{"id":"https://openalex.org/W2619553594","doi":"https://doi.org/10.1007/978-3-319-59463-7_61","title":"On the Security of a Cloud Data Storage Auditing Protocol IPAD","display_name":"On the Security of a Cloud Data Storage Auditing Protocol IPAD","publication_year":2017,"publication_date":"2017-05-27","ids":{"openalex":"https://openalex.org/W2619553594","doi":"https://doi.org/10.1007/978-3-319-59463-7_61","mag":"2619553594"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-59463-7_61","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_61","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["Department of Electronic Technology, Key, Engineering University of CAPF, Xi\u2019an, Xizang, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, People\u2019s Republic of China","Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, 710086, China","Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Key, Engineering University of CAPF, Xi\u2019an, Xizang, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, People\u2019s Republic of China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114142416","display_name":"Xiaoshuang Luo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaoshuang Luo","raw_affiliation_strings":["Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, 710086, China","Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102846084","display_name":"Jindan Zhang","orcid":"https://orcid.org/0000-0002-1499-8460"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jindan Zhang","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, 710071, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058435270","display_name":"Xiaoyuan Yang","orcid":"https://orcid.org/0000-0003-3865-0474"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaoyuan Yang","raw_affiliation_strings":["Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, 710086, China","Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, 710086, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049151787"],"corresponding_institution_ids":["https://openalex.org/I4210131919","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.4542,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62262063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"611","last_page":"617"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6180838942527771},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5724800229072571},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5715199708938599},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5488066673278809},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5135284066200256},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5049248337745667},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3539304733276367},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3102666735649109},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23426994681358337},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.10076197981834412},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.059003233909606934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6180838942527771},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5724800229072571},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5715199708938599},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5488066673278809},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5135284066200256},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5049248337745667},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3539304733276367},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3102666735649109},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23426994681358337},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.10076197981834412},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.059003233909606934},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-59463-7_61","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_61","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W44164607","https://openalex.org/W89553247","https://openalex.org/W1994788755","https://openalex.org/W2014698831","https://openalex.org/W2020928798","https://openalex.org/W2039877753","https://openalex.org/W2042759467","https://openalex.org/W2050286334","https://openalex.org/W2060543984","https://openalex.org/W2069667482","https://openalex.org/W2079493184","https://openalex.org/W2080488820","https://openalex.org/W2082896909","https://openalex.org/W2086058948","https://openalex.org/W2102881299","https://openalex.org/W2104382170","https://openalex.org/W2118348041","https://openalex.org/W2123069643","https://openalex.org/W2144140331","https://openalex.org/W2243586375","https://openalex.org/W2245865570","https://openalex.org/W2282103651","https://openalex.org/W2407486123","https://openalex.org/W2528685303","https://openalex.org/W2949578549"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2802581102","https://openalex.org/W4205786897"],"abstract_inverted_index":null,"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
