{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:50Z","timestamp":1740123530754,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572267","61572412"],"award-info":[{"award-number":["61572267","61572412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11227-019-03094-z","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T14:42:31Z","timestamp":1576507351000},"page":"5563-5577","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Comment on \u201cPrivacy-preserving public auditing for non-manager group shared data\u201d"],"prefix":"10.1007","volume":"76","author":[{"given":"Jianli","family":"Bai","sequence":"first","affiliation":[]},{"given":"Rong","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,30]]},"reference":[{"issue":"2012","key":"3094_CR1","first-page":"1","volume":"2007","author":"J Gantz","year":"2012","unstructured":"Gantz J, Reinsel D (2012) The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. IDC iView IDC Anal Future 2007(2012):1\u201316","journal-title":"IDC iView IDC Anal Future"},{"issue":"3","key":"3094_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-015-2874-4","volume":"94","author":"HS Yang","year":"2015","unstructured":"Yang HS, Yoo SJ (2015) A study on smartwork security technology based on cloud computing environment. Wirel Pers Commun 94(3):1\u201310","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"3094_CR3","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362\u2013375","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"3094_CR4","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TIFS.2016.2520886","volume":"11","author":"H Wang","year":"2016","unstructured":"Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165\u20131176","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"3094_CR5","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TIFS.2016.2528500","volume":"11","author":"J Yu","year":"2016","unstructured":"Yu J, Ren K, Wang C (2016) Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans Inf Forensics Secur 11(6):1362\u20131375","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3094_CR6","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TIFS.2019.2922277","volume":"15","author":"P Zhao","year":"2019","unstructured":"Zhao P, Yu J, Zhang H, Qin Z, Wang C (2019) How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans Inf Forensics Secur 15:315\u2013328","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3094_CR7","doi-asserted-by":"publisher","unstructured":"Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Sec Comput. https:\/\/doi.org\/10.1109\/TDSC.2019.2896258","DOI":"10.1109\/TDSC.2019.2896258"},{"key":"3094_CR8","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yu J, Hao R, Wang C, Ren K (2018) Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Sec Comput PP (99) 1\u20131","DOI":"10.1109\/TDSC.2018.2829880"},{"issue":"1","key":"3094_CR9","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69\u201373","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"3094_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2012.1","volume":"45","author":"D Song","year":"2012","unstructured":"Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. Computer 45(1):39\u201345","journal-title":"Computer"},{"issue":"5","key":"3094_CR11","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parall Distrib Syst 22(5):847\u2013859","journal-title":"IEEE Trans Parall Distrib Syst"},{"key":"3094_CR12","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"3094_CR13","doi-asserted-by":"crossref","unstructured":"Shacham H, Waters B (2008) Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, pp 90\u2013107","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"3094_CR14","doi-asserted-by":"crossref","unstructured":"Zhang Y, Blanton M (2013) Efficient dynamic provable possession of remote data via balanced update trees. In: ACM Sigsac Symposium on Information, Computer and Communications Security, pp 183\u2013194","DOI":"10.1145\/2484313.2484339"},{"issue":"4","key":"3094_CR15","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2012.35","volume":"6","author":"H Wang","year":"2013","unstructured":"Wang H (2013) Proxy provable data possession in public clouds. IEEE Trans Serv Comput 6(4):551\u2013559","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"3094_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2013","unstructured":"Wang B, Li B, Li H (2013) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92\u2013106","journal-title":"IEEE Trans Serv Comput"},{"issue":"8","key":"3094_CR17","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1109\/TC.2015.2389955","volume":"65","author":"T Jiang","year":"2015","unstructured":"Jiang T, Chen X, Ma J (2015) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363\u20132373","journal-title":"IEEE Trans Comput"},{"issue":"8","key":"3094_CR18","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TIFS.2015.2423264","volume":"10","author":"J Yuan","year":"2015","unstructured":"Yuan J, Yu S (2015) Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inf Forensics Secur 10(8):1717\u20131726","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3094_CR19","doi-asserted-by":"crossref","unstructured":"Huang L, Zhang G, Fu A (2018) Privacy-preserving public auditing for non-manager group shared data. Wirel Pers Commun (3):1\u201318","DOI":"10.1007\/s11277-018-5634-4"},{"key":"3094_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.ins.2018.09.009","volume":"472","author":"H Tian","year":"2019","unstructured":"Tian H, Nan F, Jiang H, Chang C-C, Ning J, Huang Y (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107\u2013125","journal-title":"Inf Sci"},{"issue":"10","key":"3094_CR21","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","volume":"12","author":"J Shen","year":"2017","unstructured":"Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402\u20132415","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"C","key":"3094_CR22","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jss.2015.11.044","volume":"113","author":"G Yang","year":"2016","unstructured":"Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113(C):130\u2013139","journal-title":"J Syst Softw"},{"key":"3094_CR23","doi-asserted-by":"crossref","unstructured":"He K, Huang C, Yang K, Shi J (2015) Identity-preserving public auditing for shared cloud data. In: IEEE International Symposium on Quality of Service, pp 159\u2013164","DOI":"10.1109\/IWQoS.2015.7404727"},{"key":"3094_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2912379","author":"J Yu","year":"2019","unstructured":"Yu J, Hao R (2019) Comments on \u201cSEPDP: secure and efficient privacy preserving provable data possession in cloud storage\u201d. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2019.2912379","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"3094_CR25","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TIFS.2015.2400425","volume":"10","author":"J Yu","year":"2017","unstructured":"Yu J, Ren K, Wang C, Varadharajan V (2017) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167\u20131179","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"3094_CR26","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1109\/TIFS.2017.2695449","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensics Secur 12(8):1931\u20131940","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3094_CR27","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2018.09.013","volume":"472","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wang H, Xu C (2019) Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf Sci 472:223\u2013234","journal-title":"Inf Sci"},{"key":"3094_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.080","author":"Y Xu","year":"2019","unstructured":"Xu Y, Sun S, Cui J, Zhong H (2019) Intrusion-resilient public cloud auditing scheme with authenticator update. Inf Sci. https:\/\/doi.org\/10.1016\/j.ins.2019.09.080","journal-title":"Inf Sci"},{"issue":"4","key":"3094_CR29","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10207-014-0263-8","volume":"14","author":"Y Yu","year":"2015","unstructured":"Yu Y, Man HA, Mu Y, Tang S, Ren J, Susilo W, Dong L (2015) Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int J Inf Secur 14(4):307\u2013318","journal-title":"Int J Inf Secur"},{"key":"3094_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2921553","author":"W Shen","year":"2019","unstructured":"Shen W, Qin J, Yu J, Hao R, Hu J, Ma J (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Trans Cloud Comput. https:\/\/doi.org\/10.1109\/TCC.2019.2921553","journal-title":"IEEE Trans Cloud Comput"},{"issue":"2\/3","key":"3094_CR31","first-page":"195","volume":"18","author":"F Nan","year":"2019","unstructured":"Nan F, Tian H, Wang T, Cai Y, Chen Y et al (2019) A collusion-resistant public auditing scheme for shared cloud data. Int J Inf Technol Manag 18(2\/3):195\u2013212","journal-title":"Int J Inf Technol Manag"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-03094-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-019-03094-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-03094-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,29]],"date-time":"2020-11-29T00:20:09Z","timestamp":1606609209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-019-03094-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":31,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["3094"],"URL":"https:\/\/doi.org\/10.1007\/s11227-019-03094-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2019,11,30]]},"assertion":[{"value":"30 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}