{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:25Z","timestamp":1748664685393,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275648","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T21:27:30Z","timestamp":1443475650000},"page":"438-445","source":"Crossref","is-referenced-by-count":4,"title":["A novel secure cloud storage architecture combining proof of retrievability and revocation"],"prefix":"10.1109","author":[{"given":"Deepnarayan","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"G. R.","family":"Gangadharan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"14th European conference on Research in computer security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943546"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.C1200240"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref19","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption an expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"international conference on Practice and theory in public key cryptography"},{"key":"ref4","first-page":"30","article-title":"A security architecture for cloud storage combining proofs of retrievability and fairness","author":"albeshri","year":"2012","journal-title":"third Conference on Cloud Computing GRIDS and Virtualization"},{"key":"ref3","first-page":"31","article-title":"Enabling security in cloud storage slas with cloudproof","author":"popa","year":"2011","journal-title":"USENIX conference on USENIXATC'll"},{"key":"ref6","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"14th ACM Conference on Computer and Communications Security"},{"key":"ref5","first-page":"584","article-title":"Enabling PORs: proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"14th ACM Conference on Computer and Communications Security"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-642-00457-5_8","article-title":"Proofs of retrievability via hardness amplification","author":"dodis","year":"2009","journal-title":"6th Theory of Cryptography Conference on Theory of Cryptography"},{"key":"ref7","first-page":"90","article-title":"Compact proofs of retrievability","author":"shacham","year":"2008","journal-title":"14th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT '08"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"year":"2008","key":"ref1","article-title":"Amazon S3 availability event"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275648.pdf?arnumber=7275648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T21:01:45Z","timestamp":1748638905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7275648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275648","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}