{"id":"https://openalex.org/W2956034303","doi":"https://doi.org/10.1109/tdsc.2019.2925800","title":"Dynamic Group-Oriented Provable Data Possession in the Cloud","display_name":"Dynamic Group-Oriented Provable Data Possession in the Cloud","publication_year":2019,"publication_date":"2019-07-07","ids":{"openalex":"https://openalex.org/W2956034303","doi":"https://doi.org/10.1109/tdsc.2019.2925800","mag":"2956034303"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2925800","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Science and Technology on Communication Security Laboratory, Chengdu, China","Shenzhen Institute of Wuhan University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shenzhen Institute of Wuhan University, Shenzhen, China","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020164684","display_name":"Quan Yuan","orcid":"https://orcid.org/0000-0002-2552-333X"},"institutions":[{"id":"https://openalex.org/I114580094","display_name":"The University of Texas of the Permian Basin","ror":"https://ror.org/051smbs96","country_code":"US","type":"education","lineage":["https://openalex.org/I114580094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quan Yuan","raw_affiliation_strings":["Computer School, University of Texas-Permian Basin, Odessa, TX, USA"],"affiliations":[{"raw_affiliation_string":"Computer School, University of Texas-Permian Basin, Odessa, TX, USA","institution_ids":["https://openalex.org/I114580094"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Institute of Cyberspace Research and College of Computer Science and Technology, Zhejiang University, Hangzhou, China","Joint Institute of Frontier Technologies, Alibaba-Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Joint Institute of Frontier Technologies, Alibaba-Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]},{"raw_affiliation_string":"Institute of Cyberspace Research and College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":10.554,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":54,"citation_normalized_percentile":{"value":0.945043,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.959,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.76001334},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6785477},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.65797913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83323264},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.76001334},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.68363833},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6785477},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.65797913},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6570724},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4829911},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46804357},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45573056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39679086},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37465218},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.36571038},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32621676},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.24497563},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18058088},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2925800","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702379"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61572380"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1836202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772466"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772383"}],"datasets":[],"versions":[],"referenced_works_count":38,"referenced_works":["https://openalex.org/W1503499126","https://openalex.org/W1536141561","https://openalex.org/W1537090015","https://openalex.org/W1544435806","https://openalex.org/W1589034595","https://openalex.org/W1802540854","https://openalex.org/W189798858","https://openalex.org/W1966681266","https://openalex.org/W1974304004","https://openalex.org/W1980461171","https://openalex.org/W2005759443","https://openalex.org/W2012042556","https://openalex.org/W2026450784","https://openalex.org/W2027703952","https://openalex.org/W2038704326","https://openalex.org/W2040193872","https://openalex.org/W2041547341","https://openalex.org/W2079493184","https://openalex.org/W2082896909","https://openalex.org/W2089128139","https://openalex.org/W2102881299","https://openalex.org/W2104382170","https://openalex.org/W2123069643","https://openalex.org/W2144140331","https://openalex.org/W2174460902","https://openalex.org/W2254971601","https://openalex.org/W2310212673","https://openalex.org/W2322299939","https://openalex.org/W2343041492","https://openalex.org/W2343161563","https://openalex.org/W2470757336","https://openalex.org/W2528685303","https://openalex.org/W2793701237","https://openalex.org/W2794290709","https://openalex.org/W2908480009","https://openalex.org/W2972507722","https://openalex.org/W3100723659","https://openalex.org/W44164607"],"related_works":["https://openalex.org/W4319993352","https://openalex.org/W4240151277","https://openalex.org/W3152823548","https://openalex.org/W2883256554","https://openalex.org/W2397192327","https://openalex.org/W2317675451","https://openalex.org/W2188110745","https://openalex.org/W2141006951","https://openalex.org/W2125735429","https://openalex.org/W1852630156"],"abstract_inverted_index":{"As":[0],"an":[1,170],"important":[2,171],"security":[3],"property":[4],"of":[5,22,62,66],"cloud":[6,177],"storage,":[7],"data":[8,36,99,125],"integrity":[9,126],"has":[10],"not":[11],"been":[12],"sufficiently":[13],"studied":[14],"under":[15,45],"the":[16,35,55,60,67,84,92,111,130,161],"multi-writer":[17,47,176],"model,":[18],"where":[19],"a":[20,120,135,145],"group":[21,31],"users":[23,80],"work":[24],"on":[25],"shared":[26,71,98],"files":[27,72],"collaboratively":[28],"and":[29,40,105,144],"any":[30],"member":[32],"can":[33],"update":[34,85],"by":[37,119],"modification,":[38],"insertion,":[39],"deletion":[41],"operations.":[42,86],"Existing":[43],"works":[44,69],"such":[46],"model":[48],"would":[49],"bring":[50],"large":[51],"storage":[52,108,178],"cost":[53,109],"to":[54,59],"third-party":[56],"verifiers.":[57,112],"Furthermore,":[58],"best":[61],"our":[63],"knowledge,":[64],"none":[65],"existing":[68,162],"for":[70,97,110,123],"supports":[73,101],"fully":[74,102],"dynamic":[75,103],"operations,":[76],"which":[77],"implies":[78],"that":[79,100,155,167],"cannot":[81],"freely":[82],"perform":[83],"In":[87],"this":[88],"paper,":[89],"we":[90,133],"propose":[91],"first":[93],"public":[94],"auditing":[95],"scheme":[96],"operations":[104],"achieves":[106],"constant":[107],"Our":[113],"scheme,":[114],"named":[115],"PRAYS,":[116],"is":[117,157,169],"boosted":[118],"new":[121,131],"paradigm":[122],"remote":[124],"checking.":[127],"To":[128],"implement":[129],"paradigm,":[132],"proposed":[134],"specially":[136],"designed":[137],"authenticated":[138],"structure,":[139],"called":[140,149],"blockless":[141],"Merkle":[142],"tree,":[143],"novel":[146],"cryptographic":[147],"primitive,":[148],"permission-based":[150],"signature.":[151],"Extensive":[152],"evaluation":[153],"demonstrates":[154],"PRAYS":[156,168],"as":[158,160],"efficient":[159],"less-functional":[163],"solutions.":[164],"We":[165],"believe":[166],"step":[172],"towards":[173],"designing":[174],"practical":[175],"systems.":[179]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2956034303","counts_by_year":[{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":7}],"updated_date":"2024-12-28T23:50:15.612826","created_date":"2019-07-12"}