{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:27Z","timestamp":1750220727562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404671","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"31-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Definition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador"],"prefix":"10.1145","author":[{"given":"Segundo Mois\u00e9s T.","family":"Toapanta","sequence":"first","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Sandra Elizabeth Marquez","family":"Ortiz","sequence":"additional","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Luis Enrique Mafla","family":"Gallegos","sequence":"additional","affiliation":[{"name":"National Polytechnic School Quito, Ecuador"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Conf. Electr. Electron. Commun. Comput. Technol. Optim. Tech. ICEECCOT 2017","volume":"310","author":"Hiremath S.","year":"2018","unstructured":"S. Hiremath and S. Kunte , \" A novel data auditing approach to achieve data privacy and data integrity in cloud computing,\" Int . Conf. Electr. Electron. Commun. Comput. Technol. Optim. Tech. ICEECCOT 2017 , vol. 2018-January, pp. 306-- 310 , 2018 . DOI: 10.1109\/ICEECCOT.2017.8284517 10.1109\/ICEECCOT.2017.8284517 S. Hiremath and S. Kunte, \"A novel data auditing approach to achieve data privacy and data integrity in cloud computing,\" Int. Conf. Electr. Electron. Commun. Comput. Technol. Optim. Tech. ICEECCOT 2017, vol. 2018-January, pp. 306--310, 2018. DOI: 10.1109\/ICEECCOT.2017.8284517"},{"volume-title":"International Journal of Advanced Research in Computer Science and Software Engineering A Review on Taxonomies of Attacks and Vulnerability in Computer and Network System","author":"Joshi C.","key":"e_1_3_2_1_2_1","unstructured":"C. Joshi , U. K. Singh , and K. Tarey , \" International Journal of Advanced Research in Computer Science and Software Engineering A Review on Taxonomies of Attacks and Vulnerability in Computer and Network System ,\" vol. 5 , no. 1, pp. 742--747, 2015. DOI:10.1109\/HICSS.2007.566. 10.1109\/HICSS.2007.566 C. Joshi, U. K. Singh, and K. Tarey, \"International Journal of Advanced Research in Computer Science and Software Engineering A Review on Taxonomies of Attacks and Vulnerability in Computer and Network System,\" vol. 5, no. 1, pp. 742--747, 2015. DOI:10.1109\/HICSS.2007.566."},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Algebraic Signatures-based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing","volume":"3782","author":"Shen J.","year":"2017","unstructured":"J. Shen , D. Liu , D. He , X. Huang , and Y. Xiang , \" Algebraic Signatures-based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing ,\" IEEE Trans. Sustain. Comput. , vol. 3782 , no. c, pp. 1 -- 1 , 2017 . DOI: 10.1109\/TSUSC.2017.2781232 10.1109\/TSUSC.2017.2781232 J. Shen, D. Liu, D. He, X. Huang, and Y. Xiang, \"Algebraic Signatures-based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing,\" IEEE Trans. Sustain. Comput., vol. 3782, no. c, pp. 1--1, 2017. DOI: 10.1109\/TSUSC.2017.2781232","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE Int. Conf. Circuit, Power Comput. Technol. ICCPCT 2017","author":"Agarkhed J.","year":"2017","unstructured":"J. Agarkhed and R. Ashalatha , \" An efficient auditing scheme for data storage security in cloud,\" Proc . IEEE Int. Conf. Circuit, Power Comput. Technol. ICCPCT 2017 , 2017 . DOI: 10.1109\/ICCPCT.2017.8074245 