{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T21:24:39Z","timestamp":1711661079933},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T00:00:00Z","timestamp":1478476800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["61672083,61370190, 61173154, 61272501, 61402029, 61472429, 61202465,61532021"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s12083-016-0530-8","type":"journal-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T02:33:09Z","timestamp":1478485989000},"page":"235-251","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures"],"prefix":"10.1007","volume":"11","author":[{"given":"Yujue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jungang","family":"Lou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,7]]},"reference":[{"issue":"1","key":"530_CR1","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MNET.2016.7389831","volume":"30","author":"Z Su","year":"2016","unstructured":"Su Z, Xu Q, Qi Q (2016) Big data in mobile social networks: a QoE-oriented framework. IEEE Netw 30(1):52\u201357","journal-title":"IEEE Netw"},{"key":"530_CR2","doi-asserted-by":"crossref","unstructured":"Deng H, Wu Q, Qin B, Chow SSM, Domingo-Ferrer J, Shi W (2014) Tracing and revoking leaked credentials: Accountability in leaking sensitive outsourced data. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. ACM, pp 425\u2013434","DOI":"10.1145\/2590296.2590342"},{"key":"530_CR3","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 598\u2013609"},{"key":"530_CR4","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-642-10366-7_19","volume-title":"Advances in cryptology\u2013ASIACRYPT 2009, vol 5912","author":"G Ateniese","year":"2009","unstructured":"Ateniese G, Kamara S, Katz J (2009) Proofs of storage from homomorphic identification protocols. In: Matsui M (ed) Advances in cryptology\u2013ASIACRYPT 2009, vol 5912. Springer, Heidelberg, pp 319\u2013333"},{"key":"530_CR5","doi-asserted-by":"crossref","unstructured":"Deng H, Wu Q, Qin B, Mao J, Liu X, Zhang L, Shi W (2014) Who is touching my cloud. In: Kutylowski M, Vaidya J (eds) Computer Security\u2013ESORICS 2014, vol 8712. Springer International Publishing, pp 362\u2013379","DOI":"10.1007\/978-3-319-11203-9_21"},{"issue":"6","key":"530_CR6","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1007\/s12083-014-0295-x","volume":"8","author":"J Xiong","year":"2015","unstructured":"Xiong J, Li F, Ma J, Liu X, Yao Z, Chen PS (2015) A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Networking and Applications 8(6):1025\u20131037","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"5","key":"530_CR7","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2015","unstructured":"Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing 12(5):546\u2013556","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"530_CR8","doi-asserted-by":"crossref","unstructured":"Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput","DOI":"10.1109\/TC.2015.2512870"},{"key":"530_CR9","doi-asserted-by":"crossref","unstructured":"Wen M, Lu K, Lei J, Li F, Li J (2015) BDO-SD: An efficient scheme for big data outsourcing with secure deduplication. In: 2015 IEEE Conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 214\u2013219","DOI":"10.1109\/INFCOMW.2015.7179387"},{"issue":"4","key":"530_CR10","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/TCSS.2015.2514088","volume":"2","author":"M Wen","year":"2015","unstructured":"Wen M, Ota K, Li H, Lei J, Gu C, Su Z (2015) Secure data deduplication with reliable key management for dynamic updates in cpss. IEEE Transactions on Computational Social Systems 2(4):137\u2013147","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"2","key":"530_CR11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MNET.2015.7064903","volume":"29","author":"CM Yu","year":"2015","unstructured":"Yu CM, Chen CY, Chao HC (2015) Proof of ownership in deduplicated cloud storage with mobile device efficiency. IEEE Netw 29(2):51\u201355","journal-title":"IEEE Netw"},{"issue":"4","key":"530_CR12","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TC.2014.2315619","volume":"64","author":"X Huang","year":"2015","unstructured":"Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971\u2013983","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"530_CR13","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing 11(6): 568\u2013581","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"530_CR14","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1109\/TC.2015.2419662","volume":"65","author":"Q Wu","year":"2016","unstructured":"Wu Q, Qin B, Zhang L, Domingo-Ferrer J, Farr\u00e0s O, Manj\u00f3n JA (2016) Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans Comput 65(2): 466\u2013479","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"530_CR15","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TNET.2012.2208201","volume":"21","author":"Q Wu","year":"2013","unstructured":"Wu Q, Qin B, Zhang L, Domingo-Ferrer J, Manj\u00f3n JA (2013) Fast transmission to remote cooperative groups: a new key management paradigm. IEEE\/ACM Trans Networking 21(2): 621\u2013633","journal-title":"IEEE\/ACM Trans Networking"},{"key":"530_CR16","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski