{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:10:30Z","timestamp":1753888230136,"version":"3.41.2"},"reference-count":21,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"vor","delay-in-days":8,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636114","61572521"],"award-info":[{"award-number":["U1636114","61572521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Now, it is common for patients and medical institutions to outsource their data to cloud storage. This can greatly reduce the burden of medical information management and storage and improve the efficiency of the entire medical industry. In some cases, the group\u2010based cloud storage system is also very common to be used. For example, in an medical enterprise, the employees outsource the working documents to the cloud storage and share them to the colleagues. However, when the working documents are outsourced to the cloud servers, how to ensure their security is a challenge problem for they are not controlled physically by the data owners. In particular, the integrity of the outsourced data should be guaranteed. And the secure cloud auditing protocol is designed to solve this issue. Recently, a lightweight secure auditing scheme for shared data in cloud storage is proposed. Unfortunately, we find this proposal not secure in this paper. It\u2019s easy for the cloud server to forge the authentication label, and thus they can delete all the outsourced data when the cloud server still provide a correct data possession proof, which invalidates the security of the cloud audit protocol. On the basis of the original security auditing protocol, we provide an improved one for the shared data, roughly analysis its security, and the results show our new protocol is secure.<\/jats:p>","DOI":"10.1155\/2021\/8886763","type":"journal-article","created":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T04:07:28Z","timestamp":1610251648000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data"],"prefix":"10.1155","volume":"2021","author":[{"given":"Haibin","family":"Yang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2464-9042","authenticated-orcid":false,"given":"Zhengge","family":"Yi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-4913","authenticated-orcid":false,"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yunxuan","family":"Su","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zheng","family":"Tu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2021,1,9]]},"reference":[{"key":"e_1_2_13_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916889"},{"key":"e_1_2_13_2_2","doi-asserted-by":"crossref","unstructured":"JuelsA.andKaliskiB. S. PoRs: proofs of retrievability for large files Proceedings of ACM Conference on Computer and Communications Security 2007 Alexandria Virginia USA 584\u2013597.","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_2_13_3_2","doi-asserted-by":"crossref","unstructured":"AtenieseG. BurnsR. C. CurtmolaR. HerringJ. KissnerL. PetersonZ. N. J. andSongD. Provable data possesion at untrusted stores 2007 598\u2013609.","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_2_13_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2512589"},{"key":"e_1_2_13_5_2","doi-asserted-by":"crossref","unstructured":"ShachamH.andWatersB. Compact proofs or retrievability 2008 90\u2013107.","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_2_13_6_2","doi-asserted-by":"crossref","unstructured":"XuJ.andChangE. C. Towards efficient proofs of retrievability 2012 79\u201380.","DOI":"10.1145\/2414456.2414503"},{"key":"e_1_2_13_7_2","doi-asserted-by":"crossref","unstructured":"CashD. K\u00fcp\u00e7\u00fcA. andWichsD. Dynamic proofs of retrievability via oblivious RAM 2013 279\u2013295.","DOI":"10.1007\/978-3-642-38348-9_17"},{"key":"e_1_2_13_8_2","doi-asserted-by":"crossref","unstructured":"ShiE. StefanovE. andPapamanthouC. Practical dynamic proofs of retrievability 2013 325\u2013336.","DOI":"10.1145\/2508859.2516669"},{"key":"e_1_2_13_9_2","doi-asserted-by":"crossref","unstructured":"YuanJ.andYuS. Secure and constant cost public cloud storage auditing with deduplication 2013 IEEE Conference on Communications and Network Security (CNS) 2013 National Harbor MD USA 145\u2013153.","DOI":"10.1109\/CNS.2013.6682702"},{"key":"e_1_2_13_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"e_1_2_13_11_2","doi-asserted-by":"crossref","unstructured":"WangB. LiB. andLiH. Public auditing for shared data with efficient user revocation in the cloud INFOCOM 2013 2904\u20132912.","DOI":"10.1109\/INFCOM.2013.6567101"},{"key":"e_1_2_13_12_2","doi-asserted-by":"crossref","unstructured":"HaleviS. HarnikD. PinkasB. andShulman-PelegA. Proofs of ownership in remote storage systems 2011 491\u2013500.","DOI":"10.1145\/2046707.2046765"},{"key":"e_1_2_13_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"e_1_2_13_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_2_13_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-3000-1"},{"key":"e_1_2_13_16_2","doi-asserted-by":"crossref","unstructured":"WangY. WuQ. QinB. ChenX. HuangX. andZhouY. Group-oriented proofs of storage Proceedings of the 10th ACM Symposium on Information Computer and Communications Security 2015 New York NY USA 73\u201384.","DOI":"10.1145\/2714576.2714630"},{"key":"e_1_2_13_17_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4781"},{"key":"e_1_2_13_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4096"},{"key":"e_1_2_13_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190647"},{"key":"e_1_2_13_20_2","unstructured":"OpreaA. ReiterM. K. andYangK. Space-efficient block storage integrity Proceedings of the Network and Distributed System Security Symposium (NDSS 05) 2005 San Diego California USA."},{"key":"e_1_2_13_21_2","unstructured":"GazzoniF. D. L.andBarretoP. S. L. M. Demonstrating data possession and uncheatable data transfer IACR Cryptology Print Archive 2006."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8886763.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8886763.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8886763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:00:53Z","timestamp":1723024853000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8886763"}},"subtitle":[],"editor":[{"given":"Arun K.","family":"Sangaiah","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8886763"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8886763","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-08-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8886763"}}