{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:56Z","timestamp":1740122576031,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T00:00:00Z","timestamp":1522195200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61572255"],"award-info":[{"award-number":["61572255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Six talent peaks project of Jiangsu Province, China","award":["XYDXXJS-032"],"award-info":[{"award-number":["XYDXXJS-032"]}]},{"name":"CERNET Innovation Project","award":["NGII20170205"],"award-info":[{"award-number":["NGII20170205"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11277-018-5634-4","type":"journal-article","created":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T11:31:37Z","timestamp":1522236697000},"page":"1277-1294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Privacy-Preserving Public Auditing for Non-manager Group Shared Data"],"prefix":"10.1007","volume":"100","author":[{"given":"Longxia","family":"Huang","sequence":"first","affiliation":[]},{"given":"Gongxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0133-6994","authenticated-orcid":false,"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"issue":"3","key":"5634_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-015-2874-4","volume":"94","author":"HS Yang","year":"2015","unstructured":"Yang, H. S., & Yoo, S. J. (2015). A study on smartwork security technology based on cloud computing environment. Wireless Personal Communications, 94(3), 1\u201310.","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"5634_CR2","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TIFS.2015.2423264","volume":"10","author":"J Yuan","year":"2015","unstructured":"Yuan, J., & Yu, S. (2015). Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Transactions on Information Forensics and Security, 10(8), 1717\u20131726.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"5634_CR3","first-page":"2334","volume":"53","author":"L Huang","year":"2016","unstructured":"Huang, L., Zhang, G., & Fu, A. (2016). Privacy-preserving public auditing for dynamic group based on hierarchical tree. Journal of Computer Research and Development, 53(10), 2334\u20132342.","journal-title":"Journal of Computer Research and Development"},{"key":"5634_CR4","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2017","unstructured":"Yu, S. (2017). Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE Access, 4, 2751\u20132763.","journal-title":"IEEE Access"},{"issue":"4","key":"5634_CR5","doi-asserted-by":"publisher","first-page":"5295","DOI":"10.1007\/s11277-016-3742-6","volume":"96","author":"X Li","year":"2017","unstructured":"Li, X., Kumari, S., Shen, J., Wu, F., & Chen, C. (2017). Secure data access and sharing scheme for cloud storage. Wireless Personal Communications, 96(4), 5295\u20135314.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"5634_CR6","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362\u2013375.","journal-title":"IEEE Transactions on Computers"},{"key":"5634_CR7","doi-asserted-by":"crossref","unstructured":"Huang, L., Zhang, G., & Fu, A. (2017). Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group. In Australasian computer science week multiconference (p. 76). ACM.","DOI":"10.1145\/3014812.3014890"},{"issue":"11","key":"5634_CR8","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/TIFS.2016.2587242","volume":"11","author":"J Li","year":"2016","unstructured":"Li, J., Zhang, L., Liu, J. K., Qian, H., & Dong, Z. (2016). Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Transactions on Information Forensics and Security, 11(11), 2572\u20132583.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5634_CR9","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., & Li, H. (2012). Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In International conference on applied cryptography and network security (pp. 507\u2013525). Springer.","DOI":"10.1007\/978-3-642-31284-7_30"},{"issue":"7","key":"5634_CR10","first-page":"1397","volume":"51","author":"H Li","year":"2014","unstructured":"Li, H., Sun, W., Li, F., & Wang, B. (2014). Secure and privacy-preserving data storage service in public cloud. Journal of Computer Research & Development, 51(7), 1397\u20131409.","journal-title":"Journal of Computer Research & Development"},{"issue":"1","key":"5634_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"B Wang","year":"2014","unstructured":"Wang, B., Li, B., & Li, H. (2014). Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing, 2(1), 43\u201356.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"99","key":"5634_CR12","first-page":"1","volume":"PP","author":"H Wang","year":"2016","unstructured":"Wang, H., He, D., Yu, J., & Wang, Z. (2016). Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Transactions on Services Computing, PP(99), 1.","journal-title":"IEEE Transactions on Services Computing"},{"key":"5634_CR13","doi-asserted-by":"crossref","unstructured":"Huang, L., Zhang, G., & Fu, A. (2017). Privacy-preserving public auditing for non-manager group. In IEEE international conference on communications (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2017.7997370"},{"issue":"99","key":"5634_CR14","first-page":"1","volume":"PP","author":"A Fu","year":"2017","unstructured":"Fu, A., Yu, S., Zhang, Y., Wang, H., & Huang, C. (2017). NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data, PP(99), 1.","journal-title":"IEEE Transactions on Big Data"},{"issue":"C","key":"5634_CR15","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jss.2015.11.044","volume":"113","author":"G Yang","year":"2016","unstructured":"Yang, G., Yu, J., Shen, W., Su, Q., Fu, Z., & Hao, R. (2016). Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. Journal of Systems & Software, 113(C), 130\u2013139.","journal-title":"Journal of Systems & Software"},{"issue":"4","key":"5634_CR16","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10207-014-0263-8","volume":"14","author":"Y Yu","year":"2015","unstructured":"Yu, Y., Man, H. A., Mu, Y., Tang, S., & Ren, J. (2015). Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. International Journal of Information Security, 14(4), 307\u2013318.","journal-title":"International Journal of Information Security"},{"key":"5634_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, J., Li, P., & Mao, J. (2015). An oriented-group supporting multi-user public auditing for data sharing. In IEEE international conference on smart city (pp. 996\u20131002). IEEE.","DOI":"10.1109\/SmartCity.2015.200"},{"issue":"4","key":"5634_CR18","first-page":"125","volume":"2","author":"A Achhra","year":"2015","unstructured":"Achhra, A., Vaswani, P., Agale, R., & Chheda, M. (2015). Public auditing for the shared data in the cloud. International Journal of Advance Foundation and Research in Computer, 2(4), 125\u2013129.","journal-title":"International Journal of Advance Foundation and Research in Computer"},{"key":"5634_CR19","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. IEEE Access, 4, 2292\u20132303.","journal-title":"IEEE Access"},{"key":"5634_CR20","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. IEEE security and privacy workshops (pp. 180\u2013184). IEEE Computer Society.","DOI":"10.1109\/SPW.2015.27"},{"issue":"11","key":"5634_CR21","first-page":"612","volume":"22","author":"J Bl\u00f6mer","year":"2011","unstructured":"Bl\u00f6mer, J. (2011). How to share a secret. Communications of the ACM, 22(11), 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"5634_CR22","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., et al. (2007). Provable data possession at untrusted stores. In ACM conference on computer and communications security (pp. 598\u2013609). ACM.","DOI":"10.1145\/1315245.1315318"},{"key":"5634_CR23","doi-asserted-by":"crossref","unstructured":"Juels, A., & Kaliski, B. S. (2007). Pors: Proofs of retrievability for large files. In ACM conference on computer and communications security (pp. 584\u2013597). ACM.","DOI":"10.1145\/1315245.1315317"},{"key":"5634_CR24","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.jnca.2017.12.007","volume":"104","author":"A Fu","year":"2018","unstructured":"Fu, A., Li, Y., Yu, S., Yu, Y., & Zhang, G. (2018). DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems. Journal of Network & Computer Applications, 104, 97\u2013106.","journal-title":"Journal of Network & Computer Applications"},{"issue":"5","key":"5634_CR25","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/s12204-011-1181-9","volume":"16","author":"X Li","year":"2011","unstructured":"Li, X., Qian, H., & Li, J. (2011). Democratic group signatures with threshold traceability. Journal of Shanghai Jiaotong University, 16(5), 530\u2013532.","journal-title":"Journal of Shanghai Jiaotong University"},{"key":"5634_CR26","unstructured":"Lynn, B. (2012). The pairing-based cryptography (pbc) library. http:\/\/crypto.stanford.edu\/pbc ."},{"key":"5634_CR27","doi-asserted-by":"publisher","unstructured":"Huang, L., Zhang, G., Yu, S., Fu, A., & Yearwood, J. (2017). SeShare: Secure cloud data sharing based on blockchain and public auditing. Concurrency & Computation Practice & Experience. https:\/\/doi.org\/10.1002\/cpe.4359 .","DOI":"10.1002\/cpe.4359"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5634-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5634-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5634-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T12:34:31Z","timestamp":1570970071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5634-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,28]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5634"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5634-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,3,28]]},"assertion":[{"value":"28 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}