Reliable and confidential cloud storage with efficient data forwarding functionality

Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the outsourced data are arising. Traditional encryption methods can, guarantee data confidentiality, however, it also limits the cloud's functional...

Full description

Saved in:
Bibliographic Details
Published in:IET communications Vol. 10; no. 6; pp. 661 - 668
Main Authors: Liu, Jian, Wang, Huimei, Xian, Ming, Rong, Hong, Huang, Kun
Format: Journal Article
Language:English
Published: The Institution of Engineering and Technology 14.04.2016
Subjects:
ISSN:1751-8628, 1751-8636
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the outsourced data are arising. Traditional encryption methods can, guarantee data confidentiality, however, it also limits the cloud's functionality as few operations are supported over encrypted data. In this study, the authors construct an enhanced cloud that not only provides secure and robust data storage, but also supports the functionality that the cipher data can be forwarded without being retrieved back. Specifically, they design an all-or-nothing-transform-based encryption and a variant of ElGamal-based proxy re-encryption algorithms, blending them with Reed–Solomon code, the authors’ scheme is quite more efficient compared with previous studies because it only needs to update partial data blocks instead of the whole file for data forwarding. Besides, the authors’ scheme also satisfies another practical property that the original data owner can no longer decrypt or forward the re-encrypted data to others after a complete forwarding instance, which is termed to be ‘original inaccessibility’ in this study. Analysis shows that the authors’ scheme is secure and satisfactory. Finally, the authors theoretically and experimentally evaluate its performance and the results indicate that their scheme is efficient during file dispersal, forward and retrieval.
AbstractList Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the outsourced data are arising. Traditional encryption methods can, guarantee data confidentiality, however, it also limits the cloud's functionality as few operations are supported over encrypted data. In this study, the authors construct an enhanced cloud that not only provides secure and robust data storage, but also supports the functionality that the cipher data can be forwarded without being retrieved back. Specifically, they design an all-or-nothing-transform-based encryption and a variant of ElGamal-based proxy re-encryption algorithms, blending them with Reed–Solomon code, the authors’ scheme is quite more efficient compared with previous studies because it only needs to update partial data blocks instead of the whole file for data forwarding. Besides, the authors’ scheme also satisfies another practical property that the original data owner can no longer decrypt or forward the re-encrypted data to others after a complete forwarding instance, which is termed to be ‘original inaccessibility’ in this study. Analysis shows that the authors’ scheme is secure and satisfactory. Finally, the authors theoretically and experimentally evaluate its performance and the results indicate that their scheme is efficient during file dispersal, forward and retrieval.
