Reliable and confidential cloud storage with efficient data forwarding functionality
Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the outsourced data are arising. Traditional encryption methods can, guarantee data confidentiality, however, it also limits the cloud's functional...
Gespeichert in:
| Veröffentlicht in: | IET communications Jg. 10; H. 6; S. 661 - 668 |
|---|---|
| Hauptverfasser: | , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
The Institution of Engineering and Technology
14.04.2016
|
| Schlagworte: | |
| ISSN: | 1751-8628, 1751-8636 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the outsourced data are arising. Traditional encryption methods can, guarantee data confidentiality, however, it also limits the cloud's functionality as few operations are supported over encrypted data. In this study, the authors construct an enhanced cloud that not only provides secure and robust data storage, but also supports the functionality that the cipher data can be forwarded without being retrieved back. Specifically, they design an all-or-nothing-transform-based encryption and a variant of ElGamal-based proxy re-encryption algorithms, blending them with Reed–Solomon code, the authors’ scheme is quite more efficient compared with previous studies because it only needs to update partial data blocks instead of the whole file for data forwarding. Besides, the authors’ scheme also satisfies another practical property that the original data owner can no longer decrypt or forward the re-encrypted data to others after a complete forwarding instance, which is termed to be ‘original inaccessibility’ in this study. Analysis shows that the authors’ scheme is secure and satisfactory. Finally, the authors theoretically and experimentally evaluate its performance and the results indicate that their scheme is efficient during file dispersal, forward and retrieval. |
|---|---|
| AbstractList | Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the outsourced data are arising. Traditional encryption methods can, guarantee data confidentiality, however, it also limits the cloud's functionality as few operations are supported over encrypted data. In this study, the authors construct an enhanced cloud that not only provides secure and robust data storage, but also supports the functionality that the cipher data can be forwarded without being retrieved back. Specifically, they design an all-or-nothing-transform-based encryption and a variant of ElGamal-based proxy re-encryption algorithms, blending them with Reed-Solomon code, the authors' scheme is quite more efficient compared with previous studies because it only needs to update partial data blocks instead of the whole file for data forwarding. Besides, the authors' scheme also satisfies another practical property that the original data owner can no longer decrypt or forward the re-encrypted data to others after a complete forwarding instance, which is termed to be 'original inaccessibility' in this study. Analysis shows that the authors' scheme is secure and satisfactory. Finally, the authors theoretically and experimentally evaluate its performance and the results indicate that their scheme is efficient during file dispersal, forward and retrieval. |
| Author | Liu, Jian Rong, Hong Xian, Ming Wang, Huimei Huang, Kun |
| Author_xml | – sequence: 1 givenname: Jian surname: Liu fullname: Liu, Jian email: ljabc730@nudt.edu.cn organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China – sequence: 2 givenname: Huimei surname: Wang fullname: Wang, Huimei organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China – sequence: 3 givenname: Ming surname: Xian fullname: Xian, Ming organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China – sequence: 4 givenname: Hong surname: Rong fullname: Rong, Hong organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China – sequence: 5 givenname: Kun surname: Huang fullname: Huang, Kun organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China |
