{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T20:30:47Z","timestamp":1694118647991},"reference-count":32,"publisher":"Wiley","issue":"18","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572390","U1736111"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007751","name":"AGH University of Science and Technology","doi-asserted-by":"publisher","award":["16.16.120.773"],"id":[{"id":"10.13039\/501100007751","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772550"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2020,9,25]]},"abstract":"Summary<\/jats:title>Outsourcing datum to the cloud servers is more and more popular for most data owners and enterprises. However, how to ensure the outsourced datum to be kept secure is very important. Especially, how to check the outsourced datum's integrity is a very challenge problem. Until now, there are many cryptographic protocols proposed to solve this problem, such as (dynamic) provable data position protocol, (dynamic) proof of retrievability protocol, etc. Recently, Tian et al proposed a dynamic\u2010hash\u2010table\u2010based public auditing scheme for secure cloud storage, which aims at simultaneously supporting secure dynamic data updating and secure public auditing for cloud storage. However, we find a security flaw in this protocol; concretely, the signature algorithm for the data blocks in their protocol is not secure; the cloud servers can easily modify the outsourced data blocks without detecting. Finally, we give a new protocol by using homomorphic tags based on their protocol and roughly analysis its security.<\/jats:p>","DOI":"10.1002\/cpe.5600","type":"journal-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T05:04:34Z","timestamp":1576818274000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["New public auditing protocol based on homomorphic tags for secure cloud storage"],"prefix":"10.1002","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1499-8460","authenticated-orcid":false,"given":"Jindan","family":"Zhang","sequence":"first","affiliation":[{"name":"Xianyang Vocational Technical College Xianyang China"},{"name":"State Key Laboratory of Integrated Service Networks Xidian University Xi'an China"}]},{"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks Xidian University Xi'an China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8298-8627","authenticated-orcid":false,"given":"Marek R.","family":"Ogiela","sequence":"additional","affiliation":[{"name":"AGH University of Science and Technology Krakow Poland"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2070-4913","authenticated-orcid":false,"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[{"name":"Engineering University of CAPF Xi'an China"}]},{"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[{"name":"School of Computing Science and Engineering Vellore Institute of Technology Vellore India"}]}],"member":"311","published-online":{"date-parts":[[2019,12,19]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18030760"},{"issue":"2","key":"e_1_2_8_3_1","first-page":"120","article-title":"Novel implementation of defence strategy of relay attack based on cloud in RFID systems","volume":"11","author":"Xu H","year":"2019","journal-title":"Int J Inf Comput Secur"},{"key":"e_1_2_8_4_1","doi-asserted-by":"crossref","unstructured":"OgielaL OgielaMR OgielaU.Efficiency of strategic data sharing and management protocols. Paper presented at: 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS);2016;Fukuoka Japan.https:\/\/doi.org\/10.1109\/IMIS.2016.119","DOI":"10.1109\/IMIS.2016.119"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24267-0_5"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2409213"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2512589"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516669"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414503"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_17"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"WangB LiB LiH.Public auditing for shared data with efficient user revocation in the cloud. Paper presented at: 32nd IEEE International Conference on Computer Communications (INFOCOM 2013);2013;Turin Italy.","DOI":"10.1109\/INFCOM.2013.6567101"},{"key":"e_1_2_8_15_1","first-page":"149","article-title":"Secure and constant cost public cloud storage auditing with deduplication","volume":"2013","author":"Yuan J","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.1"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.12.043"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.049"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2761806"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2017.07.008"},{"key":"e_1_2_8_23_1","article-title":"Attribute\u2010based cloud data integrity auditing for secure outsourced storage","author":"Yu Y","year":"2018","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"e_1_2_8_24_1","article-title":"Fuzzy identity\u2010based data integrity auditing for reliable cloud storage systems","author":"Li Y","year":"2017","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"YuanJ YuS.Secure and constant cost public cloud storage auditing with deduplication. Paper presented at: 2013 IEEE Conference on Communications and Network Security (CNS);2013;National Harbor MD.","DOI":"10.1109\/CNS.2013.6682702"},{"key":"e_1_2_8_27_1","article-title":"Improved secure fuzzy auditing protocol for cloud data storage","author":"Zhang J","year":"2018","journal-title":"Soft Computing"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714630"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4096"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4781"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.5600","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5600","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.5600","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T18:48:37Z","timestamp":1693939717000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.5600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":32,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2020,9,25]]}},"alternative-id":["10.1002\/cpe.5600"],"URL":"https:\/\/doi.org\/10.1002\/cpe.5600","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,19]]},"assertion":[{"value":"2019-05-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}