Author Liu, Jian
Rong, Hong
Xian, Ming
Wang, Huimei
Huang, Kun
Author_xml – sequence: 1
  givenname: Jian
  surname: Liu
  fullname: Liu, Jian
  email: ljabc730@nudt.edu.cn
  organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China
– sequence: 2
  givenname: Huimei
  surname: Wang
  fullname: Wang, Huimei
  organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China
– sequence: 3
  givenname: Ming
  surname: Xian
  fullname: Xian, Ming
  organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China
– sequence: 4
  givenname: Hong
  surname: Rong
  fullname: Rong, Hong
  organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China
– sequence: 5
  givenname: Kun
  surname: Huang
  fullname: Huang, Kun
  organization: State Key Laboratory of CEMEE, National University of Defense Technology, Changsha, People's Republic of China
BookMark eNqFkMtqGzEUQEVJoM7jA7LTsl2MK81ImnF3rUmagEMgOGtxRw9XRpZcSYPx33cGh1BKSVeS0Dm64lygsxCDQeiGkjklbPHFmVKpuJvXhPI5EaT7gGa05bTqRCPO3vZ19xFd5LwlhHPB2Aytn4130HuDIWisYrBOm1AceKx8HDTOJSbYGHxw5Sc21jrlxnusoQC2MR0gaRc22A5BFRcDeFeOV-jcgs_m-nW9RC93t-vlfbV6-vGw_LaqFCO0q6jpBV_0tbY1YQoUEbRRigIX_QKU5tq2HeOGAWO9rdnC0lYr0VFooRt50lyiT6d39yn-GkwucueyMt5DMHHIknYN55zVohnR9oSqFHNOxkrlCkw_Lgmcl5TIqaMcO8qxo5w6yqnjaNK_zH1yO0jHd52vJ-fgvDn-X5DLx5f6-914bCe5OskTto1DGqPmd4d9_gf_cLuWy6fHP2bstW1-A_wJqjA
CitedBy_id crossref_primary_10_1155_2017_5301462
crossref_primary_10_1109_ACCESS_2018_2859758
crossref_primary_10_1002_cpe_4866
crossref_primary_10_1016_j_future_2019_05_031
crossref_primary_10_1007_s11227_019_03017_y
crossref_primary_10_1002_cpe_5804
Cites_doi 10.1631/jzus.C1200240
10.1007/978-3-319-02726-5_6
10.1109/INFCOM.2013.6567101
10.1109/INFCOM.2010.5462174
10.1109/TIFS.2013.2279531
10.1109/TPDS.2011.252
10.1109/TPDS.2012.331
10.1145/1755688.1755720
10.1109/TPDS.2013.164
10.1007/BFb0054122
10.1109/TC.2013.208
10.1007/3‐540‐39568‐7_2
10.1145/62044.62050
10.1145/1755688.1755723
10.1145/1127345.1127346
10.1145/984334.984339
10.1145/359168.359176
10.1145/1721654.1721672
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2021 The Institution of Engineering and Technology
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2021 The Institution of Engineering and Technology
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1049/iet-com.2015.0608
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-8636
EndPage 668
ExternalDocumentID 10_1049_iet_com_2015_0608
CMU2BF01578
Genre article
GroupedDBID 0R
24P
29I
4IJ
5GY
6IK
8VB
AAJGR
ABPTK
ACGFS
ACIWK
AENEX
ALMA_UNASSIGNED_HOLDINGS
BFFAM
CS3
DU5
ESX
HZ
IFIPE
IPLJI
JAVBF
LAI
LOTEE
LXI
M43
MS
NADUK
NXXTH
O9-
OCL
QWB
RIE
RNS
RUI
U5U
UNMZH
ZL0
ZZ
.DC
0R~
0ZK
1OC
2QL
4.4
6OB
8FE
8FG
96U
AAHHS
AAHJG
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ACXQS
ADEYR
AEEZP
AEGXH
AEQDE
AFAZI
AFKRA
AIAGR
AIWBW
AJBDE
ALUQN
ARAPS
AVUZU
BENPR
BGLVJ
CCPQU
EBS
EJD
F8P
GOZPB
GROUPED_DOAJ
GRPMH
HCIFZ
HZ~
IAO
ITC
K1G
L6V
M7S
MCNEO
MS~
OK1
P62
PTHSS
ROL
S0W
~ZZ
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c4018-1eb659b2df204cac0613cc1a56b9acd5df7845e4a44bf249f17dc681a7a84ca03
