{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:16:50Z","timestamp":1741666610814,"version":"3.38.0"},"reference-count":61,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2015,9,16]]},"abstract":"<jats:p> Abstract <\/jats:p><jats:p> In cloud storage, a data owner can store his data in a cloud and authorize some users to access his data. Since the data are outsourced to the cloud, the authorized users should check the data to assure integrity. The data owner does not allow unauthorized users to check integrity of his data. There are many private and public integrity check schemes. Nevertheless, this paper concerns the verification key spread problem. Delegated integrity check deals with the verification key spread problem and provides effective management of verifiers. A\u00a0data owner can delegate a verifier to check his data and revoke the right of the verifier later. The verifier cannot re-delegate his integrity check capability to someone else. Delegated integrity check guarantees that only the delegated verifier can check integrity of data. <\/jats:p><jats:p> This paper provides the model of delegated integrity check, an application scenario of personal health records, and two delegated integrity check schemes for hierarchical cloud data. The first scheme allows a verifier to check data possession of a storage server. The second scheme allows a verifier to check data retrievability from a storage server. The schemes achieve proof unforgeability, proof indistinguishability and delegation key unforgeability in the random oracle model. <\/jats:p>","DOI":"10.3233\/jcs-150527","type":"journal-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T16:08:14Z","timestamp":1442938094000},"page":"471-508","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Delegated integrity check for hierarchical\u00a0cloud data"],"prefix":"10.1177","volume":"23","author":[{"given":"Shiuan-Tzuo","family":"Shen","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan. E-mails:\u00a0,\u00a0"}]},{"given":"Wen-Guey","family":"Tzeng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan. E-mails:\u00a0,\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2015,9,1]]},"reference":[{"key":"ref001","doi-asserted-by":"crossref","unstructured":"[1]F.\u00a0Armknecht, J.M.\u00a0Bohli, G.O.\u00a0Karame, Z.\u00a0Liu and C.A.\u00a0Reuter, Outsourced proofs of retrievability, in: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201914, ACM, New York, NY, USA, 2014, pp.\u00a0831\u2013843.","DOI":"10.1145\/2660267.2660310"},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"[2]G.\u00a0Ateniese, R.\u00a0Burns, R.\u00a0Curtmola, J.\u00a0Herring, O.\u00a0Khan, L.\u00a0Kissner, Z.\u00a0Peterson and D.\u00a0Song, Remote data checking using provable data possession, ACM Transactions on Information and System Security 14(1) (2011), Article No. 12.","DOI":"10.1145\/1952982.1952994"},{"key":"ref003","doi-asserted-by":"crossref","unstructured":"[3]G.\u00a0Ateniese, R.\u00a0Burns, R.\u00a0Curtmola, J.\u00a0Herring, L.\u00a0Kissner, Z.\u00a0Peterson and D.\u00a0Song, Provable data possession at untrusted stores, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS\u201907, ACM, New York, NY, USA, 2007, pp.\u00a0598\u2013609.","DOI":"10.1145\/1315245.1315318"},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"[4]G.\u00a0Ateniese, R.\u00a0Di Pietro, L.V.\u00a0Mancini and G.\u00a0Tsudik, Scalable and efficient provable data possession, in: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm\u201908, ACM, New York, NY, USA, 2008, Article No. 9.","DOI":"10.1145\/1460877.1460889"},{"key":"ref005","doi-asserted-by":"crossref","unstructured":"[5]G.\u00a0Ateniese, S.\u00a0Kamara and J.\u00a0Katz, Proofs of storage from homomorphic identification protocols, in: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT\u201909, Springer, Berlin, Heidelberg, 2009, pp.\u00a0319\u2013333.","DOI":"10.1007\/978-3-642-10366-7_19"},{"key":"ref006","doi-asserted-by":"crossref","unstructured":"[6]M.\u00a0Azraoui, K.\u00a0Elkhiyaoui, R.\u00a0Molva and M.