{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:36Z","timestamp":1740149016415,"version":"3.37.3"},"reference-count":17,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Education Ministry for the Development of Liberal Arts and Social Sciences","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}]},{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security","award":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"],"award-info":[{"award-number":["61402029","61379002","61370190","2017YFB0802400","4162020","12YJAZH136","AGK201708"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users\/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.<\/jats:p>","DOI":"10.1155\/2017\/2948025","type":"journal-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T19:31:12Z","timestamp":1509478272000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment"],"prefix":"10.1155","volume":"2017","author":[{"given":"Jian","family":"Mao","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0701-2392","authenticated-orcid":true,"given":"Wenqian","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"given":"Jian","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2276-7638","authenticated-orcid":true,"given":"Hanjun","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"given":"Jingdong","family":"Bian","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8674-3988","authenticated-orcid":true,"given":"Jianhong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Science, North China University of Technology, Beijing, China"},{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guilin, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2525984"},{"key":"3","first-page":"11","volume":"140","year":"2004","journal-title":"Integrity and Internal Control in Information Systems VI"},{"key":"4","first-page":"150","volume":"2006","year":"2006","journal-title":"Cryptology ePrint Archive"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.66"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190647"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900056"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"24","first-page":"186","volume":"2008","year":"2008","journal-title":"IACR Cryptology EPrint Archive"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2699909"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2423264"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.62"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0263-8"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt137"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.16"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.1"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/2948025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/2948025.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/2948025.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T19:31:20Z","timestamp":1509478280000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/2948025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":17,"alternative-id":["2948025","2948025"],"URL":"https:\/\/doi.org\/10.1155\/2017\/2948025","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}