10.1109\/ICCPCT.2017.8074245 J. Agarkhed and R. Ashalatha, \"An efficient auditing scheme for data storage security in cloud,\" Proc. IEEE Int. Conf. Circuit, Power Comput. Technol. ICCPCT 2017, 2017. DOI: 10.1109\/ICCPCT.2017.8074245"},{"issue":"11","key":"e_1_3_2_1_5_1","first-page":"317","article-title":"An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS )","volume":"14","author":"Mushtaq M. O.","year":"2016","unstructured":"M. O. Mushtaq , F. Shahzad , M. O. Tariq , M. Riaz , and B. Majeed , \" An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS ) ,\" Int. J. Comput. Sci. Inf. Secur. , vol. 14 , no. 11 , pp. 317 -- 331 , 2016 . M. O. Mushtaq, F. Shahzad, M. O. Tariq, M. Riaz, and B. Majeed, \"An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS ),\" Int. J. Comput. Sci. Inf. Secur., vol. 14, no. 11, pp. 317--331, 2016.","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"e_1_3_2_1_6_1","volume-title":"Probl. Eng.","volume":"2017","author":"Kang B.","year":"2017","unstructured":"B. Kang , J. Wang , and D. Shao , \" Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage,\" Math . Probl. Eng. , vol. 2017 , 2017 . DOI: 10.1155\/2017\/8062182 10.1155\/2017 B. Kang, J. Wang, and D. Shao, \"Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage,\" Math. Probl. Eng., vol. 2017, 2017. DOI: 10.1155\/2017\/8062182"},{"key":"e_1_3_2_1_7_1","first-page":"251","article-title":"Auditing of the software of computer accounting system","volume":"2104","author":"Adamyk O.","year":"2018","unstructured":"O. Adamyk , B. Adamyk , and N. Khorunzhak , \" Auditing of the software of computer accounting system ,\" CEUR Workshop Proc. , vol. 2104 , pp. 251 -- 262 , 2018 . O. Adamyk, B. Adamyk, and N. Khorunzhak, \"Auditing of the software of computer accounting system,\" CEUR Workshop Proc., vol. 2104, pp. 251--262, 2018.","journal-title":"CEUR Workshop Proc."},{"key":"e_1_3_2_1_8_1","volume-title":"Inf. Syst.","volume":"2017","author":"Kang B.","year":"2017","unstructured":"B. Kang , J. Wang , and D. Shao , \" Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks,\" Mob . Inf. Syst. , vol. 2017 , 2017 . DOI: 10.1155\/2017\/2925465 10.1155\/2017 B. Kang, J. Wang, and D. Shao, \"Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks,\" Mob. Inf. Syst., vol. 2017, 2017. DOI: 10.1155\/2017\/2925465"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.003"},{"key":"e_1_3_2_1_10_1","first-page":"562","volume-title":"Conf. Comput. Sci. Eng. IEEE\/IFIP Int. Conf. Embed. Ubiquitous Comput. CSE EUC 2017","volume":"1","author":"Wu Y.","year":"2017","unstructured":"Y. Wu , Z. L. Jiang , X. Wang , S. M. Yiu , and P. Zhang , \" Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage,\" Proc. - 2017 IEEE Int . Conf. Comput. Sci. Eng. IEEE\/IFIP Int. Conf. Embed. Ubiquitous Comput. CSE EUC 2017 , vol. 1 , pp. 562 -- 567 , 2017 . DOI: 10.1109\/CSE-EUC.2017.104 10.1109\/CSE-EUC.2017.104 Y. Wu, Z. L. Jiang, X. Wang, S. M. Yiu, and P. Zhang, \"Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage,\" Proc. - 2017 IEEE Int. Conf. Comput. Sci. Eng. IEEE\/IFIP Int. Conf. Embed. Ubiquitous Comput. CSE EUC 2017, vol. 1, pp. 562--567, 2017. DOI: 10.1109\/CSE-EUC.2017.104"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2528500"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"e_1_3_2_1_13_1","first-page":"14","volume-title":"WIE Conf. Electr. Comput. Eng. 2017","author":"Garg