\u00a0\u00d6nen, StealthGuard: Proofs of retrievability with hidden watchdogs, in: Computer Security \u2013 ESORICS 2014 \u2013 19th European Symposium on Research in Computer Security, Proceedings, Part\u00a0I, Wroclaw, Poland, 7\u201311 September 2014, 2014, pp.\u00a0239\u2013256.","DOI":"10.1007\/978-3-319-11203-9_14"},{"key":"ref007","doi-asserted-by":"crossref","unstructured":"[7]F.\u00a0Bao, R.\u00a0Deng and H.\u00a0Zhu, Variations of Diffie\u2013Hellman problem, in: Information and Communications Security, Lecture Notes in Computer Science, Vol.\u00a02836, Springer, Berlin, Heidelberg, 2003, pp.\u00a0301\u2013312.","DOI":"10.1007\/978-3-540-39927-8_28"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2384391"},{"key":"ref009","doi-asserted-by":"crossref","unstructured":"[9]D.\u00a0Boneh, X.\u00a0Boyen and E.J.\u00a0Goh, Hierarchical identity based encryption with constant size ciphertext, in: Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT\u201905, Springer, Berlin, Heidelberg, 2005, pp.\u00a0440\u2013456.","DOI":"10.1007\/11426639_26"},{"key":"ref010","doi-asserted-by":"crossref","unstructured":"[10]D.\u00a0Boneh, C.\u00a0Gentry and B.\u00a0Waters, Collusion resistant broadcast encryption with short ciphertexts and private keys, in: Proceedings of the 25th Annual International Conference on Advances in Cryptology, CRYPTO\u201905, Springer, Berlin, Heidelberg, 2005, pp.\u00a0258\u2013275.","DOI":"10.1007\/11535218_16"},{"key":"ref011","doi-asserted-by":"crossref","unstructured":"[11]K.D.\u00a0Bowers, A.\u00a0Juels and A.\u00a0Oprea, HAIL: A high-availability and integrity layer for cloud storage, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS\u201909, ACM, New York, NY, USA, 2009, pp.\u00a0187\u2013198.","DOI":"10.1145\/1653662.1653686"},{"key":"ref012","doi-asserted-by":"crossref","unstructured":"[12]K.D.\u00a0Bowers, A.\u00a0Juels and A.\u00a0Oprea, Proofs of retrievability: Theory and implementation, in: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW\u201909, ACM, New York, NY, USA, 2009, pp.\u00a043\u201354.","DOI":"10.1145\/1655008.1655015"},{"key":"ref013","doi-asserted-by":"crossref","unstructured":"[13]N.\u00a0Cao, S.\u00a0Yu, Z.\u00a0Yang, W.\u00a0Lou and Y.T.\u00a0Hou, Lt codes-based secure and reliable cloud storage service, in: INFOCOM, 2012, pp.\u00a0693\u2013701.","DOI":"10.1109\/INFCOM.2012.6195814"},{"key":"ref014","doi-asserted-by":"crossref","unstructured":"[14]D.\u00a0Cash, A.\u00a0K\u00fcp\u00e7\u00fc and D.\u00a0Wichs, Dynamic proofs of retrievability via oblivious RAM, in: Advances in Cryptology \u2013 EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Athens, Greece, 26\u201330 May 2013, 2013, pp.\u00a0279\u2013295.","DOI":"10.1007\/978-3-642-38348-9_17"},{"key":"ref015","doi-asserted-by":"crossref","unstructured":"[15]E.C.\u00a0Chang and J.\u00a0Xu, Remote integrity check with dishonest storage server, in: Proceedings of the 13th European Symposium on Research in Computer Security \u2013 ESORICS\u201908, Springer, 2008, pp.\u00a0223\u2013237.","DOI":"10.1007\/978-3-540-88313-5_15"},{"key":"ref016","doi-asserted-by":"crossref","unstructured":"[16]B.\u00a0Chen and R.\u00a0Curtmola, Robust dynamic provable data possession, in: ICDCS Workshops, 2012, pp.\u00a0515\u2013525.","DOI":"10.1109\/ICDCSW.2012.57"},{"key":"ref017","doi-asserted-by":"crossref","unstructured":"[17]B.\u00a0Chen and R.\u00a0Curtmola, Robust dynamic remote data checking for public clouds, in: ACM Conference on Computer and Communications Security, 2012, pp.\u00a01043\u20131045.","DOI":"10.1145\/2382196.2382319"},{"key":"ref018","doi-asserted-by":"crossref","unstructured":"[18]B.\u00a0Chen, R.\u00a0Curtmola, G.\u00a0Ateniese and R.\u00a0Burns, Remote data checking for network coding-based distributed storage systems, in: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW\u201910, ACM, New York, NY, USA, 2010, pp.\u00a031\u201342.","DOI":"10.1145\/1866835.1866842"},{"key":"ref019","doi-asserted-by":"crossref","unstructured":"[19]R.\u00a0Curtmola, O.\u00a0Khan and R.