1. Q. Zhang, L. Cheng, R. Boutaba, Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
2. K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Comput. 6(1), 69–73 (2012)
3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), pp. 598–609
4. A. Juels, B.S. Kaliski, Pors: proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), pp. 584–597
5. H. Shacham, B. Waters, Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)