N.","year":"2018","unstructured":"N. Garg and S. Bawa , \" ID-PAPC: Identity based Public Auditing Protocol for Cloud Computing,\" WIECON-ECE 2017 - IEEE Int . WIE Conf. Electr. Comput. Eng. 2017 , no. December , pp. 14 -- 17 , 2018 . DOI: 10.1109\/WIECON-ECE.2017.8468932 10.1109\/WIECON-ECE.2017.8468932 N. Garg and S. Bawa, \"ID-PAPC: Identity based Public Auditing Protocol for Cloud Computing,\" WIECON-ECE 2017 - IEEE Int. WIE Conf. Electr. Comput. Eng. 2017, no. December, pp. 14--17, 2018. DOI: 10.1109\/WIECON-ECE.2017.8468932"},{"key":"e_1_3_2_1_14_1","volume-title":"Conf. Res. Comput. Intell. Commun. Networks, ICRCICN 2017","volume":"302","author":"Sasmal S.","year":"2017","unstructured":"S. Sasmal and I. Pan , \" Mutual auditing framework for service level security auditing in cloud,\" Proc. - 2017 3rd IEEE Int . Conf. Res. Comput. Intell. Commun. Networks, ICRCICN 2017 , vol. 2017-December, pp. 297-- 302 , 2017 . DOI: 10.1109\/ICRCICN.2017.8234524 10.1109\/ICRCICN.2017.8234524 S. Sasmal and I. Pan, \"Mutual auditing framework for service level security auditing in cloud,\" Proc. - 2017 3rd IEEE Int. Conf. Res. Comput. Intell. Commun. Networks, ICRCICN 2017, vol. 2017-December, pp. 297--302, 2017. DOI: 10.1109\/ICRCICN.2017.8234524"},{"issue":"18","key":"e_1_3_2_1_15_1","first-page":"49","article-title":"Privacy Preserving Third Party Auditing for Secure Cloud Storage","volume":"181","author":"S. B.","year":"2018","unstructured":"S. B. and B. M. , \" Privacy Preserving Third Party Auditing for Secure Cloud Storage ,\" Int. J. Comput. Appl. , vol. 181 , no. 18 , pp. 49 -- 53 , 2018 . DOI: 10.1109\/TC.2011.245 10.1109\/TC.2011.245 S. B. and B. M., \"Privacy Preserving Third Party Auditing for Secure Cloud Storage,\" Int. J. Comput. Appl., vol. 181, no. 18, pp. 49--53, 2018. DOI: 10.1109\/TC.2011.245","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.003"},{"issue":"13","key":"e_1_3_2_1_17_1","first-page":"6","article-title":"Review of Privacy Preserving Public Auditing Techniques","volume":"145","author":"Shaikh S.","year":"2016","unstructured":"S. Shaikh and D. Vora , \" Review of Privacy Preserving Public Auditing Techniques ,\" Int. J. Comput. Appl. , vol. 145 , no. 13 , pp. 6 -- 8 , 2016 . DOI: 10.5120\/ijca2016910836 10.5120\/ijca2016910836 S. Shaikh and D. Vora, \"Review of Privacy Preserving Public Auditing Techniques,\" Int. J. Comput. Appl., vol. 145, no. 13, pp. 6--8, 2016. DOI: 10.5120\/ijca2016910836","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_3_2_1_18_1","first-page":"439","volume-title":"Conf. Comput. Anal. Secur. Trends, CAST 2016","author":"More S. S.","year":"2017","unstructured":"S. S. More and S. S. Chaudhari , \" Secure and efficient public auditing scheme for cloud storage,\" Int . Conf. Comput. Anal. Secur. Trends, CAST 2016 , pp. 439 -- 444 , 2017 . DOI: 10.1109\/CAST.2016.7915009 10.1109\/CAST.2016.7915009 S. S. More and S. S. Chaudhari, \"Secure and efficient public auditing scheme for cloud storage,\" Int. Conf. Comput. Anal. Secur. Trends, CAST 2016, pp. 439--444, 2017. DOI: 10.1109\/CAST.2016.7915009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.153"}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404671","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":20,"alternative-id":["10.1145\/3404663.3404671","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404671","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}