| BookMark | eNqFkMtqGzEUQEVJoM7jA7LTsl2MK81ImnF3rUmagEMgOGtxRw9XRpZcSYPx33cGh1BKSVeS0Dm64lygsxCDQeiGkjklbPHFmVKpuJvXhPI5EaT7gGa05bTqRCPO3vZ19xFd5LwlhHPB2Aytn4130HuDIWisYrBOm1AceKx8HDTOJSbYGHxw5Sc21jrlxnusoQC2MR0gaRc22A5BFRcDeFeOV-jcgs_m-nW9RC93t-vlfbV6-vGw_LaqFCO0q6jpBV_0tbY1YQoUEbRRigIX_QKU5tq2HeOGAWO9rdnC0lYr0VFooRt50lyiT6d39yn-GkwucueyMt5DMHHIknYN55zVohnR9oSqFHNOxkrlCkw_Lgmcl5TIqaMcO8qxo5w6yqnjaNK_zH1yO0jHd52vJ-fgvDn-X5DLx5f6-914bCe5OskTto1DGqPmd4d9_gf_cLuWy6fHP2bstW1-A_wJqjA |
| CitedBy_id | crossref_primary_10_1155_2017_5301462 crossref_primary_10_1109_ACCESS_2018_2859758 crossref_primary_10_1002_cpe_4866 crossref_primary_10_1016_j_future_2019_05_031 crossref_primary_10_1007_s11227_019_03017_y crossref_primary_10_1002_cpe_5804 |
| Cites_doi | 10.1631/jzus.C1200240 10.1007/978-3-319-02726-5_6 10.1109/INFCOM.2013.6567101 10.1109/INFCOM.2010.5462174 10.1109/TIFS.2013.2279531 10.1109/TPDS.2011.252 10.1109/TPDS.2012.331 10.1145/1755688.1755720 10.1109/TPDS.2013.164 10.1007/BFb0054122 10.1109/TC.2013.208 10.1007/3‐540‐39568‐7_2 10.1145/62044.62050 10.1145/1755688.1755723 10.1145/1127345.1127346 10.1145/984334.984339 10.1145/359168.359176 10.1145/1721654.1721672 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2021 The Institution of Engineering and Technology |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Institution of Engineering and Technology |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1049/iet-com.2015.0608 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1751-8636 |
| EndPage | 668 |
| ExternalDocumentID | 10_1049_iet_com_2015_0608 CMU2BF01578 |
| Genre | article |
| GroupedDBID | 0R 24P 29I 4IJ 5GY 6IK 8VB AAJGR ABPTK ACGFS ACIWK AENEX ALMA_UNASSIGNED_HOLDINGS BFFAM CS3 DU5 ESX HZ IFIPE IPLJI JAVBF LAI LOTEE LXI M43 MS NADUK NXXTH O9- OCL QWB RIE RNS RUI U5U UNMZH ZL0 ZZ .DC 0R~ 0ZK 1OC 2QL 4.4 6OB 8FE 8FG 96U AAHHS AAHJG ABJCF ABQXS ACCFJ ACCMX ACESK ACGFO ACXQS ADEYR AEEZP AEGXH AEQDE AFAZI AFKRA AIAGR AIWBW AJBDE ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU EBS EJD F8P GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO ITC K1G L6V M7S MCNEO MS~ OK1 P62 PTHSS ROL S0W ~ZZ AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c4018-1eb659b2df204cac0613cc1a56b9acd5df7845e4a44bf249f17dc681a7a84ca03 |
| IEDL.DBID | 24P |
| ISICitedReferencesCount | 8 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000373980000007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-8628 |
| IngestDate | Fri Sep 05 11:14:12 EDT 2025 Wed Oct 29 21:16:53 EDT 2025 Tue Nov 18 22:30:00 EST 2025 Wed Jan 22 16:32:32 EST 2025 Tue Jan 05 21:52:31 EST 2021 Thu May 09 18:34:36 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | reliable cloud storage reliability confidentiality cryptography data forwarding functionality file retrieval confidential cloud storage ElGamal-based proxy re-encryption algorithm robust data storage Reed-Solomon code encryption method Reed-Solomon codes storage management cipher data file dispersal cloud computing all-or-nothing-transform-based encryption |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4018-1eb659b2df204cac0613cc1a56b9acd5df7845e4a44bf249f17dc681a7a84ca03 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1835554263 |
| PQPubID | 23500 |
| PageCount | 8 |
