{"id":"https://openalex.org/W2964433258","doi":"https://doi.org/10.1504/ijhpcn.2019.10022737","title":"Genuine and secure public auditing for the outsourced data in cloud","display_name":"Genuine and secure public auditing for the outsourced data in cloud","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2964433258","doi":"https://doi.org/10.1504/ijhpcn.2019.10022737","mag":"2964433258"},"language":"en","primary_location":{"id":"doi:10.1504/ijhpcn.2019.10022737","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpcn.2019.10022737","pdf_url":null,"source":{"id":"https://openalex.org/S159903936","display_name":"International Journal of High Performance Computing and Networking","issn_l":"1740-0562","issn":["1740-0562","1740-0570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Computing and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100662562","display_name":"Jianhong Zhang","orcid":"https://orcid.org/0000-0001-8674-3988"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhong Zhang","raw_affiliation_strings":["College of Sciences, North China University of Technology, Beijing 100144, China; Guangxi Key Lab of Multi-source Information Mining and Security, Guilin, China"],"affiliations":[{"raw_affiliation_string":"College of Sciences, North China University of Technology, Beijing 100144, China; Guangxi Key Lab of Multi-source Information Mining and Security, Guilin, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088846157","display_name":"Hongxin Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongxin Meng","raw_affiliation_strings":["Institute of Image Process and Pattern Recognize, North China University of Technology, Beijing 100144, China"],"affiliations":[{"raw_affiliation_string":"Institute of Image Process and Pattern Recognize, North China University of Technology, Beijing 100144, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100662562"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07855079,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"2","first_page":"183","last_page":"183"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.799239993095398},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.7378833293914795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6284719705581665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6108604669570923},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.26247838139533997},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.14415404200553894},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06959381699562073}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.799239993095398},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.7378833293914795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6284719705581665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6108604669570923},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.26247838139533997},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.14415404200553894},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06959381699562073}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijhpcn.2019.10022737","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpcn.2019.10022737","pdf_url":null,"source":{"id":"https://openalex.org/S159903936","display_name":"International Journal of High Performance Computing and Networking","issn_l":"1740-0562","issn":["1740-0562","1740-0570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Computing and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W4205786897","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W1997222214"],"abstract_inverted_index":{"In":[0,70,113],"cloud":[1,105,151,161,240],"storage,":[2],"the":[3,66,73,77,89,128,146,155,166,183,187,217,223,239,250,255,260],"most":[4],"common":[5],"concerns":[6],"for":[7,103,124],"users":[8,86,106],"are":[9],"data":[10,17,35,45,91,126,134,231,256],"integrity,":[11],"confidentiality":[12],"and":[13,37,40,110,137,197,213,225,258],"availability.":[14],"Recently,":[15],"many":[16],"integrity":[18,92],"auditing":[19,59,122,148],"schemes":[20,75],"have":[21],"been":[22],"proposed,":[23],"some":[24,31,41],"of":[25,32,42,79,157,189,193,229],"which":[26,33,43,61,130],"achieved":[27],"privacy-preserving":[28,120,185],"public":[29,121],"auditing,":[30,93],"realised":[34],"sharing":[36],"group":[38,138,204,233],"dynamic,":[39],"supported":[44],"dynamic.":[46,139],"However,":[47],"as":[48,50],"far":[49],"we":[51,116,141,208],"know,":[52],"there":[53],"does":[54],"not":[55],"exist":[56],"a":[57,97,118,160,176],"practical":[58,224],"scheme":[60,123,181,267],"can":[62,131,153],"simultaneously":[63],"realise":[64,222],"all":[65,72],"functions":[67],"mentioned":[68],"above;":[69],"addition,":[71],"existing":[74,147],"adopt":[76],"method":[78],"computing":[80,109,162],"message":[81],"authentication":[82],"code":[83],"(MAC)":[84],"by":[85,174,232],"to":[87,100,159,221,253],"achieve":[88],"following":[90],"nevertheless,":[94],"it":[95,202,215],"is":[96,268],"arduous":[98],"task":[99],"compute":[101],"MACs":[102,158],"these":[104],"with":[107,216],"constrained":[108],"storage":[111,199,241],"capabilities.":[112],"this":[114],"paper,":[115],"propose":[117],"novel":[119],"shared":[125,230],"in":[127,186,236,248],"cloud,":[129],"also":[132],"support":[133],"dynamic":[135,205,227],"operation":[136],"First,":[140],"bring":[142],"proxy":[143],"signature":[144],"into":[145],"scheme.":[149],"The":[150],"user":[152],"delegate":[154],"computation":[156,196],"server,":[163],"so":[164],"that":[165],"user's":[167],"burden":[168],"would":[169],"be":[170],"greatly":[171],"reduced;":[172],"second,":[173],"introducing":[175],"Lagrange":[177],"interpolating":[178],"polynomial,":[179],"our":[180,237,266],"realises":[182],"identity":[184],"precondition":[188],"almost":[190],"no":[191],"addition":[192],"any":[194],"new":[195],"less":[198],"space,":[200],"moreover":[201],"makes":[203],"simple;":[206],"third,":[207],"make":[209],"an":[210],"index-switch":[211],"table":[212],"combine":[214],"Merkle":[218],"hash":[219],"tree":[220],"secure":[226],"operations":[228],"users;":[234],"fourth,":[235],"scheme,":[238],"server":[242],"will":[243],"add":[244],"its":[245],"private":[246],"key":[247],"producing":[249],"proof":[251],"information":[252],"protect":[254],"privacy":[257],"resist":[259],"active":[261],"attack.":[262],"Theoretical":[263],"analysis":[264],"demonstrates":[265],"provably":[269],"secure.":[270]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
