{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:44:53Z","timestamp":1762033493271,"version":"3.37.3"},"reference-count":28,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502044"],"award-info":[{"award-number":["61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>As information technology develops, cloud storage has been widely accepted for keeping volumes of data. Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud. In view of the significant computational cost caused by the auditing process, outsourced auditing model is proposed to make user outsource the heavy auditing task to third party auditor (TPA). Although the first outsourced auditing scheme can protect against the malicious TPA, this scheme enables TPA to have read access right over user\u2019s outsourced data, which is a potential risk for user data privacy. In this paper, we introduce the notion of User Focus for outsourced auditing, which emphasizes the idea that lets user dominate her own data. Based on User Focus, our proposed scheme not only can prevent user\u2019s data from leaking to TPA without depending on data encryption but also can avoid the use of additional independent random source that is very difficult to meet in practice. We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient.<\/jats:p>","DOI":"10.1155\/2017\/4603237","type":"journal-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:32:16Z","timestamp":1511807536000},"page":"1-17","source":"Crossref","is-referenced-by-count":11,"title":["Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5683-5347","authenticated-orcid":true,"given":"Tengfei","family":"Tu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Lu","family":"Rao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":true,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jia","family":"Xiao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147716684842"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.011"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2439695"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2571686"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2179650"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2352340"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2512589"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.2295611"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2011.51"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.191"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2587242"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_17"},{"first-page":"118","volume-title":"Perfect NIZK with adaptive soundness","year":"2007","key":"29"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.e98.b.190"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2596138"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2506573"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2622697"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2590944"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2381872"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015edp7341"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2601065"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4603237.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4603237.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/4603237.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:32:26Z","timestamp":1511807546000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/4603237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":28,"alternative-id":["4603237","4603237"],"URL":"https:\/\/doi.org\/10.1155\/2017\/4603237","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2017]]}}}