| ParticipantIDs | crossref_citationtrail_10_1049_iet_com_2015_0608 proquest_miscellaneous_1835554263 crossref_primary_10_1049_iet_com_2015_0608 wiley_primary_10_1049_iet_com_2015_0608_CMU2BF01578 iet_journals_10_1049_iet_com_2015_0608 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | 2016-04-14 |
| PublicationDateYYYYMMDD | 2016-04-14 |
| PublicationDate_xml | – month: 04 year: 2016 text: 2016-04-14 day: 14 |
| PublicationDecade | 2010 |
| PublicationTitle | IET communications |
| PublicationYear | 2016 |
| Publisher | The Institution of Engineering and Technology |
| Publisher_xml | – name: The Institution of Engineering and Technology |
| References | Lin, H.Y.; Tzeng, W.G. (C5) 2012; 23 Li, J.; Li, J.; Chen, X. (C12) 2015; 64 Cheng, Y.; Wang, Z.Y.; Ma, J. (C11) 2013; 14 Shamir, A. (C17) 1979; 22 Liu, X.; Zhang, Y.; Wang, B. (C10) 2013; 24 Park, J.; Sandhu, R. (C19) 2004; 7 Yang, K.; Jia, X.H.; Ren, K. (C9) 2013; 8 Rabin, M.O. (C15) 1989; 36 ElGamal, T. (C14) 1985 Armbrust, M.; Fox, A.; Griffith, R. (C1) 2010; 53 Ateniese, G.; Fu, K.; Green, M. (C3) 2006; 9 Chen, H.; Lee, P. (C20) 2014; 25 1998; 1403 2010; 53 2013; 14 2011 2010 2013; 24 2015; 64 2004; 7 2006; 9 2013; 8233 1985 2014; 25 2015 2013 2013; 8 2012; 23 1979; 22 1989; 36 e_1_2_6_21_1 e_1_2_6_10_1 e_1_2_6_20_1 e_1_2_6_8_1 e_1_2_6_19_1 e_1_2_6_5_1 e_1_2_6_4_1 e_1_2_6_7_1 e_1_2_6_6_1 e_1_2_6_13_1 e_1_2_6_14_1 e_1_2_6_3_1 e_1_2_6_11_1 e_1_2_6_2_1 e_1_2_6_12_1 e_1_2_6_22_1 e_1_2_6_17_1 Liang X. (e_1_2_6_9_1) 2010 e_1_2_6_18_1 e_1_2_6_15_1 e_1_2_6_16_1 |
| References_xml | – volume: 25 start-page: 407 issue: 2 year: 2014 end-page: 416 ident: C20 article-title: Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation publication-title: IEEE Trans. on Parallel Distrib. Syst. – volume: 64 start-page: 425 issue: 2 year: 2015 end-page: 437 ident: C12 article-title: Identity-based encryption with outsourced revocation in cloud computing publication-title: IEEE Trans. Comput. – start-page: 10 year: 1985 end-page: 18 ident: C14 article-title: A public key cryptosystem and a signature scheme based on discrete logarithms publication-title: Adv. Cryptol. – volume: 22 start-page: 612 issue: 11 year: 1979 end-page: 613 ident: C17 article-title: How to share a secret publication-title: Commun. ACM – volume: 8 start-page: 1790 issue: 11 year: 2013 end-page: 1801 ident: C9 article-title: DAC-MACS: effective data access control for multiauthority cloud storage systems publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 9 start-page: 1 issue: 1 year: 2006 end-page: 30 ident: C3 article-title: Improved proxy re-encryption schemes with applications to secure distributed storage publication-title: ACM Trans. Inf. Syst. Secur. – volume: 14 start-page: 85 issue: 2 year: 2013 end-page: 97 ident: C11 article-title: Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage publication-title: J. Zhejiang Univ. Sci. C – volume: 36 start-page: 335 issue: 2 year: 1989 end-page: 348 ident: C15 article-title: Efficient dispersal of information for security, load balancing, and fault tolerance publication-title: J. ACM – volume: 24 start-page: 1182 issue: 6 year: 2013 end-page: 1191 ident: C10 article-title: Mona: secure multi-owner data sharing for dynamic groups in the cloud publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 7 start-page: 128 issue: 1 year: 2004 end-page: 174 ident: C19 article-title: The UCON ABC usage control model publication-title: ACM Trans. Inf. Syst. Secur. – volume: 53 start-page: 50 issue: 4 year: 2010 end-page: 58 ident: C1 article-title: A view of cloud computing publication-title: Commun. ACM – volume: 23 start-page: 995 issue: 6 year: 2012 end-page: 1003 ident: C5 article-title: A secure erasure code-based cloud storage