{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T13:10:54Z","timestamp":1724418654678},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/trustcom.2014.44","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:37:37Z","timestamp":1421869057000},"source":"Crossref","is-referenced-by-count":10,"title":["Proofs of Ownership and Retrievability in Cloud Storage"],"prefix":"10.1109","author":[{"given":"Ruiying","family":"Du","sequence":"first","affiliation":[]},{"given":"Lan","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Minghui","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"Computer Security-ESORICS 2009"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952994"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484408"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133603"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"13","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-88313-5_15","article-title":"Remote integrity check with dishonest storage server","author":"chang","year":"2008","journal-title":"Computer Security-ESORICS 2008"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"12","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","article-title":"Compact proofs of retrievability","author":"shacham","year":"2008","journal-title":"Advances in Cryptology-ASIACRYPT 2008"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"10","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1145\/1315245.1315318","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"7","first-page":"195","article-title":"Weak leakage-resilient client-side deduplication of encrypted data in cloud storage","author":"xu","year":"2013","journal-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.784"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414504"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1210596.1210599"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-7901-X_1"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"}],"event":{"name":"2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","location":"Beijing, China","start":{"date-parts":[[2014,9,24]]},"end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008824\/7011202\/07011267.pdf?arnumber=7011267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:41Z","timestamp":1498190621000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2014.44","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}