\u00a0Burns, Robust remote data checking, in: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS\u201908, ACM, New York, NY, USA, 2008, pp.\u00a063\u201368.","DOI":"10.1145\/1456469.1456481"},{"key":"ref020","doi-asserted-by":"crossref","unstructured":"[20]R.\u00a0Curtmola, O.\u00a0Khan, R.\u00a0Burns and G.\u00a0Ateniese, MR-PDP: Multiple-replica provable data possession, in: Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems, ICDCS\u201908, IEEE Computer Society, Washington, DC, USA, 2008, pp.\u00a0411\u2013420.","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref021","doi-asserted-by":"crossref","unstructured":"[21]I.\u00a0Damg\u00e5rd, Towards practical public key systems secure against chosen ciphertext attacks, in: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO\u201991, Springer, London, UK, 1992, pp.\u00a0445\u2013456.","DOI":"10.1007\/3-540-46766-1_36"},{"key":"ref022","doi-asserted-by":"crossref","unstructured":"[22]Y.\u00a0Dodis, S.\u00a0Vadhan and D.\u00a0Wichs, Proofs of retrievability via hardness amplification, in: Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, TCC\u201909, Springer, Berlin, Heidelberg, 2009, pp.\u00a0109\u2013127.","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"[23]R.\u00a0Du, L.\u00a0Deng, J.\u00a0Chen, K.\u00a0He and M.\u00a0Zheng, Proofs of ownership and retrievability in cloud storage, in: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, 24\u201326 September 2014, 2014, pp.\u00a0328\u2013335.","DOI":"10.1109\/TrustCom.2014.44"},{"key":"ref024","doi-asserted-by":"crossref","unstructured":"[24]C.\u00a0Erway, A.\u00a0K\u00fcp\u00e7\u00fc, C.\u00a0Papamanthou and R.\u00a0Tamassia, Dynamic provable data possession, in: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS\u201909, ACM, New York, NY, USA, 2009, pp.\u00a0213\u2013222.","DOI":"10.1145\/1653662.1653688"},{"key":"ref025","doi-asserted-by":"crossref","unstructured":"[25]M.\u00a0Etemad and A.\u00a0K\u00fcp\u00e7\u00fc, Transparent, distributed, and replicated dynamic provable data possession, in: Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS\u201913, Springer, Berlin, Heidelberg, 2013, pp.\u00a01\u201318.","DOI":"10.1007\/978-3-642-38980-1_1"},{"key":"ref026","doi-asserted-by":"crossref","unstructured":"[26]M.T.\u00a0Goodrich, C.\u00a0Papamanthou, R.\u00a0Tamassia and N.\u00a0Triandopoulos, Athos: Efficient authentication of outsourced file systems, in: Proceedings of the 11th International Conference on Information Security, ISC\u201908, Springer, Berlin, Heidelberg, 2008, pp.\u00a080\u201396.","DOI":"10.1007\/978-3-540-85886-7_6"},{"key":"ref027","doi-asserted-by":"crossref","unstructured":"[27]M.T.\u00a0Goodrich, R.\u00a0Tamassia and A.\u00a0Schwerin, Implementation of an authenticated dictionary with skip lists and commutative hashing, in: DARPA Information Survivability Conference & Exposition II, 2001, DISCEX\u201901, Proceedings, Vol.\u00a02, 2001, pp.\u00a068\u201382.","DOI":"10.1109\/DISCEX.2001.932160"},{"issue":"2","key":"ref028","first-page":"339","volume":"8","author":"Guang Y.","year":"2013","journal-title":"Journal of Networks"},{"key":"ref029","doi-asserted-by":"crossref","unstructured":"[29]S.\u00a0Han, S.\u00a0Liu, K.\u00a0Chen and D.\u00a0Gu, Proofs of retrievability based on MRD codes, in: Information Security Practice and Experience \u2013 10th International Conference, ISPEC 2014, Proceedings, Fuzhou, China, 5\u20138 May 2014, 2014, pp.\u00a0330\u2013345.","DOI":"10.1007\/978-3-319-06320-1_25"},{"key":"ref030","doi-asserted-by":"crossref","unstructured":"[30]A.\u00a0Heitzmann, B.\u00a0Palazzi, C.\u00a0Papamanthou and R.\u00a0Tamassia, Efficient integrity checking of untrusted network storage, in: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS\u201908, ACM, New York, NY, USA, 2008, pp.\u00a043\u201354.","DOI":"10.1145\/1456469.1456479"},{"key":"ref031","doi-asserted-by":"crossref","unstructured":"[31]K.\u00a0Huang, J.\u00a0Liu, M.\u00a0Xian, H.\u00a0Wang and S.\u00a0Fu, Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage, in: IEEE International Conference on Communications, ICC 2014, Sydney, Australia, 10\u201314 June 2014, Workshops Proceedings, 2014, pp.