{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T09:07:35Z","timestamp":1768813655636,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/cloud.2011.35","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T16:27:30Z","timestamp":1315844850000},"page":"308-315","source":"Crossref","is-referenced-by-count":39,"title":["DIaaS: Data Integrity as a Service in the Cloud"],"prefix":"10.1109","author":[{"given":"Surya","family":"Nepal","sequence":"first","affiliation":[]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jinhui","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Danan","family":"Thilakanathan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"RFC 1321: The MD5 message-digest algorithm","author":"rivest","year":"1992","journal-title":"Internet Activities Board"},{"key":"17","first-page":"67","article-title":"FS: An in-kernel integrity checker and intrusion detection file system","author":"patil","year":"0","journal-title":"Proceedings of the 18th USENIX Conference on System Administration (LISA '04)"},{"key":"18","article-title":"HMAC: Keyed-hashing for message authentication","author":"krawczyk","year":"1997","journal-title":"Technical Report RFC 2104 Internet Activities Board"},{"key":"33","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"armbrust","year":"2010","journal-title":"Commun ACM"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/176979.176981"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1556154.1556173"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/971701.50214"},{"key":"13","author":"panzer-steindel","year":"2007","journal-title":"Data Integrity CERN\/IT Draft 1 3 8"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103784"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.17"},{"key":"12","article-title":"Gartner: Seven cloud-computing security risks","author":"brodkin","year":"2008","journal-title":"Network World"},{"key":"21","article-title":"A new RAID for cloud-scale data integrity","author":"whitehead","year":"2009","journal-title":"Computer Technology Review"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"22","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"0","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security (CCS '07)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460889"},{"key":"24","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"wang","year":"2009","journal-title":"Proceedings of the 14th European Conference on Research in Computer Security (ESORICS'09)"},{"key":"25","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1145\/1315245.1315317","article-title":"Pors: Proofs of retrievability for large files","author":"juels","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security (CCS '07)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"28","article-title":"Enhanced trust and data integrity in the public cloud","author":"musthaler","year":"2010","journal-title":"Network World"},{"key":"29","first-page":"144","article-title":"The transaction concept: Virtues and limitations","volume":"7","author":"gray","year":"1981","journal-title":"Proceedings of the Seventh International Conference on Very Large Data Bases Volume 7 (VLDB '1981)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.149"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071529"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497508"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"30","year":"0","journal-title":"Cloud Data Management Interface (CDMI) Specification"},{"key":"7","first-page":"710","article-title":"IDataGuard: Middleware providing a secure network drive interface to untrusted Internet data storage","author":"jammalamadaka","year":"2008","journal-title":"Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology Proceedings"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.149"},{"key":"32","article-title":"Enabling security in cloud storage SLAs with CloudProof","author":"popa","year":"2010","journal-title":"Technical Report Microsoft Research"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"31","article-title":"The ephemerizer: Making data disappear","author":"perlman","year":"2005","journal-title":"Sun Microsystems Whitepaper"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.87"},{"key":"9","first-page":"29","article-title":"Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"2003","journal-title":"Proc USENIX Conference on File and Storage Technologies"},{"key":"8","first-page":"131","article-title":"SiRiUS: Securing remote untrusted storage","author":"goh","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"}],"event":{"name":"2011 IEEE 4th International Conference on Cloud Computing (CLOUD)","location":"Washington, DC, USA","start":{"date-parts":[[2011,7,4]]},"end":{"date-parts":[[2011,7,9]]}},"container-title":["2011 IEEE 4th International Conference on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6008653\/6008659\/06008724.pdf?arnumber=6008724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T02:12:41Z","timestamp":1497924761000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6008724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cloud.2011.35","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}