{"id":"https://openalex.org/W1999964312","doi":"https://doi.org/10.1109/iih-msp.2014.249","title":"Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage","display_name":"Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W1999964312","doi":"https://doi.org/10.1109/iih-msp.2014.249","mag":"1999964312"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2014.249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059497161","display_name":"Yongjun Ren","orcid":"https://orcid.org/0000-0001-6602-9576"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"funder","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjun Ren","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"funder","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113414416","display_name":"Jin Wang","orcid":"https://orcid.org/0000-0002-8298-4378"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"funder","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Wang","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025551938","display_name":"Liming Fang","orcid":"https://orcid.org/0000-0002-1420-2047"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"funder","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Fang","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.206,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.460391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":79},"biblio":{"volume":"7043","issue":null,"first_page":"795","last_page":"798"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9936,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9698,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5606882},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.49785304},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.42912376},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.42800087},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.41245252}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.76160467},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7279292},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6916682},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.67678744},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5606882},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5233328},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.50605744},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.49785304},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.470609},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.42912376},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.42800087},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41245252},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2566178},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15746263},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.093732715},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iih-msp.2014.249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1594668186","https://openalex.org/W1800093586","https://openalex.org/W1802540854","https://openalex.org/W2010287286","https://openalex.org/W2014698831","https://openalex.org/W2027703952","https://openalex.org/W2081232727","https://openalex.org/W2123069643","https://openalex.org/W4253779865","https://openalex.org/W75089012","https://openalex.org/W89553247"],"related_works":["https://openalex.org/W4311223005","https://openalex.org/W4240151277","https://openalex.org/W2736386444","https://openalex.org/W2625231702","https://openalex.org/W2605525988","https://openalex.org/W2602423869","https://openalex.org/W2599115144","https://openalex.org/W2370840345","https://openalex.org/W2187109955","https://openalex.org/W1852630156"],"abstract_inverted_index":{"Cloud":[0],"storage":[1],"is":[2],"now":[3],"an":[4,16,62],"important":[5,17],"development":[6],"trend":[7],"in":[8,56,112],"information":[9,12],"technology.":[10],"However,":[11],"security":[13],"has":[14],"become":[15],"problem":[18],"to":[19,84,86,95,108],"impede":[20],"it":[21],"for":[22],"commercial":[23],"application,":[24],"such":[25],"as":[26],"data":[27,70],"confidentiality,":[28],"integrity,and":[29],"availability.":[30],"In":[31],"this":[32],"paper,":[33],"we":[34],"revisit":[35],"the":[36,44,68,81,90,96,99,110],"two":[37],"private":[38],"PDP":[39],"schemes.":[40,114],"We":[41,103],"show":[42],"that":[43],"property":[45],"of":[46,98],"correctness":[47],"cannot":[48],"be":[49],"achieved":[50],"when":[51],"active":[52,63],"adversaries":[53],"are":[54],"involved":[55],"these":[57,113],"auditing":[58,82],"systems.":[59],"More":[60],"specifically,":[61],"adversary":[64],"can":[65,79],"arbitrarily":[66],"tamper":[67],"cloud":[69],"and":[71,88,93],"produce":[72],"a":[73,106],"valid":[74],"auditing.":[75],"Moreover,the":[76],"malicious":[77],"CSS":[78],"put":[80],"right":[83],"entrust":[85],"anyone":[87],"control":[89],"delegation":[91],"key":[92],"lead":[94],"failure":[97],"subsequent":[100],"validation":[101],"work.":[102],"also":[104],"propose":[105],"solution":[107],"resolve":[109],"weakness":[111]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1999964312","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-04-16T21:59:02.276947","created_date":"2016-06-24"}