{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T12:38:42Z","timestamp":1762173522983,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1109\/comsnets51098.2021.9352742","type":"proceedings-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T05:11:22Z","timestamp":1613711482000},"page":"237-241","source":"Crossref","is-referenced-by-count":2,"title":["Fine-grained Data Deduplication and proof of storage Scheme in Public Cloud Storage"],"prefix":"10.1109","author":[{"given":"Hardik","family":"Gajera","sequence":"first","affiliation":[]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s10586-018-2813-8"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TETC.2020.3005610"},{"key":"ref30","first-page":"2019","article-title":"Provably-Secure Public Auditing with Deduplication","volume":"11","author":"kim","year":"2017","journal-title":"KSII Transactions on Internet and Information Systems"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"ref11","first-page":"179","article-title":"DupLESS: Server-aided encryption for deduplicated storage","author":"bellare","year":"2013","journal-title":"Proceedings of USENIX Security Symposium"},{"key":"ref12","first-page":"296","article-title":"Message-locked encryption and secure deduplication","volume":"7881","author":"bellare","year":"2013","journal-title":"Advances in Cryptology CRYPTO (Lecture Notes in Computer Science)"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1007\/978-3-662-46447-2_23","article-title":"Interactive message-locked encryption and secure deduplication","volume":"9020","author":"bellare","year":"2015","journal-title":"Public-Key Cryptography &#x2013; PKC (Lecture Notes in Computer Science)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-642-40041-4_21","article-title":"Message-locked encryption for lock-dependent messages","volume":"8042","author":"abadi","year":"2013","journal-title":"Advances in Cryptology &#x2013; CRYPTO (Lecture Notes in Computer Science)"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIFS.2016.2622013"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/1456469.1456471"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2015.2470221"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TC.2015.2389960"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2996429.2996433"},{"key":"ref28","article-title":"Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model","author":"wu","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIFS.2017.2656461"},{"key":"ref27","article-title":"Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage","author":"yang","year":"2018","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.jnca.2016.08.017","article-title":"A data integrity verification scheme in mobile cloud computing","volume":"77","author":"lin","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.jnca.2018.03.017"},{"key":"ref29","first-page":"334","article-title":"A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds","author":"zhao","year":"2019","journal-title":"Proceedings of 5th International Conference of Pioneering Computer Scientists Engineers and Educators"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TCC.2014.2366148"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s11042-015-2956-z"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2133601.2133603"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s10619-014-7151-0"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CNS.2013.6682702"},{"key":"ref1","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"proceeding of the 14th ACM Conference on Computer and Communications Security (CCS)"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TC.2016.2560812"},{"year":"2020","author":"knorr","journal-title":"What is cloud computing? Everything you need to know now","key":"ref22"},{"year":"2020","author":"jones","journal-title":"Nasty Adobe Bug Deleted $250 000-Worth of Man&#x2019;s Files Lawsuit Claims","key":"ref21"},{"key":"ref24","first-page":"203","article-title":"Symmetric key based proofs of retrievability supporting public verification","author":"guan","year":"2015","journal-title":"Proceedings of European Symposium on Research in Computer Security"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TC.2015.2456027"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ACCESS.2019.2938976"},{"key":"ref25","first-page":"1","article-title":"secure cloud storage system based on discrete logarithm problem","author":"zhang","year":"2017","journal-title":"Proceedings of 25th International Symposium on Quality of Service"}],"event":{"name":"2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2021,1,5]]},"location":"Bangalore, India","end":{"date-parts":[[2021,1,9]]}},"container-title":["2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9352735\/9352808\/09352742.pdf?arnumber=9352742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:33:57Z","timestamp":1643186037000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9352742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/comsnets51098.2021.9352742","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]}}}