{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:13:01Z","timestamp":1758845581211,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/icacci.2014.6968657","type":"proceedings-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T17:33:17Z","timestamp":1417541597000},"page":"2590-2596","source":"Crossref","is-referenced-by-count":10,"title":["Data authentication and integrity verification techniques for trusted\/untrusted cloud servers"],"prefix":"10.1109","author":[{"given":"Satheesh K S V A","family":"Kavuri","sequence":"first","affiliation":[]},{"given":"Gangadhara Rao","family":"Kancherla","sequence":"additional","affiliation":[]},{"given":"Basaveswara Rao","family":"Bobba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"article-title":"On Providing Integrity to The Data For Cross Cloud Environment Using CPDP Scheme","year":"0","author":"sarita","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03697-2","article-title":"Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing","author":"wang","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"ref13","article-title":"Ensuring Scalable. Secured. Maintenance and Access control of College Data. Using Cloud Computing","author":"yogeesh","year":"2012","journal-title":"International Journal of Advances in Engineering & Technology"},{"key":"ref14","article-title":"Identifying Data Integrity in the Cloud Storage","author":"saranva","year":"2012","journal-title":"International Journal of Computer Science issues (IJCSI)"},{"key":"ref15","first-page":"321","article-title":"Cinhertext-Policy Attribute-Based Encryption","year":"2007","journal-title":"John Bethencourt Security and Privacy 2007 SP '07 IEEE Symposium"},{"key":"ref16","article-title":"Attribute Based User Control Access for Cloud Storage Data","volume":"11","author":"kavuri","year":"2014","journal-title":"International Journal of Computer Trends and Technology (IJCTT)"},{"key":"ref4","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security In cloud computing","author":"wang","year":"2009","journal-title":"14th European Symposium on Research in Computer Security"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"CCS &#x2018;07 Proceedings of the 14th ACM Conference on Computer and Communications Security"},{"key":"ref6","article-title":"Cooperative provable data possession","author":"zhu","year":"2010","journal-title":"Cryptology EPrint Archive Report 2010\/499"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","article-title":"Security and Privacy Challenges in Cloud Computing Environments","volume":"8","author":"hassan","year":"2010","journal-title":"IEEE Security and Privacy"},{"key":"ref7","first-page":"36","article-title":"Security Issues in Cloud Computing","volume":"169","author":"pardeep","year":"0","journal-title":"Communications in Computer and Information Science"},{"key":"ref2","first-page":"49","article-title":"Improving data integrity on cloud storage services","volume":"2","author":"sownarnlka","year":"2013","journal-title":"International Journal of Engineering Science Invention"},{"key":"ref1","article-title":"Dynamic Audit Services For Achieving Data Integrity in Clouds","volume":"1","year":"2012","journal-title":"Internation Journal of Advanced Research in Comnputer and Communication Engineering(IJARCCE)"},{"key":"ref9","first-page":"412","article-title":"Effective Ways of Secure, Private and Trusted Cloud Computing","volume":"8","author":"pardeep","year":"2011","journal-title":"International Journal of Computer Science"}],"event":{"name":"2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2014,9,24]]},"location":"Delhi, India","end":{"date-parts":[[2014,9,27]]}},"container-title":["2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6949764\/6968191\/06968657.pdf?arnumber=6968657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:43:59Z","timestamp":1602672239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6968657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icacci.2014.6968657","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}