system with secure data forwarding publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 25 start-page: 407 issue: 2 year: 2014 end-page: 416 article-title: Enabling data integrity protection in regenerating‐coding‐based cloud storage: theory and implementation publication-title: IEEE Trans. on Parallel Distrib. Syst. – volume: 53 start-page: 50 issue: 4 year: 2010 end-page: 58 article-title: A view of cloud computing publication-title: Commun. ACM – start-page: 1 year: 2010 end-page: 9 – volume: 24 start-page: 1182 issue: 6 year: 2013 end-page: 1191 article-title: Mona: secure multi‐owner data sharing for dynamic groups in the cloud publication-title: IEEE Trans. Parallel Distrib. Syst. – start-page: 2904 year: 2013 end-page: 2912 – start-page: 282 year: 2010 end-page: 292 – start-page: 10 year: 1985 end-page: 18 article-title: A public key cryptosystem and a signature scheme based on discrete logarithms publication-title: Adv. Cryptol. – start-page: 261 year: 2010 end-page: 270 – volume: 23 start-page: 995 issue: 6 year: 2012 end-page: 1003 article-title: A secure erasure code‐based cloud storage system with secure data forwarding publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 8 start-page: 1790 issue: 11 year: 2013 end-page: 1801 article-title: DAC‐MACS: effective data access control for multiauthority cloud storage systems publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 9 start-page: 1 issue: 1 year: 2006 end-page: 30 article-title: Improved proxy re‐encryption schemes with applications to secure distributed storage publication-title: ACM Trans. Inf. Syst. Secur. – volume: 1403 start-page: 127 year: 1998 end-page: 144 – volume: 7 start-page: 128 issue: 1 year: 2004 end-page: 174 article-title: The UCON ABC usage control model publication-title: ACM Trans. Inf. Syst. Secur. – volume: 14 start-page: 85 issue: 2 year: 2013 end-page: 97 article-title: Efficient revocation in ciphertext‐policy attribute‐based encryption based cryptographic cloud storage publication-title: J. Zhejiang Univ. Sci. C – start-page: 191 year: 2011 end-page: 202 – volume: 64 start-page: 425 issue: 2 year: 2015 end-page: 437 article-title: Identity‐based encryption with outsourced revocation in cloud computing publication-title: IEEE Trans. Comput. – volume: 36 start-page: 335 issue: 2 year: 1989 end-page: 348 article-title: Efficient dispersal of information for security, load balancing, and fault tolerance publication-title: J. ACM – volume: 8233 start-page: 75 year: 2013 end-page: 89 – year: 2015 – year: 2010 – volume: 22 start-page: 612 issue: 11 year: 1979 end-page: 613 article-title: How to share a secret publication-title: Commun. ACM – ident: e_1_2_6_12_1 doi: 10.1631/jzus.C1200240 – ident: e_1_2_6_19_1 doi: 10.1007/978-3-319-02726-5_6 – ident: e_1_2_6_5_1 doi: 10.1109/INFCOM.2013.6567101 – ident: e_1_2_6_7_1 doi: 10.1109/INFCOM.2010.5462174 – ident: e_1_2_6_10_1 doi: 10.1109/TIFS.2013.2279531 – ident: e_1_2_6_6_1 doi: 10.1109/TPDS.2011.252 – ident: e_1_2_6_11_1 doi: 10.1109/TPDS.2012.331 – ident: e_1_2_6_8_1 doi: 10.1145/1755688.1755720 – ident: e_1_2_6_21_1 doi: 10.1109/TPDS.2013.164 – ident: e_1_2_6_3_1 doi: 10.1007/BFb0054122 – ident: e_1_2_6_13_1 doi: 10.1109/TC.2013.208 – ident: e_1_2_6_15_1 doi: 10.1007/3‐540‐39568‐7_2 – ident: e_1_2_6_16_1 doi: 10.1145/62044.62050 – ident: e_1_2_6_22_1 – ident: e_1_2_6_14_1 doi: 10.1145/1755688.1755723 – ident: e_1_2_6_4_1 doi: 10.1145/1127345.1127346 – volume-title: Ciphertext policy attribute based encryption with efficient revocation year: 2010 ident: e_1_2_6_9_1 – ident: e_1_2_6_20_1 doi: 10.1145/984334.984339 – ident: e_1_2_6_18_1 doi: 10.1145/359168.359176 – ident: e_1_2_6_2_1 doi: 10.1145/1721654.1721672 – ident: e_1_2_6_17_1 |
