{"id":"https://openalex.org/W1974145163","doi":"https://doi.org/10.1145/1866307.1866421","title":"Efficient provable data possession for hybrid clouds","display_name":"Efficient provable data possession for hybrid clouds","publication_year":2010,"publication_date":"2010-10-04","ids":{"openalex":"https://openalex.org/W1974145163","doi":"https://doi.org/10.1145/1866307.1866421","mag":"1974145163"},"language":"en","primary_location":{"id":"doi:10.1145/1866307.1866421","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866421","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039641353","display_name":"Yan Zhu","orcid":"https://orcid.org/0000-0002-9159-745X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Zhu","raw_affiliation_strings":["Peking University, Beijing, China","Peking University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Peking University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065227475","display_name":"Huaixi Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaixi Wang","raw_affiliation_strings":["Peking University, Beijing, China","Peking University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Peking University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046598322","display_name":"Zexing Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zexing Hu","raw_affiliation_strings":["Peking, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025770693","display_name":"Gail\u2010Joon Ahn","orcid":"https://orcid.org/0000-0002-4271-1666"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gail-Joon Ahn","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA","Arizona State University , Tempe , AZ , USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Arizona State University , Tempe , AZ , USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA","Arizona State University , Tempe , AZ , USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Arizona State University , Tempe , AZ , USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067217334","display_name":"Stephen S. Yau","orcid":"https://orcid.org/0000-0002-6663-5565"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephen S. Yau","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA","Arizona State University , Tempe , AZ , USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Arizona State University , Tempe , AZ , USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5039641353"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":12.4866,"has_fulltext":false,"cited_by_count":96,"citation_normalized_percentile":{"value":0.98323025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"756","last_page":"758"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7891364097595215},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7745048999786377},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6854497790336609},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.6326607465744019},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.616766095161438},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5898224711418152},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5656157732009888},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.560828685760498},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5548539757728577},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5180680751800537},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4904470145702362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4356529712677002},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.40702471137046814},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3333088755607605},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09111040830612183}],"concepts":[{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7891364097595215},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7745048999786377},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6854497790336609},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.6326607465744019},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.616766095161438},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5898224711418152},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5656157732009888},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.560828685760498},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5548539757728577},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5180680751800537},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4904470145702362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4356529712677002},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.40702471137046814},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3333088755607605},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09111040830612183},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1866307.1866421","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866421","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.5199999809265137}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320326446","display_name":"National Development and Reform Commission","ror":"https://ror.org/017a59b72"},{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W193620207","https://openalex.org/W2102881299","https://openalex.org/W2131629857","https://openalex.org/W6607999007"],"related_works":["https://openalex.org/W931969443","https://openalex.org/W2381781572","https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2350339206","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W2382515644","https://openalex.org/W1930396972"],"abstract_inverted_index":{"Provable":[0],"data":[1,11,24,36],"possession":[2,25],"is":[3],"a":[4,21,67],"technique":[5],"for":[6],"ensuring":[7],"the":[8,42,54,61],"integrity":[9],"of":[10,33,44,63,71],"in":[12,27,38],"outsourcing":[13],"storage":[14],"service.":[15],"In":[16],"this":[17],"paper,":[18],"we":[19,40],"propose":[20],"cooperative":[22],"provable":[23],"scheme":[26,65],"hybrid":[28],"clouds":[29],"to":[30,49],"support":[31],"scalability":[32],"service":[34,47],"and":[35,52],"migration,":[37],"which":[39,73],"consider":[41],"existence":[43],"multiple":[45],"cloud":[46],"providers":[48],"cooperatively":[50],"store":[51],"maintain":[53],"clients'":[55],"data.":[56],"Our":[57],"experiments":[58],"show":[59],"that":[60],"verification":[62],"our":[64],"requires":[66],"small,":[68],"constant":[69],"amount":[70],"overhead,":[72],"minimizes":[74],"communication":[75],"complexity.":[76]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":16},{"year":2014,"cited_by_count":20},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