IEDL.DBID 24P
ISICitedReferencesCount 8
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000373980000007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-8628
IngestDate Fri Sep 05 11:14:12 EDT 2025
Wed Oct 29 21:16:53 EDT 2025
Tue Nov 18 22:30:00 EST 2025
Wed Jan 22 16:32:32 EST 2025
Tue Jan 05 21:52:31 EST 2021
Thu May 09 18:34:36 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords reliable cloud storage
reliability
confidentiality
cryptography
data forwarding functionality
file retrieval
confidential cloud storage
ElGamal-based proxy re-encryption algorithm
robust data storage
Reed-Solomon code
encryption method
Reed-Solomon codes
storage management
cipher data
file dispersal
cloud computing
all-or-nothing-transform-based encryption
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4018-1eb659b2df204cac0613cc1a56b9acd5df7845e4a44bf249f17dc681a7a84ca03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1835554263
PQPubID 23500
PageCount 8
ParticipantIDs crossref_citationtrail_10_1049_iet_com_2015_0608
proquest_miscellaneous_1835554263
crossref_primary_10_1049_iet_com_2015_0608
wiley_primary_10_1049_iet_com_2015_0608_CMU2BF01578
iet_journals_10_1049_iet_com_2015_0608
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate 2016-04-14
PublicationDateYYYYMMDD 2016-04-14
PublicationDate_xml – month: 04
  year: 2016
  text: 2016-04-14
  day: 14
PublicationDecade 2010
PublicationTitle IET communications
PublicationYear 2016
Publisher The Institution of Engineering and Technology
Publisher_xml – name: The Institution of Engineering and Technology
References Lin, H.Y.; Tzeng, W.G. (C5) 2012; 23
Li, J.; Li, J.; Chen, X. (C12) 2015; 64
Cheng, Y.; Wang, Z.Y.; Ma, J. (C11) 2013; 14
Shamir, A. (C17) 1979; 22
Liu, X.; Zhang, Y.; Wang, B. (C10) 2013; 24
Park, J.; Sandhu, R. (C19) 2004; 7
Yang, K.; Jia, X.H.; Ren, K. (C9) 2013; 8
Rabin, M.O. (C15) 1989; 36
ElGamal, T. (C14) 1985
Armbrust, M.; Fox, A.; Griffith, R. (C1) 2010; 53
Ateniese, G.; Fu, K.; Green, M. (C3) 2006; 9
Chen, H.; Lee, P. (C20) 2014; 25
1998; 1403
2010; 53
2013; 14
2011
2010
2013; 24
2015; 64
2004; 7
2006; 9
2013; 8233
1985
2014; 25
2015
2013
2013; 8
2012; 23
1979; 22
1989; 36
e_1_2_6_21_1
e_1_2_6_10_1
e_1_2_6_20_1
e_1_2_6_8_1
e_1_2_6_19_1
e_1_2_6_5_1
e_1_2_6_4_1
e_1_2_6_7_1
e_1_2_6_6_1
e_1_2_6_13_1
e_1_2_6_14_1
e_1_2_6_3_1
e_1_2_6_11_1
e_1_2_6_2_1
e_1_2_6_12_1
e_1_2_6_22_1
e_1_2_6_17_1
Liang X. (e_1_2_6_9_1) 2010
e_1_2_6_18_1
e_1_2_6_15_1
e_1_2_6_16_1
References_xml – volume: 25
  start-page: 407
  issue: 2
  year: 2014
  end-page: 416
  ident: C20
  article-title: Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation
  publication-title: IEEE Trans. on Parallel Distrib. Syst.
– volume: 64
  start-page: 425
  issue: 2
  year: 2015
  end-page: 437
  ident: C12
  article-title: Identity-based encryption with outsourced revocation in cloud computing
  publication-title: IEEE Trans. Comput.
– start-page: 10
  year: 1985
  end-page: 18
  ident: C14
  article-title: A public key cryptosystem and a signature scheme based on discrete logarithms
  publication-title: Adv. Cryptol.
