{"id":"https://openalex.org/W2533387077","doi":"https://doi.org/10.1109/iccchina.2016.7636866","title":"Secure outsourced data transfer with integrity verification in cloud storage","display_name":"Secure outsourced data transfer with integrity verification in cloud storage","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2533387077","doi":"https://doi.org/10.1109/iccchina.2016.7636866","mag":"2533387077"},"language":"en","primary_location":{"id":"doi:10.1109/iccchina.2016.7636866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2016.7636866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100736887","display_name":"Kuan Zhang","orcid":"https://orcid.org/0000-0002-4262-153X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kuan Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419998","display_name":"Yong Yu","orcid":"https://orcid.org/0000-0002-0187-2439"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Sherman Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033931001"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":1.9904,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.89982688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9539999961853027,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8325228691101074},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837376594543457},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.7206854820251465},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6618479490280151},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5929930210113525},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5465627908706665},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5245676040649414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5161765217781067},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.4743726849555969},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4624934494495392},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4566655457019806},{"id":"https://openalex.org/keywords/proxy-server","display_name":"Proxy server","score":0.4559491276741028},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20792624354362488},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09935149550437927}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8325228691101074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837376594543457},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.7206854820251465},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6618479490280151},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5929930210113525},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5465627908706665},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5245676040649414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5161765217781067},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.4743726849555969},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4624934494495392},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4566655457019806},{"id":"https://openalex.org/C2779298391","wikidata":"https://www.wikidata.org/wiki/Q11189","display_name":"Proxy server","level":2,"score":0.4559491276741028},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20792624354362488},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09935149550437927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccchina.2016.7636866","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2016.7636866","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.7200000286102295,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1505785519","https://openalex.org/W1533182289","https://openalex.org/W1533362584","https://openalex.org/W1571926107","https://openalex.org/W1590823599","https://openalex.org/W1963603807","https://openalex.org/W1994788755","https://openalex.org/W2058410460","https://openalex.org/W2074769682","https://openalex.org/W2082896909","https://openalex.org/W2099739670","https://openalex.org/W2114428623","https://openalex.org/W2137291214","https://openalex.org/W2147096042","https://openalex.org/W2293195586","https://openalex.org/W2318731653","https://openalex.org/W2330302216","https://openalex.org/W6631991104"],"related_works":["https://openalex.org/W1852630156","https://openalex.org/W2897808473","https://openalex.org/W431657620","https://openalex.org/W2625231702","https://openalex.org/W355931585","https://openalex.org/W4311223005","https://openalex.org/W2370840345","https://openalex.org/W2602423869","https://openalex.org/W2605525988","https://openalex.org/W2187109955"],"abstract_inverted_index":{"With":[0],"the":[1,69,79,82,87,100,108,114,121,137],"proliferation":[2],"of":[3,128,136],"cloud":[4,22,62,74,101],"storage,":[5],"outsourced":[6,18,51],"data":[7,19,26,37,52,59,71,80,88,105,109],"transfer":[8,53],"becomes":[9],"an":[10],"essential":[11],"requirement":[12],"for":[13,33],"users":[14,34,66],"to":[15,23,56,67,75],"migrate":[16,68],"their":[17,36],"from":[20,72,81],"one":[21,73],"another.":[24],"However,":[25],"confidentiality":[27,89,125],"and":[28,90,126,130,139],"integrity":[29,91,127],"are":[30,38,110],"big":[31],"concerns":[32],"when":[35],"migrating":[39],"between":[40],"two":[41],"semi-honest":[42],"clouds.":[43],"In":[44,98],"this":[45,96],"paper,":[46],"we":[47,119],"propose":[48],"a":[49],"secure":[50,58,104],"scheme":[54],"(SODT)":[55],"achieve":[57],"migration":[60],"in":[61,134],"storage.":[63],"SODT":[64],"allows":[65],"remote":[70],"another":[76],"without":[77],"retrieving":[78],"former":[83],"cloud,":[84],"such":[85],"that":[86],"can":[92,102],"be":[93],"achieved":[94],"during":[95],"process.":[97],"addition,":[99],"perform":[103],"erasure":[106],"after":[107],"migrated":[111],"by":[112],"utilizing":[113],"proxy":[115],"re-encryption":[116],"technique.":[117],"Finally,":[118],"discuss":[120],"security":[122],"properties":[123],"including":[124],"SODT,":[129],"demonstrate":[131],"its":[132],"efficiency":[133],"terms":[135],"computational":[138],"communication":[140],"overhead.":[141]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
