{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:45:33Z","timestamp":1761709533670,"version":"3.41.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T00:00:00Z","timestamp":1532995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key R&D Program of China","award":["2016YFB0800402"],"award-info":[{"award-number":["2016YFB0800402"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61232004"],"award-info":[{"award-number":["No.61232004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11227-018-2504-5","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T05:08:43Z","timestamp":1533013723000},"page":"5903-5926","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A framework with data-centric accountability and auditability for cloud storage"],"prefix":"10.1007","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5848-1519","authenticated-orcid":false,"given":"Hao","family":"Jin","sequence":"first","affiliation":[]},{"given":"Ke","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,31]]},"reference":[{"key":"2504_CR1","unstructured":"Amazon (2008) Amazon s3 availability event. https:\/\/aws.amazon.com\/cn\/message\/41926\/"},{"key":"2504_CR2","unstructured":"Francisco P (2014) Ipad\u2019s security breach. http:\/\/www.linkedin.com\/pulse\/20140817183007-68332546-ipad-s-security-breach\/"},{"key":"2504_CR3","unstructured":"Jordi G (2016) Linkedin data leakage: change your password now. http:\/\/www.linkedin.com\/pulse\/linkedin-data-leakage-change-your-password-now-jordi-gili\/"},{"issue":"5","key":"2504_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"KM Khan","year":"2010","unstructured":"Khan KM, Malluhi Q (2010) Establishing trust in cloud computing. IT Prof 12(5):20\u201327","journal-title":"IT Prof"},{"issue":"1","key":"2504_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69\u201373","journal-title":"IEEE Internet Comput"},{"issue":"4","key":"2504_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stocia I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"issue":"5","key":"2504_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MC.2010.134","volume":"43","author":"MS Lund","year":"2010","unstructured":"Lund MS, Bjornar S, Ketil S (2010) Evolution in relation to risk and trust management. Computer 43(5):49\u201355","journal-title":"Computer"},{"key":"2504_CR8","unstructured":"Blaze M, Joan F, Jack L (1996) Decentralized trust management. In: Security and Privacy, pp 164\u2013173"},{"key":"2504_CR9","doi-asserted-by":"crossref","unstructured":"Wang Y, Julita V (2003) Bayesian network-based trust model. In: IEEE International Conference on Web Intelligence, pp 372\u2013378","DOI":"10.1109\/WI.2003.1241218"},{"key":"2504_CR10","first-page":"69","volume-title":"Lecture Notes in Computer Science","author":"Wenjuan Li","year":"2009","unstructured":"Li W, Lingdi P (2009) Trust model to enhance security and interoperability of cloud environment. In: Cloud Computing, pp 69\u201379"},{"key":"2504_CR11","first-page":"284","volume-title":"Lecture Notes in Computer Science","author":"Matt Blaze","year":"2003","unstructured":"Blaze M, John I, Keromytis A (2003) Experience with the keynote trust management system: applications and future directions. In: Trust Management, pp 1071\u20131087"},{"key":"2504_CR12","unstructured":"Liu Z, Joy AW, Thompson RA (2004) A dynamic trust model for mobile ad hoc networks. In: Proceedings of the 10th IEEE International Workshop on Future Trends, pp 80\u201385"},{"key":"2504_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120\u2013134","journal-title":"J Netw Comput Appl"},{"key":"2504_CR14","unstructured":"Urquhart J (2009) The biggest cloud-computing issue of 2009 is trust. http:\/\/news.cnet.com\/8301-19413_3-10133487-240.html"},{"key":"2504_CR15","doi-asserted-by":"crossref","unstructured":"Conner W, Iyengar A, Mikalsen T, Rouvellou I, Nahrstedt K (2009) A trust management framework for service-oriented environments. In: Proceedings of the 18th International Conference on World Wide Web, pp 891\u2013900","DOI":"10.1145\/1526709.1526829"},{"key":"2504_CR16","doi-asserted-by":"crossref","unstructured":"Alhamad M, Tharam D, Elizabeth C (2010) SLA-based trust model for cloud computing. In: Proceedings of the 13th International