– volume: 22
  start-page: 612
  issue: 11
  year: 1979
  end-page: 613
  ident: C17
  article-title: How to share a secret
  publication-title: Commun. ACM
– volume: 8
  start-page: 1790
  issue: 11
  year: 2013
  end-page: 1801
  ident: C9
  article-title: DAC-MACS: effective data access control for multiauthority cloud storage systems
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 9
  start-page: 1
  issue: 1
  year: 2006
  end-page: 30
  ident: C3
  article-title: Improved proxy re-encryption schemes with applications to secure distributed storage
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 14
  start-page: 85
  issue: 2
  year: 2013
  end-page: 97
  ident: C11
  article-title: Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
  publication-title: J. Zhejiang Univ. Sci. C
– volume: 36
  start-page: 335
  issue: 2
  year: 1989
  end-page: 348
  ident: C15
  article-title: Efficient dispersal of information for security, load balancing, and fault tolerance
  publication-title: J. ACM
– volume: 24
  start-page: 1182
  issue: 6
  year: 2013
  end-page: 1191
  ident: C10
  article-title: Mona: secure multi-owner data sharing for dynamic groups in the cloud
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 7
  start-page: 128
  issue: 1
  year: 2004
  end-page: 174
  ident: C19
  article-title: The UCON ABC usage control model
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 53
  start-page: 50
  issue: 4
  year: 2010
  end-page: 58
  ident: C1
  article-title: A view of cloud computing
  publication-title: Commun. ACM
– volume: 23
  start-page: 995
  issue: 6
  year: 2012
  end-page: 1003
  ident: C5
  article-title: A secure erasure code-based cloud storage system with secure data forwarding
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 25
  start-page: 407
  issue: 2
  year: 2014
  end-page: 416
  article-title: Enabling data integrity protection in regenerating‐coding‐based cloud storage: theory and implementation
  publication-title: IEEE Trans. on Parallel Distrib. Syst.
– volume: 53
  start-page: 50
  issue: 4
  year: 2010
  end-page: 58
  article-title: A view of cloud computing
  publication-title: Commun. ACM
– start-page: 1
  year: 2010
  end-page: 9
– volume: 24
  start-page: 1182
  issue: 6
  year: 2013
  end-page: 1191
  article-title: Mona: secure multi‐owner data sharing for dynamic groups in the cloud
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– start-page: 2904
  year: 2013
  end-page: 2912
– start-page: 282
  year: 2010
  end-page: 292
– start-page: 10
  year: 1985
  end-page: 18
  article-title: A public key cryptosystem and a signature scheme based on discrete logarithms
  publication-title: Adv. Cryptol.
– start-page: 261
  year: 2010
  end-page: 270
– volume: 23
  start-page: 995
  issue: 6
  year: 2012
  end-page: 1003
  article-title: A secure erasure code‐based cloud storage system with secure data forwarding
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 8
  start-page: 1790
  issue: 11
  year: 2013
  end-page: 1801
  article-title: DAC‐MACS: effective data access control for multiauthority cloud storage systems
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 9
  start-page: 1
  issue: 1
  year: 2006
  end-page: 30
  article-title: Improved proxy re‐encryption schemes with applications to secure distributed storage
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 1403
  start-page: 127
  year: 1998
  end-page: 144
– volume: 7
  start-page: 128
  issue: 1
  year: 2004
  end-page: 174
  article-title: The UCON ABC usage control model
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 14
  start-page: 85
  issue: 2
  year: 2013
  end-page: 97
  article-title: Efficient revocation in ciphertext‐policy attribute‐based encryption based cryptographic cloud storage
  publication-title: J. Zhejiang Univ. Sci. C
– start-page: 191
  year: 2011
  end-page: 202
– volume: 64
  start-page: 425
  issue: 2
  year: 2015
  end-page: 437
  article-title: Identity‐based encryption with outsourced revocation in cloud computing
  publication-title: IEEE Trans. Comput.