\u00a0712\u2013717.","DOI":"10.1109\/ICCW.2014.6881283"},{"key":"ref032","unstructured":"[32]ISO, ISO\/HL7 10781:2009 \u2013 Electronic health record-system functional model, Release 1.1, 2009."},{"key":"ref033","doi-asserted-by":"crossref","unstructured":"[33]A.\u00a0Juels and B.S.\u00a0KaliskiJr., PORs: Proofs of retrievability for large files, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS\u201907, ACM, New York, NY, USA, 2007, pp.\u00a0584\u2013597.","DOI":"10.1145\/1315245.1315317"},{"key":"ref034","doi-asserted-by":"crossref","unstructured":"[34]J.\u00a0Li, X.\u00a0Tan, X.\u00a0Chen and D.S.\u00a0Wong, An efficient proof of retrievability with public auditing in cloud computing, in: Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, INCOS\u201913, IEEE Computer Society, Washington, DC, USA, 2013, pp.\u00a093\u201398.","DOI":"10.1109\/INCoS.2013.185"},{"key":"ref035","unstructured":"[35]B.\u00a0Lynn, On the implementation of pairing-based cryptosystems, PhD dissertation, Stanford University, 2007."},{"key":"ref036","doi-asserted-by":"crossref","unstructured":"[36]R.C.\u00a0Merkle, A digital signature based on a conventional encryption function, in: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO\u201987, Springer, London, UK, 1988, pp.\u00a0369\u2013378.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"ref037","unstructured":"[37]Microsoft, HealthVault, available at: https:\/\/www.healthvault.com\/."},{"key":"ref038","doi-asserted-by":"crossref","unstructured":"[38]Z.\u00a0Mo, Y.\u00a0Zhou and S.\u00a0Chen, A\u00a0dynamic proof of retrievability (PoR) scheme with O(logn) complexity, in: 2012 IEEE International Conference on Communications (ICC), June 2012, 2012, pp.\u00a0912\u2013916.","DOI":"10.1109\/ICC.2012.6364056"},{"key":"ref039","doi-asserted-by":"crossref","unstructured":"[39]A.\u00a0Mohan and R.\u00a0Katti, Provable data possession using sigma-protocols, in: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TRUSTCOM\u201912, IEEE Computer Society, Washington, DC, USA, 2012, pp.\u00a0565\u2013572.","DOI":"10.1109\/TrustCom.2012.227"},{"key":"ref040","doi-asserted-by":"crossref","unstructured":"[40]C.\u00a0Papamanthou, R.\u00a0Tamassia and N.\u00a0Triandopoulos, Authenticated hash tables, in: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS\u201908, ACM, New York, NY, USA, 2008, pp.\u00a0437\u2013448.","DOI":"10.1145\/1455770.1455826"},{"key":"ref041","doi-asserted-by":"crossref","unstructured":"[41]B.R.\u00a0Purushothama and B.B.\u00a0Amberker, Publicly auditable provable data possession scheme for outsourced data in the public cloud using polynomial interpolation, in: Recent Trends in Computer Networks and Distributed Systems Security, Springer, 2012, pp.\u00a011\u201322.","DOI":"10.1007\/978-3-642-34135-9_2"},{"key":"ref042","doi-asserted-by":"crossref","unstructured":"[42]S.\u00a0Sarkar and R.\u00a0Safavi-Naini, Proofs of retrievability via fountain code, in: Proceedings of the 5th International Conference on Foundations and Practice of Security, FPS\u201912, Springer, Berlin, Heidelberg, 2013, pp.\u00a018\u201332.","DOI":"10.1007\/978-3-642-37119-6_2"},{"key":"ref043","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"ref044","doi-asserted-by":"crossref","unstructured":"[44]S.T.\u00a0Shen and W.G.\u00a0Tzeng, Delegable provable data possession for remote data in the clouds, in: Proceedings of the 13th International Conference on Information and Communications Security, ICICS\u201911, Springer, Berlin, Heidelberg, 2011, pp.\u00a093\u2013111.","DOI":"10.1007\/978-3-642-25243-3_8"},{"key":"ref045","doi-asserted-by":"crossref","unstructured":"[45]E.\u00a0Shi, E.\u00a0Stefanov and C.\u00a0Papamanthou, Practical dynamic proofs of retrievability, in: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS\u201913, ACM, New York, NY, USA, 2013, pp.\u00a0325\u2013336.","DOI":"10.1145\/2508859.2516669"},{"key":"ref046","doi-asserted-by":"crossref","unstructured":"[46]E.\u00a0Stefanov, M.\u00a0van Dijk, A.\u00a0Juels and A.