| SSID | ssj0055644 |
| Score | 2.119403 |
| Snippet | Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the... |
| SourceID | proquest crossref wiley iet |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 661 |
| SubjectTerms | Algorithms all‐or‐nothing‐transform‐based encryption Blending cipher data Cloud computing confidential cloud storage confidentiality Construction cryptography data forwarding functionality Data storage ElGamal‐based proxy re‐encryption algorithm Encryption encryption method file dispersal file retrieval Performance evaluation Reed-Solomon codes Reed‐Solomon code reliability reliable cloud storage robust data storage storage management |
| Title | Reliable and confidential cloud storage with efficient data forwarding functionality |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-com.2015.0608 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0608 https://www.proquest.com/docview/1835554263 |
| Volume | 10 |
| WOSCitedRecordID | wos000373980000007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LaxsxEB7StIfm0PRJ3BdqKT0Utl2t9dpjY2KaQ9wcHJqb0BMMYR0SO78_M1rbjSmkUHpZWGkkxEij-UYazQB8qiMPnkuDyM2rSpjMq9YLXgWecxRBRxVNSTahJxNzft6e7sBo_Ramjw-xOXAjySj7NQm4830WEgS1OImztKjI4QM1mPxaK3rw-5Dzoaal3YjT9XYspSoZXVFN8grhu9lcbbbf_uhiSzk9wOot3HkXvRb1M97_LwN_Ck9W6JN975fLM9hJ3XPYuxOT8AVMyUmZ3lMx10WG1nKelbe82CxczJeRkTslbkKMTnBZKhEosJ6RqylDBExeuNgRI4XZnzMizn8JZ-Oj6ehHtUq9UAU0uNCuTF7J1jcxN7UILpDWD4E7qXzrQpQxayNkEk4In9GCy1zHoAx32hmkr4evYLebd-kAWDY5OxWTq10UuvVtI2PUmqfsvEb4NoB6zXMbVnHJKT3GhS3346K1yDCLDLPEMEsMG8CXTZPLPijHfcSfqWwlmtf3EX7cIjw-mtrRz5PfBPYy5gF8WC8Ii4JItyuuS_Ml9otYFrFZo4YDGJb5__vY7OjkrDkc4682r_-p1Rt4jOWK7re4eAu7i6tlegePws1idn31vkgCfn8dT24BUVUNoA |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LaxsxEB7StNDk0HeJkz7UUnoobLtaayXtsXVjEhq7OTiQm9ATDGEdEru_vzNa24kppFB63NVIiEGj-UbzAvhQBu4drzUiNycLoRMvGid44XlKQXgVZNC52YQaj_X5eXO6Bd9XuTBdfYj1gxtJRr6vScDpQbozOAUVyZzGeUERH6jC6s-lpIzf-wK1EwX2VeJ0dR_XtcwtXVFP8gLxu177NpsvfyyxoZ3u4fAG8LwNX7P-GT7-Pzt_Ao-W-JN97Q7MU9iK7TPYvVWV8DlMKEyZMqqYbQNDezlNczYvTvMXs0VgFFCJ1xCjN1wWcw0KHGcUbMoQA1McLi7ESGV2L42I9F_A2fBwMjgqls0XCo8mF1qW0cm6cVVIVSm89aT3vee2lq6xPtQhKS3qKKwQLqENl7gKXmpuldVIX_ZfwnY7a-MesKRTsjJEW9ogVOOaqg5BKR6TdQoBXA_KFdONX1YmpwYZFyZ7yEVjkGEGGWaIYYYY1oNP6ymXXVmOu4g_0r-lcF7fRfh-g_D4cGIGP0c3BOYypB68W50Ig6JI_hXbxtkC10U0i-iskv0e9PMB-PvezGB0Vn0b4qfS-_806y08PJqMTszJ8fjHAewgjSRvFxevYHt-tYiv4YH_NZ9eX73JYvEb73UQdQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3daxNBEB9qFdEHv6WpVVcRH4Srt5f9useaNli0MQ8p9G3Z2w8IlEtpk_79zuwlaYNQQXy8u9llmdvZ-c3OF8CnMnDfcGkQuTWqECbxom4ELzxPKQivgwomN5vQo5E5O6vHW3C4yoXp6kOsL9xIMvJ5TQIeL0LqDE5BRTKncV5QxAeqMLlfKsr4vS-kzuJZifHqPJZS5ZauqCd5gfjdrH2b9dc_ptjQTvfw8wbwvA1fs_4ZPv0_K38GT5b4kx10G-Y5bMX2BTy-VZXwJUwoTJkyqphrA0N7OU1zNi8O8-ezRWAUUInHEKM7XBZzDQr8zijYlCEGpjhcnIiRyuxuGhHpv4LT4dFk8L1YNl8oPJpcaFnGRsm6qUKqSuGdJ73vPXdSNbXzQYakjZBROCGahDZc4jp4ZbjTziB92X8N2-2sjTvAkknJqRBd6YLQdVNXMgSteUyu0QjgelCumG79sjI5Ncg4t9lDLmqLDLPIMEsMs8SwHnxZD7noynLcRfyZ3i2F8-ouwo8bhMdHEzv4dXJDYPE_9uDDakdYFEXyr7g2zhY4L6JZRGeV6vegnzfA39dmByen1bchPmqz-0-j3sPD8eHQ_jwe_XgDj5BEkbOLiz3Ynl8u4lt44K_n06vLd1kqfgNiwA_w |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Reliable+and+confidential+cloud+storage+with+efficient+data+forwarding+functionality&rft.jtitle=IET+communications&rft.au=Liu%2C+Jian&rft.au=Wang%2C+Huimei&rft.au=Xian%2C+Ming&rft.au=Rong%2C+Hong&rft.date=2016-04-14&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=10&rft.issue=6&rft.spage=661&rft.epage=668&rft_id=info:doi/10.1049%2Fiet-com.2015.0608&rft.externalDBID=n%2Fa&rft.externalDocID=10_1049_iet_com_2015_0608 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |