|| P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” NIST, Information Technology Laboratory, NIST SP 800-145, 2011. [Online] Available: http://www.nist.gov/itl. [Accessed: Oct. 14, 2011]
 C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” in Proceedings of IEEE INFORCOM conference on Computer Communications, Mar., 2010, pp. 1-9.
 Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no.5, May, 2011.
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” Cryptology ePrint Archive, Report 2007/202, 2007. [Online] Available: http://eprint.iacr.org. [Accessed: Mar. 5, 2012]
 A. Juels and J. Burton S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proceedings of CCS '07 the 14th ACM conference on Computer and communications security, Alexandria, VA, Oct. 2007, pp. 584–597.
 H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proceeding of Asiacrypt '08 the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, vol. 5350, Dec 2008, pp. 90–107.
 G. I., ur Rehman A., and Islam, M. H., “Cloud computing security auditing,” in Proceeding of IEEE Next Generation Information Technology (ICNIT) The 2nd International Conference, 2011, pp. 143-148.
 R. C. Merkle, “Protocol for Public Key Cryptosystems,” in Proceeding of IEEE Symposium on Security and Privacy ’80, pp. 122-133, 1980.
 D. Boneh, B. Lynn, and H. Shacham, “Short Signature from the Weil Pairing,” in Proceedings of ASIACRYPT '01 the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, 2001, pp. 514-532.
 P. L. Karlton, S. H. Fuller, R. E. Scroggs, and E. B. Koehler, “Performance of Height-Balanced Trees,” Communications of the ACM, Vol. 19, no. 1, 1976, pp. 23-28.