{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T11:39:45Z","timestamp":1726227585467},"publisher-location":"Cham","reference-count":11,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031409707"},{"type":"electronic","value":"9783031409714"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40971-4_22","type":"book-chapter","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T04:02:25Z","timestamp":1693195345000},"page":"234-243","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Security of\u00a0a\u00a0Cloud Auditing Storage Protocol"],"prefix":"10.1007","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xindi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jindan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM CCS 07: 14th Conference on Computer and Communications Security, pp. 598\u2013609. ACM Press, Alexandria, Virginia, USA (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Han, C., Wang, L.: Public integrity auditing of shared encrypted data within cloud storage group. Wirel. Commun. Mob. Comput. 2022 (2022). Article ID 1493768","DOI":"10.1155\/2022\/1493768"},{"issue":"5","key":"22_CR3","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.dcan.2022.04.017","volume":"8","author":"Y Huang","year":"2022","unstructured":"Huang, Y., Yu, Y., Li, H., Li, Y., Tian, A.: Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection. Digit. Commun. Netw. 8(5), 604\u2013613 (2022)","journal-title":"Digit. Commun. Netw."},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.future.2016.02.003","volume":"62","author":"Y Yu","year":"2016","unstructured":"Yu, Y., et al.: Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62, 85\u201391 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"22_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TETC.2017.2759329","volume":"8","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Li, Y., Yang, B., Susilo, W., Yang, G., Bai, J.: Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Trans. Emerg. Top. Comput. 8(2), 377\u2013390 (2020)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90\u2013107. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89255-7_7"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 13: 20th Conference on Computer and Communications Security, pp. 325\u2013336. ACM Press, Berlin, Germany (2013)","DOI":"10.1145\/2508859.2516669"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Q Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355\u2013370. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04444-1_22"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22, 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"18","key":"22_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5600","volume":"32","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wang, B., Ogiela, M.R., Wang, X.A., Sangaiah, A.K.: New public auditing protocol based on homomorphic tags for secure cloud storage. Concurr. Comput. Pract. Exp. 32(18), e5600 (2020)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.future.2020.01.029","volume":"106","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wang, B., Wang, X.A., Wang, H.: Shuai Xiao, New group user based privacy preserving cloud auditing protocol. Future Gener. Comput. Syst. 106, 585\u2013594 (2020)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Intelligent Networking and Collaborative Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40971-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T04:11:40Z","timestamp":1693195900000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40971-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031409707","9783031409714"],"references-count":11,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-031-40971-4_22","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INCoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Networking and Collaborative Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai University","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incos2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/incos\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}