BS Jr (2007) PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM , pp 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"530_CR17","doi-asserted-by":"crossref","unstructured":"Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. ACM","DOI":"10.1145\/1460877.1460889"},{"key":"530_CR18","doi-asserted-by":"crossref","unstructured":"Erway C, K\u00fcp\u00e7\u00fc A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, pp 213\u2013222","DOI":"10.1145\/1653662.1653688"},{"issue":"3","key":"530_CR19","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442\u2013483","journal-title":"J Cryptol"},{"issue":"3","key":"530_CR20","doi-asserted-by":"crossref","first-page":"403","DOI":"10.3233\/JCS-150525","volume":"23","author":"J Yuan","year":"2015","unstructured":"Yuan J, Yu S (2015) PCPOR: Public and constant-cost proofs of retrievability in cloud. J Comput Secur 23(3):403\u2013425","journal-title":"J Comput Secur"},{"issue":"2","key":"530_CR21","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D Boneh","year":"2008","unstructured":"Boneh D, Boyen X (2008) Short signatures without random oracles and the sdh assumption in bilinear groups. J Cryptol 21(2):149\u2013177","journal-title":"J Cryptol"},{"key":"530_CR22","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in cryptology\u2013ASIACRYPT 2010, vol 6477","author":"A Kate","year":"2010","unstructured":"Kate A, Zaverucha GM, Goldberg I (2010) Constant-size commitments to polynomials and their applications. In: Abe M (ed) Advances in cryptology\u2013ASIACRYPT 2010, vol 6477. Springer, Heidelberg, pp 177\u2013194"},{"key":"530_CR23","doi-asserted-by":"crossref","unstructured":"Wang Y, Wu Q, Qin B, Chen X, Huang X, Zhou Y (2015) Group-oriented proofs of storage. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. ACM, pp 73\u201384","DOI":"10.1145\/2714576.2714630"},{"key":"530_CR24","doi-asserted-by":"crossref","unstructured":"Xu J, Chang EC (2012) Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM, pp 79\u201380","DOI":"10.1145\/2414456.2414503"},{"key":"530_CR25","doi-asserted-by":"crossref","unstructured":"Wang Y, Wu Q, Wong DS, Qin B, Chow SSM, Liu Z, Tan X (2014) Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kutylowski M, Vaidya J (eds) Computer Security\u2013ESORICS 2014, vol 8712. Springer International Publishing, pp 326\u2013343","DOI":"10.1007\/978-3-319-11203-9_19"},{"key":"530_CR26","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-642-31284-7_30","volume-title":"Applied cryptography and network security, vol 7341","author":"B Wang","year":"2012","unstructured":"Wang B, Li B, Li H (2012) Knox: Privacy-preserving auditing for shared data with large groups in the cloud. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security, vol 7341. Springer, Heidelberg, pp 507\u2013525"},{"key":"530_CR27","doi-asserted-by":"crossref","unstructured":"Wang B, Li B, Li H (2012) Oruta: Privacy-preserving public auditing for shared data in the cloud. In: 2012 IEEE 5th international conference on Cloud computing (CLOUD), pp 295\u2013302","DOI":"10.1109\/CLOUD.2012.46"},{"key":"530_CR28","doi-asserted-by":"crossref","unstructured":"Wang B, Chow SSM, Li M, Li H (2013) Storing shared data on the cloud via security-mediator. In: 2013 IEEE 33rd international conference on Distributed computing systems (ICDCS), pp 124\u2013133","DOI":"10.1109\/ICDCS.2013.60"},{"issue":"2","key":"530_CR29","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang H, Wu Q, Qin B, Domingo-Ferrer J (2014) Identity-based remote data possession checking in public clouds. IET Inf Secur 8(2):114\u2013121","journal-title":"IET Inf Secur"},{"key":"530_CR30","doi-asserted-by":"crossref","unstructured":"Yu Y, Mu Y, Ni J, Deng J, Huang K (2014) Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage. In: Au MH, Carminati B, Kuo CCJ (eds) Network and System Security, vol 8792. Springer International Publishing, pp 28\u201340","DOI":"10.1007\/978-3-319-11698-3_3"},{"key":"530_CR31","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/978-3-642-30057-8_41","volume-title":"Public key cryptography\u2013PKC 2012, vol 7293","author":"DM Freeman","year":"2012","unstructured":"Freeman DM, Fischlin M, Buchmann J, Manulis M (2012) Improved security for linearly homomorphic signatures: a generic framework Public key cryptography\u2013PKC 2012, vol 7293. Springer, Heidelberg, pp 697\u2013714"},{"issue":"2","key":"530_CR32","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362\u2013375","journal-title":"IEEE Trans Comput"},{"key":"530_CR33","unstructured":"Ren Y, Shen J, Zheng Y, Wang J, Chao HC (2015) Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Networking and Applications:1\u201310"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0530-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0530-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0530-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T13:44:03Z","timestamp":1518615843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0530-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,7]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["530"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0530-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,7]]}}}