{"id":"https://openalex.org/W2485512380","doi":"https://doi.org/10.1002/sec.1571","title":"ESDR: an efficient and secure data repairing paradigm in cloud storage","display_name":"ESDR: an efficient and secure data repairing paradigm in cloud storage","publication_year":2016,"publication_date":"2016-07-31","ids":{"openalex":"https://openalex.org/W2485512380","doi":"https://doi.org/10.1002/sec.1571","mag":"2485512380"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1571","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"https://doi.org/10.1002/sec.1571","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056205130","display_name":"Shungan Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shungan Zhou","raw_affiliation_strings":["School of Computer; Wuhan University; Wuhan Hubei 430072 China"],"affiliations":[{"raw_affiliation_string":"School of Computer; Wuhan University; Wuhan Hubei 430072 China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["School of Computer; Wuhan University; Wuhan Hubei 430072 China"],"affiliations":[{"raw_affiliation_string":"School of Computer; Wuhan University; Wuhan Hubei 430072 China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["School of Computer; Wuhan University; Wuhan Hubei 430072 China"],"affiliations":[{"raw_affiliation_string":"School of Computer; Wuhan University; Wuhan Hubei 430072 China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Computer; Wuhan University; Wuhan Hubei 430072 China"],"affiliations":[{"raw_affiliation_string":"School of Computer; Wuhan University; Wuhan Hubei 430072 China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101541934","display_name":"Hua Deng","orcid":"https://orcid.org/0000-0002-6536-8071"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Deng","raw_affiliation_strings":["State Grid Information and Communication Company of Hunan Electric Power Corp; Changsha Hunan 410000 China"],"affiliations":[{"raw_affiliation_string":"State Grid Information and Communication Company of Hunan Electric Power Corp; Changsha Hunan 410000 China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":0.24,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.724431,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":81},"biblio":{"volume":"9","issue":"16","first_page":"3646","last_page":"3657"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.686392},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.60905784},{"id":"https://openalex.org/keywords/data-recovery","display_name":"Data recovery","score":0.45278332},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.4400554},{"id":"https://openalex.org/keywords/storage-model","display_name":"Storage model","score":0.4160555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85756505},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.74859756},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.686392},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6094263},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.60905784},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.52380884},{"id":"https://openalex.org/C529754248","wikidata":"https://www.wikidata.org/wiki/Q1054772","display_name":"Data recovery","level":2,"score":0.45278332},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.4400554},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.43510252},{"id":"https://openalex.org/C2779659223","wikidata":"https://www.wikidata.org/wiki/Q7619926","display_name":"Storage model","level":2,"score":0.4160555},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4107699},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38561302},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17112032},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1571","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/sec.1571","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.82,"id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61173154"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572379"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61272451"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572380"}],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1541359621","https://openalex.org/W1572300106","https://openalex.org/W1591524234","https://openalex.org/W1592092778","https://openalex.org/W1610688607","https://openalex.org/W1659280461","https://openalex.org/W1784020685","https://openalex.org/W1836955865","https://openalex.org/W1979205928","https://openalex.org/W2017864158","https://openalex.org/W2035204644","https://openalex.org/W2048762830","https://openalex.org/W2058863419","https://openalex.org/W2067410255","https://openalex.org/W2076327726","https://openalex.org/W2079493184","https://openalex.org/W2102881299","https://openalex.org/W2105185344","https://openalex.org/W2114296561","https://openalex.org/W2125858711","https://openalex.org/W2150676586","https://openalex.org/W2152924492","https://openalex.org/W2154205416","https://openalex.org/W2157285143","https://openalex.org/W2283945092","https://openalex.org/W2296328808","https://openalex.org/W2963105451","https://openalex.org/W3101647520","https://openalex.org/W3106482607","https://openalex.org/W4256690557","https://openalex.org/W89553247"],"related_works":["https://openalex.org/W4311223005","https://openalex.org/W2625231702","https://openalex.org/W2605525988","https://openalex.org/W2602423869","https://openalex.org/W2370840345","https://openalex.org/W2368976271","https://openalex.org/W2187109955","https://openalex.org/W2097440183","https://openalex.org/W2057452656","https://openalex.org/W1852630156"],"abstract_inverted_index":{"With":[0],"the":[1,29,44,63,70,84,90,126,129,148,168],"dramatic":[2],"development":[3],"of":[4,16,56,73,89,128],"cloud":[5,35,42,198],"computing,":[6],"more":[7,9],"and":[8,59,87,99,118,141,145,163,176,182,191],"challenges":[10],"emerge":[11],"for":[12,53,76],"storing":[13],"massive":[14],"amounts":[15],"data.":[17],"Data":[18],"repairing":[19,112,121,196],"is":[20,79,189],"a":[21,109],"main":[22],"technique":[23],"to":[24,81,115,134,193],"provide":[25],"data":[26,46,71,111,120,131,195],"availability":[27],"in":[28,50,197],"distributed":[30,133],"storage":[31,38,136],"system,":[32],"such":[33,66,95],"as":[34,67,96,116],"platform,":[36],"once":[37],"corruption":[39],"occurs.":[40],"In":[41,124],"storage,":[43],"redundant":[45,130],"are":[47,60,72,132],"commonly":[48],"stored":[49],"different":[51],"places":[52],"better":[54],"capability":[55],"disaster":[57],"recovery":[58],"transferred":[61],"through":[62],"open":[64],"channel,":[65],"Internet.":[68],"Because":[69],"great":[74],"importance":[75],"organizations,":[77],"it":[78],"essential":[80],"systematically":[82],"preserve":[83],"confidentiality,":[85],"integrity,":[86],"authenticity":[88],"data,":[91],"which":[92],"counters":[93],"threats":[94],"wiretapping,":[97],"tampering,":[98],"pollution":[100],"attacks.":[101],"To":[102],"address":[103],"these":[104],"challenges,":[105],"we":[106,154],"put":[107],"forward":[108],"new":[110],"paradigm,":[113,153],"referred":[114],"efficient":[117,192],"secure":[119,194],"ESDR":[122,157],"paradigm.":[123],"ESDR,":[125],"components":[127],"other":[135],"units":[137],"after":[138],"being":[139],"preprocessed":[140],"can":[142],"be":[143],"collected":[144],"reassembled":[146],"onto":[147],"corrupted":[149],"unit.":[150],"Following":[151],"this":[152,187],"propose":[155],"an":[156],"scheme":[158,188],"by":[159],"using":[160],"regenerating":[161],"code":[162],"certificateless":[164],"signcryption":[165],"technique.":[166],"Furthermore,":[167],"proposed":[169],"enc2-mac":[170],"-":[171],"signcrypt":[172],"preprocessing":[173],"promotes":[174],"security":[175],"efficiency":[177],"notably.":[178],"Both":[179],"theoretical":[180],"analysis":[181],"experimental":[183],"evaluation":[184],"confirm":[185],"that":[186],"practical":[190],"storage.":[199],"Copyright":[200],"\u00a9":[201],"2016":[202],"John":[203],"Wiley":[204],"&":[205],"Sons,":[206],"Ltd.":[207]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2485512380","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2024-12-29T05:05:55.604538","created_date":"2016-08-23"}