\u00a0Oprea, Iris: A scalable cloud file system with efficient integrity checks, in: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC\u201912, ACM, New York, NY, USA, 2012, pp.\u00a0229\u2013238.","DOI":"10.1145\/2420950.2420985"},{"key":"ref047","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref048","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"ref049","unstructured":"[49]C.\u00a0Wang, Q.\u00a0Wang, K.\u00a0Ren and W.\u00a0Lou, Ensuring data storage security in cloud computing, in: Proceedings of the 17th International Workshop on Quality of Service \u2013 IWQoS\u201909, July 2009, 2009, pp.\u00a01\u20139."},{"key":"ref050","unstructured":"[50]C.\u00a0Wang, Q.\u00a0Wang, K.\u00a0Ren and W.\u00a0Lou, Privacy-preserving public auditing for data storage security in cloud computing, in: Proceedings of the 29th Conference on Information Communications, INFOCOM\u201910, IEEE Press, Piscataway, NJ, USA, 2010, pp.\u00a0525\u2013533."},{"key":"ref051","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.35"},{"key":"ref052","doi-asserted-by":"crossref","unstructured":"[52]Q.\u00a0Wang, C.\u00a0Wang, J.\u00a0Li, K.\u00a0Ren and W.\u00a0Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in: Proceedings of the 14th European Conference on Research in Computer Security, ESORICS\u201909, Springer, Berlin, Heidelberg, 2009, pp.\u00a0355\u2013370.","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"ref053","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref054","unstructured":"[54]WHO, Medical records manual \u2013 A guide for developing countries, 2001."},{"key":"ref055","doi-asserted-by":"crossref","unstructured":"[55]J.\u00a0Xu and E.C.\u00a0Chang, Towards efficient proofs of retrievability, in: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS\u201912, ACM, New York, NY, USA, 2012, pp.\u00a079\u201380.","DOI":"10.1145\/2414456.2414503"},{"key":"ref056","doi-asserted-by":"crossref","unstructured":"[56]J.\u00a0Yuan and S.\u00a0Yu, Proofs of retrievability with public verifiability and constant communication cost in cloud, in: Proceedings of the 2013 International Workshop on Security in Cloud Computing, Cloud Computing\u201913, ACM, New York, NY, USA, 2013, pp.\u00a019\u201326.","DOI":"10.1145\/2484402.2484408"},{"key":"ref057","doi-asserted-by":"crossref","unstructured":"[57]Y.\u00a0Zhang and M.\u00a0Blanton, Efficient dynamic provable possession of remote data via balanced update trees, in: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIACCS\u201913, ACM, New York, NY, USA, 2013, pp.\u00a0183\u2013194.","DOI":"10.1145\/2484313.2484339"},{"key":"ref058","doi-asserted-by":"crossref","unstructured":"[58]Q.\u00a0Zheng and S.\u00a0Xu, Secure and efficient proof of storage with deduplication, in: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY\u201912, ACM, New York, NY, USA, 2012, pp.\u00a01\u201312.","DOI":"10.1145\/2133601.2133603"},{"key":"ref059","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.51"},{"key":"ref060","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"ref061","doi-asserted-by":"crossref","unstructured":"[61]Y.\u00a0Zhu, H.\u00a0Wang, Z.\u00a0Hu, G.J.\u00a0Ahn, H.\u00a0Hu and S.S.\u00a0Yau, Efficient provable data possession for hybrid clouds, in: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS\u201910, ACM, New York, NY, USA, 2010, pp.\u00a0756\u2013758.","DOI":"10.1145\/1866307.1866421"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-150527","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-150527","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-150527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T14:05:51Z","timestamp":1741615551000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-150527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,9,16]]}},"alternative-id":["10.3233\/JCS-150527"],"URL":"https:\/\/doi.org\/10.3233\/jcs-150527","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"type":"print","value":"0926-227X"},{"type":"electronic","value":"1875-8924"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}