{"id":"https://openalex.org/W2608740750","doi":"https://doi.org/10.1007/s11227-017-2061-3","title":"Security analysis of a publicly verifiable data possession scheme for remote storage","display_name":"Security analysis of a publicly verifiable data possession scheme for remote storage","publication_year":2017,"publication_date":"2017-04-29","ids":{"openalex":"https://openalex.org/W2608740750","doi":"https://doi.org/10.1007/s11227-017-2061-3","mag":"2608740750"},"language":"en","primary_location":{"id":"doi:10.1007/s11227-017-2061-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11227-017-2061-3","pdf_url":null,"source":{"id":"https://openalex.org/S32326811","display_name":"The Journal of Supercomputing","issn_l":"0920-8542","issn":["0920-8542","1573-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Journal of Supercomputing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048127606","display_name":"Zhiyan Xu","orcid":"https://orcid.org/0000-0002-8443-8282"},"institutions":[{"id":"https://openalex.org/I4210154851","display_name":"Hubei University of Education","ror":"https://ror.org/04f41cb79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154851"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyan Xu","raw_affiliation_strings":["Computer School, Hubei University of Education, Wuhan, 430205, China","State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, 430072, China","State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","Computer School, Hubei University of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Computer School, Hubei University of Education, Wuhan, 430205, China","institution_ids":["https://openalex.org/I4210154851"]},{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Computer School, Hubei University of Education, Wuhan, China","institution_ids":["https://openalex.org/I4210154851"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108047844","display_name":"Libing Wu","orcid":"https://orcid.org/0000-0001-9897-1953"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Libing Wu","raw_affiliation_strings":["State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, 430072, China","State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, 430072, China","State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, 430072, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108047844"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":1.5128,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86720494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"73","issue":"11","first_page":"4923","last_page":"4930"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9632999897003174,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8693671226501465},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7738733887672424},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7292852401733398},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7068556547164917},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6771847009658813},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6719807386398315},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.6222347021102905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5902921557426453},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5470524430274963},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5390955209732056},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5017244815826416},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.496900349855423},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3984183371067047},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3543715476989746},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33820265531539917},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.26509493589401245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14765247702598572},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09349179267883301}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8693671226501465},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7738733887672424},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7292852401733398},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7068556547164917},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6771847009658813},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6719807386398315},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.6222347021102905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5902921557426453},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5470524430274963},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5390955209732056},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5017244815826416},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.496900349855423},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3984183371067047},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3543715476989746},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33820265531539917},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.26509493589401245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14765247702598572},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09349179267883301},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11227-017-2061-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11227-017-2061-3","pdf_url":null,"source":{"id":"https://openalex.org/S32326811","display_name":"The Journal of Supercomputing","issn_l":"0920-8542","issn":["0920-8542","1573-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Journal of Supercomputing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1979493600","https://openalex.org/W2007877577","https://openalex.org/W2012590209","https://openalex.org/W2065726143","https://openalex.org/W2069667482","https://openalex.org/W2079493184","https://openalex.org/W2080488820","https://openalex.org/W2086690432","https://openalex.org/W2102881299","https://openalex.org/W2125858711","https://openalex.org/W2273956837","https://openalex.org/W2327401914","https://openalex.org/W2469486851","https://openalex.org/W2490265015","https://openalex.org/W2510253580","https://openalex.org/W2541518390"],"related_works":["https://openalex.org/W2248041771","https://openalex.org/W1521353230","https://openalex.org/W2364921833","https://openalex.org/W3015230198","https://openalex.org/W4313171313","https://openalex.org/W2908790200","https://openalex.org/W2182566061","https://openalex.org/W2949994538","https://openalex.org/W4319323653","https://openalex.org/W2360644575"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