– volume: 36
  start-page: 335
  issue: 2
  year: 1989
  end-page: 348
  article-title: Efficient dispersal of information for security, load balancing, and fault tolerance
  publication-title: J. ACM
– volume: 8233
  start-page: 75
  year: 2013
  end-page: 89
– year: 2015
– year: 2010
– volume: 22
  start-page: 612
  issue: 11
  year: 1979
  end-page: 613
  article-title: How to share a secret
  publication-title: Commun. ACM
– ident: e_1_2_6_12_1
  doi: 10.1631/jzus.C1200240
– ident: e_1_2_6_19_1
  doi: 10.1007/978-3-319-02726-5_6
– ident: e_1_2_6_5_1
  doi: 10.1109/INFCOM.2013.6567101
– ident: e_1_2_6_7_1
  doi: 10.1109/INFCOM.2010.5462174
– ident: e_1_2_6_10_1
  doi: 10.1109/TIFS.2013.2279531
– ident: e_1_2_6_6_1
  doi: 10.1109/TPDS.2011.252
– ident: e_1_2_6_11_1
  doi: 10.1109/TPDS.2012.331
– ident: e_1_2_6_8_1
  doi: 10.1145/1755688.1755720
– ident: e_1_2_6_21_1
  doi: 10.1109/TPDS.2013.164
– ident: e_1_2_6_3_1
  doi: 10.1007/BFb0054122
– ident: e_1_2_6_13_1
  doi: 10.1109/TC.2013.208
– ident: e_1_2_6_15_1
  doi: 10.1007/3‐540‐39568‐7_2
– ident: e_1_2_6_16_1
  doi: 10.1145/62044.62050
– ident: e_1_2_6_22_1
– ident: e_1_2_6_14_1
  doi: 10.1145/1755688.1755723
– ident: e_1_2_6_4_1
  doi: 10.1145/1127345.1127346
– volume-title: Ciphertext policy attribute based encryption with efficient revocation
  year: 2010
  ident: e_1_2_6_9_1
– ident: e_1_2_6_20_1
  doi: 10.1145/984334.984339
– ident: e_1_2_6_18_1
  doi: 10.1145/359168.359176
– ident: e_1_2_6_2_1
  doi: 10.1145/1721654.1721672
– ident: e_1_2_6_17_1
SSID ssj0055644
Score 2.1192977
Snippet Cloud computing is a promising computing paradigm which has drawn extensive attention. Serious concerns over the reliability and confidentiality of the...
SourceID proquest
crossref
wiley
iet
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 661
SubjectTerms Algorithms
all‐or‐nothing‐transform‐based encryption
Blending
cipher data
Cloud computing
confidential cloud storage
confidentiality
Construction
cryptography
data forwarding functionality
Data storage
ElGamal‐based proxy re‐encryption algorithm
Encryption
encryption method
file dispersal
file retrieval
Performance evaluation
Reed-Solomon codes
Reed‐Solomon code
reliability
reliable cloud storage
robust data storage
storage management
Title Reliable and confidential cloud storage with efficient data forwarding functionality
URI http://digital-library.theiet.org/content/journals/10.1049/iet-com.2015.0608
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0608
https://www.proquest.com/docview/1835554263
Volume 10
WOSCitedRecordID wos000373980000007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: WIN
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LSwMxEA6-DnrwLdYXUcSDsLrZR3b3qMViwVYPFb2FPKFQtqW2_n5nsm21CAriZWF3J2F3JpP5ksnMEHLuuCmUkTYwLouCRDkZKAZ65UDWXEErrnwS14es3c5fX4unBVKfxsJU-SFmG26oGX6-RgWXqqpCAqAWhNi1owAPfIAFS69CjgG_y4zFGQ7tKHmaTsdpyn1FVzCTLAD4ns9cm8X1ty7mjNMivJ7DnV_Rqzc_jY1_-fBNsj5Bn_SmGi5bZMGW22TtS07CHdLBQ8oYT0VlaSisll3Xx_JCM93rjw3F45QwCVHcwaXWZ6CA9xSPmlJAwHgKFzqiaDCrfUbA-bvkuXHXqd8Hk9ILgYYFF6wrreJpoSLjojDRUqPV15rJlKtCapOCZPMktYlMQLywgnMsM5rnTGYyB_ow3iNLZb-0-4RGiMkwVDPWWEM8VM7loUH_o2KhY3GNhFOeCz3JS47lMXrC-8eTQgDDBDBMIMMEMqxGLmdNBlVSjp-IL_DZRDXffiI8myNs3nVE_bH1SSAGxtXI6XRACFBE9K7I0vbH0C9gWcBmEYc_ir38f_82UW89R7cNuM3ygz-1OiSr8Jyjf4slR2RpNBzbY7Ki30fdt-GJ1wS4vjTbH9oBDLE
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT-MwEB6xgLTLAZaXtrzWrFYckAJJ6jjJEQoViLbLoUjcLD-lSihF0O7v3xmnLVQrgYQ4Jhlbztjj-cbzMMBvL2yprXKR9Xkace1VpBOUK49zLTS2EjoUce3kvV5xf1_eLsDFNBemrg8xO3AjyQj7NQk4HUjXBienIpkDN4oo4gNVWHYSC8r4XeKonSiwL-W30_04y0S40hX1ZBIhfi9mvs3y9L8u5rTTF_w8Bzxfw9egf9prnzPy77A6wZ_srF4w67Dgqg1YeVWVcBP6FKZMGVVMVZahvewHIZsXm5mH4dgyCqjEbYjRGS5zoQYFfmcUbMoQA1McLnbESGXWJ42I9Lfgrn3Zb11Fk8sXIoMmF1qWTous1Kn1acyNMqT3jUlUJnSpjM1wbgueOa44TjDacD7JrRFFonJVIH3c3IbFali5H8BSQmWUrNk0dIt4rL0vYkseSJ3EPmk2IJ4yXZpJZXK6IONBBg85LyUyTCLDJDFMEsMacDxr8liX5XiL-IjeTYTz-S3CX3OE15d92frTfSGQj9Y34HC6IiSKIvlXVOWGY-wX0Syis1TgHzXDAnh_bLLVvUvP2_iYFzsfavUTvl71ux3Zue7d7MI3pBHk7Ur4HiyOnsZuH5bN39Hg-ekgiMU_dHQPhg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dT9swED9BhxA8bONjojA2gxAPk8KS1HGSx61QDQGlD0XizfKnVKlKEW339-_OaQsVEpMQj0nOlnP2-X7n-zDAiRe21Fa5yPo8jbj2KtIJypXHuRYaWwkdirhe591ucX9f9lbgfJ4LU9eHWBy4kWSE_ZoE3D1YXxucnIpkDtwkoogPVGHZWSwo4_cDz_IgninvzffjLBPhSlfUk0mE-L1Y-DbLny-6WNJOq_h5CXg-h69B_3Q-vc_IP8PHGf5kv-oFswUrrtqGzWdVCXegT2HKlFHFVGUZ2st-ELJ5sZkZjqaWUUAlbkOMznCZCzUo8DujYFOGGJjicLEjRiqzPmlEpL8Ld52LfvtPNLt8ITJocqFl6bTISp1an8bcKEN635hEZUKXytgM57bgmeOK4wSjDeeT3BpRJCpXBdLHrS_QqEaV2wOWEiqjZM2WoVvEY-19EVvyQOok9kmrCfGc6dLMKpPTBRlDGTzkvJTIMIkMk8QwSQxrwo9Fk4e6LMdrxKf0biac49cIj5cILy_6sn1780QgcR6bcDRfERJFkfwrqnKjKfaLaBbRWSrwj1phAfx_bLJ9c5f-7uBjXuy_qdV3WO-dd-T1ZffqADaQRJCzK-FfoTF5nLpDWDN_J4Px47cgFf8A6J8PAQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Reliable+and+confidential+cloud+storage+with+efficient+data+forwarding+functionality&rft.jtitle=IET+communications&rft.au=Liu%2C+Jian&rft.au=Wang%2C+Huimei&rft.au=Xian%2C+Ming&rft.au=Rong%2C+Hong&rft.date=2016-04-14&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=10&rft.issue=6&rft.spage=661&rft.epage=668&rft_id=info:doi/10.1049%2Fiet-com.2015.0608&rft.externalDBID=n%2Fa&rft.externalDocID=10_1049_iet_com_2015_0608
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon