{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:06:53Z","timestamp":1725854813193},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319388977"},{"type":"electronic","value":"9783319388984"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-38898-4_18","type":"book-chapter","created":{"date-parts":[[2016,5,6]],"date-time":"2016-05-06T11:44:40Z","timestamp":1462535080000},"page":"301-321","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Provable Data Possession Scheme with Data Hierarchy in Cloud"],"prefix":"10.1007","author":[{"given":"Changlu","family":"Lin","sequence":"first","affiliation":[]},{"given":"Fucai","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS 2014, pp. 831\u2013843 (2014)","DOI":"10.1145\/2660267.2660310"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and communications security, CCS 2007, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"18_CR3","unstructured":"Barsoum, A.F., Hasan, M.A.: Provable possession and replication of data over cloud servers. Centre For Applied Cryptographic Research (CACR), University of Waterloo, Report 2010\/32 (2010). \n http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2010\/cacr2010-32.pdf"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: Proceedings of the ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 43\u201354 (2009)","DOI":"10.1145\/1655008.1655015"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-replica provable data possession. In: Proceedings of the 28th International Conference on Distributed Computing Systems, ICDCS 2008, pp. 411\u2013420 (2008)","DOI":"10.1109\/ICDCS.2008.68"},{"issue":"4","key":"18_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway, C.C., K\u00fcp\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1\u201329 (2015). article 15","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-319-19962-7_23","volume-title":"Information Security and Privacy","author":"C Gritti","year":"2015","unstructured":"Gritti, C., Susilo, W., Plantard, T.: Efficient dynamic provable data possession with public verifiability and data privacy. In: Foo, E., Stebila, D. (eds.) ACISP 2015. LNCS, vol. 9144, pp. 395\u2013412. Springer, Heidelberg (2015)"},{"issue":"6","key":"18_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.14257\/ijsia.2013.7.6.02","volume":"7","author":"Y Ren","year":"2013","unstructured":"Ren, Y., Xu, J., Wang, J., Kim, J.-U.: Designated-verifier provable data possession in public cloud storage. Int. J. Secur. Its Appl. 7(6), 11\u201320 (2013)","journal-title":"Int. J. Secur. Its Appl."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Ren, Y., Yang, Z., Wang, J., Fang, L.: Attributed based provable data possession in public cloud storage. In: Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, pp. 710\u2013713 (2014)","DOI":"10.1109\/IIH-MSP.2014.183"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-25243-3_8","volume-title":"Information and Communications Security","author":"S-T Shen","year":"2011","unstructured":"Shen, S.-T., Tzeng, W.-G.: Delegable provable data possession for remote data in the clouds. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 93\u2013111. Springer, Heidelberg (2011)"},{"issue":"4","key":"18_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2764465","volume":"47","author":"Mehdi Sookhak","year":"2015","unstructured":"Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S.U., Buyya, R., Zomaya, A.Y.: Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues. ACM Comput. Surv. 47(4), Article No. 65, p. 34 (2015)","journal-title":"ACM Computing Surveys"},{"issue":"8","key":"18_CR12","first-page":"3403","volume":"10","author":"X Sun","year":"2014","unstructured":"Sun, X., Chen, L., Xia, Z., Zhu, Y.: Cooperative provable data possession with stateless verification in multicloud storage. J. Comput. Inf. Syst. 10(8), 3403\u20133411 (2014)","journal-title":"J. Comput. Inf. Syst."},{"issue":"9","key":"18_CR13","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/CC.2014.6969712","volume":"11","author":"S Tan","year":"2014","unstructured":"Tan, S., Tan, L., Lin, X., Jia, Y.: An efficient method for checking the integrity of data in the Cloud. China Commun. 11(9), 68\u201381 (2014)","journal-title":"China Commun."},{"issue":"4","key":"18_CR14","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2012.35","volume":"6","author":"H Wang","year":"2012","unstructured":"Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551\u2013559 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"18_CR15","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"18_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114\u2013121 (2014)","journal-title":"IET Inf. Secur."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. In: Proceedings of the International Workshop on Security in Cloud Computing - Cloud Computing 2013, pp. 19\u201326 (2013)","DOI":"10.1145\/2484402.2484408"},{"issue":"12","key":"18_CR18","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1109\/TIFS.2013.2287858","volume":"8","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Ahn, G.-J., Hu, H.X., Ma, D., Wang, H.X.: Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12), 2138\u20132153 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Ahn, G.-J., Hu, H.X., Wang, H.X.: Cryptographic role-based security mechanisms based on role-key hierarchy. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 314\u2013319 (2010)","DOI":"10.1145\/1755688.1755728"},{"issue":"8","key":"18_CR20","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1007\/s11432-011-4293-9","volume":"54","author":"Y Zhu","year":"2011","unstructured":"Zhu, Y., Wang, H.X., Hu, Z.X., Ahn, G.-J., Hu, H.X.: Zero-knowledge proofs of retrievability. Sci. China Inf. Sci. 54(8), 1608\u20131617 (2011)","journal-title":"Sci. China Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-38898-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:10:18Z","timestamp":1559445018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-38898-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319388977","9783319388984"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-38898-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}