{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:14:22Z","timestamp":1730265262042,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/iicaiet.2018.8638472","type":"proceedings-article","created":{"date-parts":[[2019,2,12]],"date-time":"2019-02-12T01:25:48Z","timestamp":1549934748000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Performance Efficiency Analysis on Slepian-Wolf based Proof of Retrievability and Its Variants for Cloud Storage"],"prefix":"10.1109","author":[{"given":"Choon Beng","family":"Tan","sequence":"first","affiliation":[]},{"given":"Mohd Hanafi Ahmad","family":"Hijazi","sequence":"additional","affiliation":[]},{"given":"Yuto","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Yong Jin","family":"Park","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Nisar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6522585"},{"key":"ref30","first-page":"1986","article-title":"A Survey on Erasure Coding Techniques for Cloud Storage System","volume":"7","author":"pawar","year":"2016","journal-title":"Int J Comput Sci Inf Technol"},{"journal-title":"Routledge Encyclopedia of Philosophy","year":"1998","author":"craig","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/2322413"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.hm.2010.06.003"},{"journal-title":"Wikipedia the Free Encyclopedia","article-title":"Binomial coefficient","year":"2018","key":"ref13"},{"key":"ref14","first-page":"50","article-title":"Partial Binary Encoding for Slepian-Wolf Based Proof of Retrievability","author":"tan","year":"2017","journal-title":"IEEE 15th Student Conference on Research and Develpoment (SCOReD) 2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1961.287814"},{"key":"ref16","first-page":"529","article-title":"Implementation of Cyclic Redundancy Check in Data Communication","author":"sang","year":"2015","journal-title":"International Conference on Computational Intelligence and Communication Networks"},{"key":"ref17","article-title":"An Optimization Approach Towards a Proof of Retrievability Scheme for Cloud Storage","author":"tan","year":"2017","journal-title":"The International Conference on Computer and Network and Applications (ICCNA2017)"},{"key":"ref18","first-page":"1","article-title":"Online Data Partitioning in Distributed Database Systems","author":"chen","year":"2015","journal-title":"Int Conf on Extending Database Technology"},{"key":"ref19","first-page":"236","article-title":"Using replication and partitioning to build secure distributed systems","volume":"2003 janua","author":"zheng","year":"2003","journal-title":"Proc IEEE Symp on Security and Privacy"},{"journal-title":"Overhead-Computing TypPRESS &#x00A9;2012","year":"2012","author":"eglantine","key":"ref28"},{"key":"ref4","first-page":"598","article-title":"Provable Data Possession at Untrusted Stores","author":"ateniese","year":"2007","journal-title":"Proceedings of the 14th &#x2026;"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"ref6","first-page":"108","article-title":"Replication for Improving Availability & Balancing Load in Cloud Data Centres","volume":"5","author":"kalkal","year":"2015","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCI.2010.119"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015ICP0014"},{"key":"ref2","first-page":"1","article-title":"Isaca","year":"2015","journal-title":"GLOSSARY"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom.2014.11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1034049"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.jnca.2018.03.017","article-title":"A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends","volume":"110","author":"tan","year":"2017","journal-title":"J Netw Comput Appl"},{"journal-title":"The Statisticain","year":"2017","key":"ref21"},{"key":"ref24","first-page":"44","article-title":"Cloud Computing and its Challenges and Benefits in the Bank System","volume":"vi","author":"nedelcu","year":"2015","journal-title":"Database Syst"},{"key":"ref23","first-page":"2015","volume":"32","year":"2015","journal-title":"The Benefits and Challenges of Cloud Computing"},{"key":"ref26","first-page":"24","article-title":"A Comparative Study on Cloud based Data Integrity Verification Schemes","volume":"rtdm 2016","author":"ghule","year":"2016","journal-title":"Int J Comput Appl"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.011"}],"event":{"name":"2018 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","start":{"date-parts":[[2018,11,8]]},"location":"Kota Kinabalu, Malaysia","end":{"date-parts":[[2018,11,8]]}},"container-title":["2018 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8636434\/8638381\/08638472.pdf?arnumber=8638472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:53:50Z","timestamp":1643266430000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8638472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iicaiet.2018.8638472","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}