{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:45:21Z","timestamp":1762033521547,"version":"3.41.2"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T00:00:00Z","timestamp":1525824000000},"content-version":"vor","delay-in-days":128,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502044"],"award-info":[{"award-number":["61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third\u2010party auditor (TPA). However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR) have been proposed to further protect against the malicious TPA and collusion among any two entities, the original OPOR scheme applies only to the static data, which is the limitation that should be solved for enabling data dynamics. In this paper, we design a novel authenticated data structure called bv23Tree, which enables client to batch\u2010verify the indices and values of any number of appointed leaves all at once for efficiency. By utilizing bv23Tree and a hierarchical storage structure, we present the first solution for Dynamic OPOR (DOPOR), which extends the OPOR model to support dynamic updates of the outsourced data. Extensive security and performance analyses show the reliability and effectiveness of our proposed scheme.<\/jats:p>","DOI":"10.1155\/2018\/4186243","type":"journal-article","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T23:31:41Z","timestamp":1525908701000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6664-9302","authenticated-orcid":false,"given":"Lu","family":"Rao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5683-5347","authenticated-orcid":false,"given":"Tengfei","family":"Tu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2355229"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2528500"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2560812"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.66"},{"key":"e_1_2_11_5_2","doi-asserted-by":"crossref","unstructured":"WangC. WangQ. RenK. andLouW. Privacy-preserving public auditing for data storage security in cloud computing Proceedings of the IEEE INFO-COM March 2010 525\u2013533 https:\/\/doi.org\/10.1109\/INFCOM.2010.5462173 2-s2.0-77953295132.","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2481880"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"JuelsA.andKaliskiB. S.Jr. Pors: proofs of retrievability for large files Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS \u203207) November 2007 Alexandria VA USA ACM 584\u2013597 https:\/\/doi.org\/10.1145\/1315245.1315317 2-s2.0-74049103479.","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_2_11_11_2","article-title":"Dynamic-hash-table based public auditing for secure cloud storage","author":"Tian H.","year":"2015","journal-title":"IEEE Trans. Services Comput"},{"key":"e_1_2_11_12_2","doi-asserted-by":"crossref","unstructured":"ArmknechtF. BohliJ.-M. KarameG. O. LiuZ. andReuterC. A. Outsourced proofs of retrievability Proceedings of the 21st ACM Conference on Computer and Communications Security CCS 2014 November 2014 USA 831\u2013843 2-s2.0-84910598312 https:\/\/doi.org\/10.1145\/2660267.2660310.","DOI":"10.1145\/2660267.2660310"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"ErwayC. K\u00fcp\u00e7\u00fcA. PapamanthouC. andTamassiaR. Dynamic provable data possession Proceedings of the Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS \u203209) November 2009 Chicago Ill USA ACM 213\u2013222 https:\/\/doi.org\/10.1145\/1653662.1653688 2-s2.0-74049121230.","DOI":"10.1145\/1653662.1653688"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","unstructured":"ShiE. StefanovE. andPapamanthouC. Practical dynamic proofs of retrievability Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security CCS 2013 November 2013 Germany 325\u2013336 2-s2.0-84888986259 https:\/\/doi.org\/10.1145\/2508859.2516669.","DOI":"10.1145\/2508859.2516669"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.191"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375190"},{"key":"e_1_2_11_17_2","doi-asserted-by":"crossref","unstructured":"AtenieseG. BurnsR. CurtmolaR. HerringJ. KissnerL. PetersonZ. andSongD. Provable data possession at untrusted stores Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS \u203207) November 2007 Virginia Va USA 598\u2013609 https:\/\/doi.org\/10.1145\/1315245.1315318 2-s2.0-74049102823.","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_17"},{"key":"e_1_2_11_19_2","doi-asserted-by":"crossref","unstructured":"EtemadM.andK\u00fcp\u00e7\u00fcA. Generic efficient dynamic proofs of retrievability Proceedings of the 8th ACM Cloud Computing Security Workshop CCSW 2016 Austria 85\u201396 2-s2.0-85001720202 https:\/\/doi.org\/10.1145\/2996429.2996439.","DOI":"10.1145\/2996429.2996439"},{"volume-title":"The design and analysis of computer algorithms","year":"1975","author":"Aho A. V.","key":"e_1_2_11_20_2"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_2_11_22_2","unstructured":"Python Cryptography Toolkit (PyCrypto) 2014 https:\/\/pypi.python.org\/pypi\/pycrypto."},{"key":"e_1_2_11_23_2","unstructured":"Python 3 bindings for libpbc (Pypbc) 2017 https:\/\/github.com\/debatem1\/pypbc."},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2511764"},{"key":"e_1_2_11_25_2","article-title":"Structural balance theory-based e-commerce recommendation over big rating data","author":"Qi L.","year":"2016","journal-title":"IEEE Transactions on Big Data"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760458"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_8"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4186243.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4186243.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/4186243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:13:35Z","timestamp":1723011215000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/4186243"}},"subtitle":[],"editor":[{"given":"Kok-Seng","family":"Wong","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/4186243"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4186243","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-12-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4186243"}}