{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:53:20Z","timestamp":1730271200300,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013135","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:34:53Z","timestamp":1421850893000},"page":"280-284","source":"Crossref","is-referenced-by-count":9,"title":["Data integrity and privacy model in cloud computing"],"prefix":"10.1109","author":[{"given":"Mohammed Faez","family":"Al-Jaberi","sequence":"first","affiliation":[]},{"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"18","article-title":"Dynamic provable data possession with batch-update verifiability","author":"wang","year":"2012","journal-title":"Intelligent Control Automatic Detection and High-end Equipment (ICADE) 2012 IEEE International Conference on"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"16","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"Computer Security - ESORICS 2009 2009 Springer Berlin Heidelberg"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.024"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2012.22"},{"journal-title":"Handbook on Securing Cyber-physical Critical Infrastructure","year":"2012","author":"das","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"21","first-page":"4","article-title":"Homomorphic authentication with random masking technique ensuring privacy & security in cloud computing","volume":"2","author":"jachak","year":"2012","journal-title":"BIOINFO Security Informatics 2012"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.139"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.35"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716422"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRD.2011.5764279"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190647"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.94"},{"key":"5","article-title":"Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms","author":"jun","year":"2010","journal-title":"Parallel Processing Workshops (ICPPW) 2010 39th International Conference on"},{"key":"4","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","author":"ning","year":"2011","journal-title":"INFOCOM 2011 Proceedings IEEE"},{"key":"9","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"0","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications security2007"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2014,8,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013135.pdf?arnumber=7013135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:43:43Z","timestamp":1490305423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013135","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}