Conference on Network-Based Information Systems, pp 321\u2013324","DOI":"10.1109\/NBiS.2010.67"},{"key":"2504_CR17","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-642-25535-9_22","volume-title":"Service-Oriented Computing","author":"Talal H. Noor","year":"2011","unstructured":"Noor TH, Sheng QZ (2011) Credibility-based trust management for services in cloud environments. In: Kappel G, Maamar Z, Motahari-Nezhad HR (eds) Service-oriented computing. ICSOC 2011. Lecture Notes in Computer Science, vol 7084. Springer, Berlin, Heidelberg, pp 328\u2013343"},{"key":"2504_CR18","first-page":"1062","volume":"01","author":"S Wang","year":"2008","unstructured":"Wang S, Zhang L, Ma N, Wang S (2008) An evaluation approach of subjective trust based on cloud model. J Softw Eng Appl 01:1062\u20131068","journal-title":"J Softw Eng Appl"},{"key":"2504_CR19","unstructured":"Goh E-J, Shacham H, Modadugu N, Boneh D (2003) SiRiUS: securing remote untrusted storage. In: Proceedings of the 7th Network and Distributed System Security Symposium (NDSS\u201903), pp 131\u2013145"},{"key":"2504_CR20","unstructured":"Popa RA, Lorch JR, Molnar D, Wang HJ, Zhuang L (2011) Enabling security in cloud storage slas with cloudproof. In: USENIX Annual Technical Conference (ATC\u201911), vol 242, pp 55\u2013368"},{"key":"2504_CR21","unstructured":"Buchty R, Heintze N, Oliva D (2014) Cryptonite\u2014a programmable crypto processor architecture for high-bandwidth applications. In: International Conference on Architecture of Computing Systems, pp 184\u2013198"},{"key":"2504_CR22","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.future.2016.06.013","volume":"80","author":"H Jin","year":"2018","unstructured":"Jin H, Zhou K, Jiang H, Lei D, Wei R, Li C (2018) Full integrity and freshness for cloud data. Future Gener Comput Syst 80:640\u2013652","journal-title":"Future Gener Comput Syst"},{"key":"2504_CR23","unstructured":"C Alliance (2011) Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance"},{"key":"2504_CR24","doi-asserted-by":"crossref","unstructured":"Ryan KLK, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang Q, Lee BS (2011) Trustcloud: a framework for accountability and trust in cloud computing, In: World congress on services, IEEE, Washington, DC, pp 584\u2013588","DOI":"10.1109\/SERVICES.2011.91"},{"key":"2504_CR25","unstructured":"Yumerefendi AR, Chase JS (2005) The role of accountability in dependable distributed systems. In: Proceedings of HotDep, vol 5, pp 3\u20138"},{"issue":"6","key":"2504_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2004.17","volume":"37","author":"BW Lampson","year":"2004","unstructured":"Lampson BW (2004) Computer security in the real world. Computer 37(6):37\u201346","journal-title":"Computer"},{"key":"2504_CR27","unstructured":"Yumerefendi AR, Chase JS (2004) Trust but verify: accountability for network services. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop. ACM, pp 37\u201342"},{"issue":"4","key":"2504_CR28","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MIC.2011.98","volume":"15","author":"S Pearson","year":"2011","unstructured":"Pearson S (2011) Toward accountability in the cloud. IEEE Internet Comput 15(4):64\u201369","journal-title":"IEEE Internet Comput"},{"key":"2504_CR29","unstructured":"Ko RK, Lee BS, Pearson S (2011) Towards achieving accountability, auditability and trust in cloud computing. In: International Conference on Advances in Computing and Communications. Springer, pp 432\u2013444"},{"key":"2504_CR30","unstructured":"Schneier B, Kelsey J (1998) Cryptographic support for secure logs on untrusted machines. In: USENIX Security Symposium, vol 98, pp 53\u201362"},{"key":"2504_CR31","unstructured":"Peterson ZN, Burns RC, Ateniese G, Bono S (2007) Design and implementation of verifiable audit trails for a versioning file system. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST\u201907), vol 7, p 20"},{"key":"2504_CR32","unstructured":"Maniatis P, Baker M (2002) Enabling the archival storage of signed documents. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, pp 3\u201317"},{"key":"2504_CR33","unstructured":"Maniatis P, Baker M (2002) Secure history preservation through timeline entanglement. arXiv preprint arXiv:cs\/0202005"},{"key":"2504_CR34","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"Dan Boneh","year":"2005","unstructured":"Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology (CRYPTO\u201905), pp 258\u2013275"},{"key":"2504_CR35","unstructured":"Fu K, Kamara S, Kohno T (2006) Key regression: enabling efficient key distribution for secure distributed storage. In: Computer Science Department Faculty Publication Series, pp 110\u2013149"},{"key":"2504_CR36","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/11863908_21","volume-title":"Computer Security \u2013 ESORICS 2006","author":"Michael Backes","year":"2006","unstructured":"Backes M, Cachin C, Oprea A (2006) Secure key-updating for lazy revocation. In: European Symposium on Research in Computer Security (ESORICS\u201906), pp 327\u2013346"},{"issue":"1","key":"2504_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1502777.1502779","volume":"5","author":"D Ma","year":"2009","unstructured":"Ma D, Tsudik G (2009) A new approach to secure logging. ACM Trans Storage 5(1):1\u201321","journal-title":"ACM Trans Storage"},{"issue":"2","key":"2504_CR38","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/317087.317089","volume":"2","author":"B Schneier","year":"1999","unstructured":"Schneier B, Kelsey J (1999) Secure audit logs to support computer forensics. ACM Trans Inf Syst Secur 2(2):159\u2013176","journal-title":"ACM Trans Inf Syst Secur"},{"key":"2504_CR39","first-page":"1","volume":"2612","author":"M Bellare","year":"2003","unstructured":"Bellare M, Bennet Y (2003) Forward-security in private-key cryptography. CT-RSA 2612:1\u201318","journal-title":"CT-RSA"},{"key":"2504_CR40","unstructured":"Holt JE (2006) Logcrypt: forward security and public verification for secure audit logs. In: Proceedings of the 2006 Australasian Workshops on Grid Computing and E-Research, pp 203\u2013211"},{"key":"2504_CR41","unstructured":"Castro M, Barbara L (1999) Practical byzantine fault tolerance. In: Proceedings of the Symposium on Operating Systems Design and Implementation, pp 173\u2013186"},{"issue":"5","key":"2504_CR42","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1145\/1165389.945470","volume":"37","author":"J Yin","year":"2003","unstructured":"Yin J, Martin J-P, Venkataramani A, Alvisi L, Dahlin M (2003) Separating agreement from execution for byzantine fault tolerant services. ACM SIGOPS Oper Syst Rev 37(5):253\u2013267","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"2504_CR43","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski\u00a0Jr BS (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS\u201907), pp 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"2504_CR44","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS\u201907), pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"2504_CR45","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"Hovav Shacham","year":"2008","unstructured":"Shacham H, Waters B (2008) Compact proofs of retrievability. In: Advances in Cryptology (ASIACRYPT\u201908), pp 90\u2013107"},{"issue":"3","key":"2504_CR46","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/1272998.1273035","volume":"41","author":"H Weatherspoon","year":"2007","unstructured":"Weatherspoon H, Eaton P, Chun B-G, Kubiatowicz J (2007) Antiquity: exploiting a secure log for wide-area distributed storage. ACM SIGOPS Oper Syst Rev 41(3):371\u2013384","journal-title":"ACM SIGOPS Oper Syst Rev"},{"key":"2504_CR47","doi-asserted-by":"crossref","unstructured":"Blaze M (1993) A cryptographic file system for unix. In: Proceedings of the 1st ACM Conference on Computer and Communication Security, pp 9\u201316","DOI":"10.1145\/168588.168590"},{"key":"2504_CR48","unstructured":"Miller EL, Long DD, Freeman WE, Reed B (2002) Strong security for network-attached storage. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST\u201902), pp 1\u201313"},{"key":"2504_CR49","unstructured":"Li J, Krohn MN, Mazi\u00e8res D, Shasha D (2004) Secure untrusted data repository (SUNDR). In: Proceedings of the 6th USENIX Symposium Operating Systems Design and Implementation (OSDI\u201904), pp 121\u2013136"},{"issue":"6","key":"2504_CR50","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1323293.1294279","volume":"41","author":"Andreas Haeberlen","year":"2007","unstructured":"Haeberlen A, Kouznetsov P, Druschel P (2007) Peerreview: practical accountability for distributed systems. In: ACM SIGOPS Operating Systems Review, vol 41(6), pp 175\u2013188","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"3","key":"2504_CR51","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1288783.1288786","volume":"3","author":"AR Yumerefendi","year":"2007","unstructured":"Yumerefendi AR, Chase JS (2007) Strong accountability for network storage. ACM Trans Storage 3(3):11\u201325","journal-title":"ACM Trans Storage"},{"key":"2504_CR52","unstructured":"Backes M, Druschel P, Haeberlen A, Unruh D (2009) CSAR: a practical and provable technique to make randomized systems accountable. In: Proceedings of the 13th Network and Distributed System Security Symposium, vol 9, pp 341\u2013353"},{"key":"2504_CR53","unstructured":"Yavuz AA, Peng N (2009) BAF: an efficient publicly verifiable secure audit logging scheme for distributed systems. In: Proceedings of the Annual Computer Security Applications Conference, pp 219\u2013228"},{"key":"2504_CR54","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-45741-3_8","volume-title":"Computer Security \u2013 ESORICS 2016","author":"Benjamin Dowling","year":"2016","unstructured":"Dowling B, Gnther F, Herath U, Stebila D (2016) Secure logging schemes and certificate transparency. In: Proceedings of the 21st European Symposium on Research in Computer Security, pp 140\u2013158"},{"key":"2504_CR55","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-68637-0_6","volume-title":"Provable Security","author":"Gunnar Hartung","year":"2017","unstructured":"Hartung G, Kaidel B, Koch A, Koch J, Hartmann D (2017) Practical and robust secure logging from fault-tolerant sequential aggregate signatures. In: International Conference on Provable Security, pp 87\u2013106"},{"key":"2504_CR56","doi-asserted-by":"crossref","unstructured":"Marty R (2011) Cloud application logging for forensics. In: Proceedings of the ACM Symposium on Applied Computing (SAC\u201911). ACM, pp 178\u2013184","DOI":"10.1145\/1982185.1982226"},{"key":"2504_CR57","unstructured":"Dominik B, Christoph W (2011) Technical issues of forensic investigations in cloud computing environments. In: IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, pp 1\u201310"},{"key":"2504_CR58","doi-asserted-by":"crossref","unstructured":"Zawoad S, Dutta AK, Hasan R (2013) SecLaaS: secure logging-as-a-service for cloud forensics. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. Ser. ASIA CCS\u201913. ACM, pp 219\u2013230","DOI":"10.1145\/2484313.2484342"},{"issue":"2","key":"2504_CR59","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TDSC.2015.2482484","volume":"13","author":"S Zawoad","year":"2016","unstructured":"Zawoad S, Dutta AK, Hasan R (2016) Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans Dependable Secur Comput 13(2):148\u2013162","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"2504_CR60","unstructured":"Standard (2002) Secure hash, Fips pub 180-2. National Institute of Standards and Technology, Gaithersburg"},{"key":"2504_CR61","doi-asserted-by":"crossref","unstructured":"Rogaway P, Thomas S (2004) Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Fast Software Encryption. Springer, pp 258\u2013275","DOI":"10.1007\/978-3-540-25937-4_24"},{"issue":"2","key":"2504_CR62","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"G Shafi","year":"1988","unstructured":"Shafi G, Silvio M, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281\u2013308","journal-title":"SIAM J Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2504-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2504-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2504-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T03:47:24Z","timestamp":1751773644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2504-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,31]]},"references-count":62,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["2504"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2504-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,7,31]]},"assertion":[{"value":"31 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}