{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T03:28:14Z","timestamp":1720754894514},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302457","U21A20465"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["Q24F020036","Q24F020042","Q24F020043"],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2703700"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103676","type":"journal-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T10:09:41Z","timestamp":1702894181000},"page":"103676","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Efficient public auditing scheme for non-administrator group with secure user revocation"],"prefix":"10.1016","volume":"80","author":[{"given":"Jinliang","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7638-4512","authenticated-orcid":false,"given":"Tianqi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Sai","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Haowen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Wenying","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"10","key":"10.1016\/j.jisa.2023.103676_b1","first-page":"2079","article-title":"Protection methods for cloud data security","volume":"58","author":"Shen","year":"2021","journal-title":"J Comput Res Dev"},{"issue":"6","key":"10.1016\/j.jisa.2023.103676_b2","doi-asserted-by":"crossref","first-page":"3774","DOI":"10.1109\/TDSC.2021.3106780","article-title":"Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data","volume":"19","author":"Gao","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"10.1016\/j.jisa.2023.103676_b3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MSEC.2018.2875880","article-title":"Public auditing for trusted cloud storage services","volume":"17","author":"Tian","year":"2019","journal-title":"IEEE Secur Priv"},{"issue":"5","key":"10.1016\/j.jisa.2023.103676_b4","first-page":"2379","article-title":"Blockchain-based private provable data possession","volume":"18","author":"Wang","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"10.1016\/j.jisa.2023.103676_b5","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TIFS.2015.2423264","article-title":"Public integrity auditing for dynamic data sharing with multiuser modification","volume":"10","author":"Yuan","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10.1016\/j.jisa.2023.103676_b6","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TBDATA.2017.2701347","article-title":"NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users","volume":"8","author":"Fu","year":"2022","journal-title":"IEEE Trans Big Data"},{"issue":"2","key":"10.1016\/j.jisa.2023.103676_b7","first-page":"936","article-title":"IPANM: Incentive public auditing scheme for non-manager groups in clouds","volume":"19","author":"Huang","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jisa.2023.103676_b8","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security. 2007, p. 598\u2013609.","DOI":"10.1145\/1315245.1315318"},{"key":"10.1016\/j.jisa.2023.103676_b9","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski Jr. BS. PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security. 2007, p. 584\u201397.","DOI":"10.1145\/1315245.1315317"},{"issue":"1","key":"10.1016\/j.jisa.2023.103676_b10","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","article-title":"Fuzzy identity-based data integrity auditing for reliable cloud storage systems","volume":"16","author":"Li","year":"2019","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"10.1016\/j.jisa.2023.103676_b11","first-page":"1394","article-title":"Dynamic group-oriented provable data possession in the cloud","volume":"18","author":"He","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"10.1016\/j.jisa.2023.103676_b12","first-page":"608","article-title":"Enabling efficient user revocation in identity-based cloud storage auditing for shared big data","volume":"17","author":"Zhang","year":"2018","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"2","key":"10.1016\/j.jisa.2023.103676_b13","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","article-title":"Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage","volume":"14","author":"Shen","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103676_b14","first-page":"1","article-title":"Blockchain-based secure deduplication and shared auditing in decentralized storage","author":"Tian","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"10","key":"10.1016\/j.jisa.2023.103676_b15","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","article-title":"An efficient public auditing protocol with novel dynamic structure for cloud data","volume":"12","author":"Shen","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10.1016\/j.jisa.2023.103676_b16","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","article-title":"Oruta: privacy-preserving public auditing for shared data in the cloud","volume":"2","author":"Wang","year":"2014","journal-title":"IEEE Trans Cloud Comput"},{"key":"10.1016\/j.jisa.2023.103676_b17","series-title":"International conference on applied cryptography and network security","first-page":"507","article-title":"Knox: privacy-preserving auditing for shared data with large groups in the cloud","author":"Wang","year":"2012"},{"issue":"5","key":"10.1016\/j.jisa.2023.103676_b18","first-page":"184","article-title":"Public auditing for shared data with efficient user revocation in the cloud","volume":"2","author":"Ramesh","year":"2017","journal-title":"Int J Adv Res Dev"},{"key":"10.1016\/j.jisa.2023.103676_b19","series-title":"2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1","first-page":"434","article-title":"Efficient integrity auditing for shared data in the cloud with secure user revocation","author":"Luo","year":"2015"},{"key":"10.1016\/j.jisa.2023.103676_b20","article-title":"A privacy-preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare","volume":"2021","author":"Yang","year":"2021","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.jisa.2023.103676_b21","series-title":"International conference on the theory and application of cryptology and information security","first-page":"514","article-title":"Short signatures from the weil pairing","author":"Boneh","year":"2001"},{"key":"10.1016\/j.jisa.2023.103676_b22","series-title":"2012 IEEE fifth international conference on cloud computing","first-page":"295","article-title":"Oruta: Privacy-preserving public auditing for shared data in the cloud","author":"Wang","year":"2012"},{"issue":"11","key":"10.1016\/j.jisa.2023.103676_b23","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun ACM"},{"key":"10.1016\/j.jisa.2023.103676_b24","series-title":"The pairing-based cryptography library","author":"Lynn","year":"2006"},{"key":"10.1016\/j.jisa.2023.103676_b25","series-title":"GNU multiple precision arithmetic library","author":"Granlund","year":"2010"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002600?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002600?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T22:57:15Z","timestamp":1709074635000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":25,"alternative-id":["S2214212623002600"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103676","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Efficient public auditing scheme for non-administrator group with secure user revocation","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103676","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103676"}}