{"id":"https://openalex.org/W3002342065","doi":"https://doi.org/10.1155/2020/4838497","title":"Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience","display_name":"Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience","publication_year":2020,"publication_date":"2020-01-27","ids":{"openalex":"https://openalex.org/W3002342065","doi":"https://doi.org/10.1155/2020/4838497","mag":"3002342065"},"language":"en","primary_location":{"id":"doi:10.1155/2020/4838497","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4838497","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/4838497.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/4838497.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101402944","display_name":"S. Nithya","orcid":"https://orcid.org/0000-0003-2719-9841"},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Mary Virgil Nithya","raw_affiliation_strings":["Ramanujan Computing Centre, Anna University, Guindy, Chennai 600 025, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Ramanujan Computing Centre, Anna University, Guindy, Chennai 600 025, Tamil Nadu, India","institution_ids":["https://openalex.org/I33585257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069872975","display_name":"V. Rhymend Uthariaraj","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Rhymend Uthariaraj","raw_affiliation_strings":["Ramanujan Computing Centre, Anna University, Guindy, Chennai 600 025, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Ramanujan Computing Centre, Anna University, Guindy, Chennai 600 025, Tamil Nadu, India","institution_ids":["https://openalex.org/I33585257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101402944"],"corresponding_institution_ids":["https://openalex.org/I33585257"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.4021,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90909835,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9376999735832214,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7906208038330078},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837223410606384},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.669654369354248},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6642974615097046},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6605539321899414},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5744756460189819},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5124045014381409},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4830242097377777},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4321436583995819},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.28792715072631836},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16193106770515442},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.15000945329666138},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13098105788230896},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0654076635837555}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7906208038330078},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837223410606384},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.669654369354248},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6642974615097046},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6605539321899414},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5744756460189819},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5124045014381409},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4830242097377777},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4321436583995819},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.28792715072631836},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16193106770515442},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.15000945329666138},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13098105788230896},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0654076635837555},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/4838497","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4838497","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/4838497.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:30e614361aae41c390b67d7788d49479","is_oa":true,"landing_page_url":"https://doaj.org/article/30e614361aae41c390b67d7788d49479","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/4838497","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4838497","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/4838497.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6499999761581421}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322211","display_name":"Indian Institute of Technology Madras","ror":"https://ror.org/03v0r5n49"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3002342065.pdf","grobid_xml":"https://content.openalex.org/works/W3002342065.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1974304004","https://openalex.org/W1980461171","https://openalex.org/W1994788755","https://openalex.org/W1996832206","https://openalex.org/W2010287286","https://openalex.org/W2014698831","https://openalex.org/W2034944725","https://openalex.org/W2120622033","https://openalex.org/W2154205416","https://openalex.org/W2310212673","https://openalex.org/W2323162780","https://openalex.org/W2528685303","https://openalex.org/W2585855180","https://openalex.org/W2606779297","https://openalex.org/W2801274750","https://openalex.org/W2961517545","https://openalex.org/W2972507722","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2404647514","https://openalex.org/W1667647204","https://openalex.org/W4247536566","https://openalex.org/W2018477250","https://openalex.org/W3119814709","https://openalex.org/W4241418540","https://openalex.org/W1508895727","https://openalex.org/W2725786787","https://openalex.org/W4283160672","https://openalex.org/W1590965489"],"abstract_inverted_index":{"Secured":[0],"storage":[1,176],"system":[2],"is":[3,53,69,167,206],"a":[4],"critical":[5],"component":[6],"in":[7,23,132,178],"cloud":[8,13,40,78,175],"computing.":[9],"Cloud":[10,37,214],"clients":[11],"use":[12],"auditing":[14,32,41,47,60,79,177],"schemes":[15,48,80,102,117,150],"to":[16,35,55,71,85,128,136,185,208],"verify":[17,229],"the":[18,24,28,31,36,46,57,73,112,119,125,137,141,146,171,186,190,203,209,213,218,222,230],"integrity":[19,109],"of":[20,30,59,98,111,121,140,145,173,189,212,232],"data":[21,113,219],"stored":[22],"cloud.":[25],"But":[26],"with":[27],"exposure":[29,58,87,148],"secret":[33,61],"key":[34,86,129,147],"Service":[38,215],"Provider,":[39,216],"becomes":[42],"unsuccessful,":[43],"however":[44],"strong":[45],"may":[49],"be.":[50],"Therefore,":[51],"it":[52,66,68],"essential":[54],"prevent":[56],"keys,":[62],"and":[63,94,183,226],"even":[64],"if":[65],"happens,":[67],"necessary":[70],"minimize":[72],"damage":[74,126],"caused.":[75],"The":[76,115],"existing":[77],"that":[81,202],"are":[82,88],"strongly":[83],"resilient":[84,149],"based":[89],"on":[90],"Public":[91],"Key":[92],"Infrastructure":[93],"so":[95],"have":[96],"challenges":[97],"certificate":[99],"management/verification.":[100],"These":[101],"also":[103,194],"incur":[104],"high":[105],"computation":[106],"time":[107,133,138,179,187],"during":[108],"verification":[110],"blocks.":[114],"Identity-based":[116,162,174],"eliminate":[118],"usage":[120],"certificates":[122],"but":[123],"limit":[124],"due":[127],"exposure,":[130],"only":[131],"periods":[134,180],"earlier":[135,182],"period":[139,188],"exposed":[142,191],"key.":[143,192],"Some":[144],"do":[151],"not":[152],"provide":[153],"support":[154,196],"for":[155,197],"batch":[156,198],"auditing.":[157,199],"In":[158],"this":[159],"paper,":[160],"an":[161],"Provable":[163],"Data":[164],"Possession":[165],"scheme":[166,205],"proposed.":[168],"It":[169,193],"protects":[170],"security":[172],"both":[181],"later":[184],"provides":[195],"Analysis":[200],"shows":[201],"proposed":[204],"resistant":[207],"replace":[210],"attack":[211],"preserves":[217],"privacy":[220],"against":[221],"Third":[223],"Party":[224],"Auditor,":[225],"can":[227],"efficiently":[228],"correctness":[231],"data.":[233]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
