{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T11:41:49Z","timestamp":1769341309690,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Plan of China","award":["2017YFB0802203"],"award-info":[{"award-number":["2017YFB0802203"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702222"],"award-info":[{"award-number":["61702222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736203"],"award-info":[{"award-number":["U1736203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61732021"],"award-info":[{"award-number":["61732021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472165"],"award-info":[{"award-number":["61472165"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373158"],"award-info":[{"award-number":["61373158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M612842"],"award-info":[{"award-number":["2017M612842"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence","award":["2014B090904067"],"award-info":[{"award-number":["2014B090904067"]}]},{"name":"Guangdong Provincial Special Funds for Applied Technology Research and development and Transformation of Important Scientific and Technological Achieve","award":["2016B010124009"],"award-info":[{"award-number":["2016B010124009"]}]},{"name":"Zhuhai Top Discipline&#x2013;Information Security"},{"name":"Guangzhou Key Laboratory of Data Security and Privacy Preserving"},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving"},{"name":"National Joint Engineering Research Center of Network Security Detection and Protection Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1109\/tcc.2018.2851256","type":"journal-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T19:01:06Z","timestamp":1530212466000},"page":"212-225","source":"Crossref","is-referenced-by-count":108,"title":["Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-6571","authenticated-orcid":false,"given":"Anjia","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7887-5913","authenticated-orcid":false,"given":"Jia","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2512589"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516669"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_15"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-011-0138-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484339"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88625-9_28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.51"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414503"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190647"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"ref2","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc 14th ACM Conf Comput Commun Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","article-title":"A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability","volume":"23","author":"hao","year":"2011","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484408"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601070"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510914"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_19"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705620"},{"key":"ref12","first-page":"31","article-title":"Provably secure and practical identification schemes and corresponding signature schemes","author":"okamoto","year":"1992","journal-title":"Proc Annu Int Cryptology Conf Advances Cryptology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982514"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2699909"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.46"},{"key":"ref49","article-title":"Lightweight and privacy-preserving delegatable proofs of storage","author":"xu","year":"2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_16"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref45","article-title":"Implementing cryptographic program obfuscation","author":"apon","year":"2014"},{"key":"ref48","first-page":"302","author":"goldreich","year":"2011","journal-title":"A sample of samplers A computational perspective on sampling"},{"key":"ref47","first-page":"1259","article-title":"An algorithm for the organization of information","author":"adelson-velsky","year":"1962","journal-title":"Proc USSR Academy Sci"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_17"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"ref43","first-page":"203","author":"guan","year":"2015","journal-title":"Symmetric-Key Based Proofs of Retrievability Supporting Public Verification"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9371451\/08399549.pdf?arnumber=8399549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:49Z","timestamp":1652194429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8399549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":49,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2018.2851256","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}