{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:53:59Z","timestamp":1775339639507,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwqos.2017.7969107","type":"proceedings-article","created":{"date-parts":[[2017,7,7]],"date-time":"2017-07-07T18:35:28Z","timestamp":1499452528000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["A secure cloud storage system based on discrete logarithm problem"],"prefix":"10.1109","author":[{"family":"Jian Zhang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"family":"Yanjiao Chen","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"90","article-title":"Compact proofs of retrievability","author":"shacham","year":"2008","journal-title":"Proc of InternationalConference on the Theory and Applications of Cryptology and Information Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847993"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.5948\/UPO9780883859605","author":"ore","year":"1967","journal-title":"Invitation to Number Theory"},{"key":"ref15","author":"leveque","year":"1990","journal-title":"Elementary Theory of Numbers"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref17","article-title":"Encryption and authentication schemes based on public-key systems","author":"okamoto","year":"1988","journal-title":"Ph D thesis"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008350005447"},{"key":"ref4","first-page":"1","article-title":"Disk Failures in the Real World: What Does an MTTF of 1, 000,000 Hours Mean to You?","author":"schroeder","year":"2007","journal-title":"Proc USENIX Conference on File and Storage Technologies"},{"key":"ref27","year":"2016","journal-title":"Wikipedia Dump Service"},{"key":"ref3","author":"hernande","year":"2013","journal-title":"Byod data loss top list of cloud computing challenges [Online]"},{"key":"ref6","author":"velte","year":"2010","journal-title":"Cloud Computing A Practical Approach"},{"key":"ref5","first-page":"121","article-title":"Secure Untrusted Data Repository","author":"li","year":"2004","journal-title":"Proceedings of Operating System Design and Implementation"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref7","article-title":"Privacy-Preserving Audit and Extraction of DigitalContents","author":"shah","year":"2008","journal-title":"Cryptology EPrint Archive Report 2008\/186"},{"key":"ref2","author":"news","year":"2013","journal-title":"Cloud computing users are losing data symantec finds [Online]"},{"key":"ref9","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc of ACM Conference on Computerand Communications Security"},{"key":"ref1","article-title":"Above the Clouds: A Berkeley View of Cloud Computing","author":"armbrust","year":"2009","journal-title":"Technical report EECS-2009&#x2013;28"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref21","first-page":"211","article-title":"A course in computational algebraic number theory","volume":"26","author":"cohen","year":"1993","journal-title":"Springer- Verlag"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866842"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"}],"event":{"name":"2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS)","location":"Vilanova i la Geltr\u00fa, Spain","start":{"date-parts":[[2017,6,14]]},"end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7959754\/7969104\/07969107.pdf?arnumber=7969107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T20:01:36Z","timestamp":1602446496000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7969107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2017.7969107","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}