{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:25:35Z","timestamp":1752283535824,"version":"3.37.3"},"reference-count":44,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Program for Scientific Research Foundation for Talented Scholars of Jinling Institute of Technology","award":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"],"award-info":[{"award-number":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"]}]},{"DOI":"10.13039\/501100010651","name":"Fujian Normal University","doi-asserted-by":"publisher","award":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"],"award-info":[{"award-number":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"]}],"id":[{"id":"10.13039\/501100010651","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"],"award-info":[{"award-number":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Program of National Key Research and Development Project \u201cCybersecurity\u201d","award":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"],"award-info":[{"award-number":["JIT-B-202031","NSCL-KF2021-02","61902163","2017YFB0802800"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,5,27]]},"abstract":"<jats:p>Cloud computing is a fast-growing technology which supplies scalable, innovative, and efficient business models. However, cloud computing is not fully trusted, and the security of the data outsourced in cloud storage needs to be guaranteed. One of the hottest issues is how to ensure the integrity of the data in cloud storage. Until now, many researchers have proposed lots of provable data possession (PDP) schemes to deal with the problem of data integrity audition. Nevertheless, very little effort has been devoted to preserve the data uploader\u2019s privacy while auditing the integrity of data shared in a group. To overcome the shortcoming, we propose a novel certificateless PDP protocol to efficiently audit the integrity of data shared in a workgroup with user privacy preserving. Due to the inherent structural advantage of the certificateless crypto mechanism, our PDP scheme eliminates the key escrow problem and the certificate management problem simultaneously. Moreover, the audition process in our scheme does not need any user\u2019s identity which helps to keep the anonymity of data uploader. We give for our scheme a detailed security proof and efficiency analysis. Experiment results of performance evaluation demonstrate that our new scheme is very efficient and feasible.<\/jats:p>","DOI":"10.1155\/2021\/6639634","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T19:52:09Z","timestamp":1622231529000},"page":"1-11","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4569-4558","authenticated-orcid":true,"given":"Hao","family":"Yan","sequence":"first","affiliation":[{"name":"School of Network Security, Jinling Institute of Technology, Nanjing 211169, Jiangsu, China"},{"name":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350007, Fujian, China"}]},{"given":"Yanan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Network Security, Jinling Institute of Technology, Nanjing 211169, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2076-6372","authenticated-orcid":true,"given":"Zheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Network Security, Jinling Institute of Technology, Nanjing 211169, Jiangsu, China"}]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"The 28th Research Institute of China Electronics Technology Group Corporation, Nanjing 210007, Jiangsu, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2379646"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.2963978"},{"first-page":"14","article-title":"Towards trusted cloud computing","author":"N. Santos","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2019.2957390"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5583"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2899300"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.092"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2601070"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2014.2375190"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2929045"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2012.35"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2019.2918022"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2011.245"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.029"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_30"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.11.044"},{"first-page":"1946","article-title":"Privacy-preserving public auditing for shared cloud data supporting group dynamics","author":"B. Wang","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49151-6_16"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2013.2295611"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0271"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11698-3_3"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.c1400045"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2927219"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682701"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2015.2428620"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2928032"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6758618"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060049"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2789893"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2925465"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2938528"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06208-1"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3066497"},{"year":"2020","key":"43","article-title":"The pairing-based cryptography library (pbc)"},{"year":"2020","key":"44","article-title":"The GNU multiple precision arithmetic library (GMP)"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6639634.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6639634.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6639634.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T19:52:15Z","timestamp":1622231535000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6639634\/"}},"subtitle":[],"editor":[{"given":"Fulvio","family":"Valenza","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":44,"alternative-id":["6639634","6639634"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6639634","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,5,27]]}}}