014.2378794","volume":"5","author":"W Zhang","year":"2015","unstructured":"Zhang W, Xie H, Hsu R (2015) Automatic memory control of multiple virtual machines on a consolidated server. IEEE Trans Cloud Comput 5(1):2\u201314","journal-title":"IEEE Trans Cloud Comput"},{"key":"2061_CR16","doi-asserted-by":"publisher","unstructured":"Tang CM, Zhang XJ (2015) A new publicly verifiable data possession on remote storage. J Supercomput 1\u201315. doi:\n                        10.1007\/s11227-015-1556-z","DOI":"10.1007\/s11227-015-1556-z"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-017-2061-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2061-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-017-2061-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T05:36:51Z","timestamp":1508305011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-017-2061-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,29]]},"references-count":16,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["2061"],"URL":"https:\/\/doi.org\/10.1007\/s11227-017-2061-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2017,4,29]]}}}