|  Sharma S. Expanded cloud plumes hiding big data ecosystem. Future Generation Computer Systems, 2016, 59:63-92. Yu Y, Ni J B, Man H A, Mu Y, Wang B Y, Li H. Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Services Computing, 2015, 8(6):998-999. Kandukuri B R, Ramakrishna P V, Rakshit A. Cloud security issues. In Proc. IEEE International Conference on Services Computing (SCC), September 2009, pp.517-520. Stinson D R. An explication of secret sharing schemes. Designs, Codes and Cryptography, 1992, 2(4):357-390. Beimel A. Secret-sharing schemes:A survey. In Coding and Cryptology, Chee Y M, Guo Z B, Ling S, Shao F J, Tang Y S, Wang H X, Xing C P (eds.), Springer, 2011, pp.11-46. Peng K. Critical survey of existing publicly verifiable secret sharing schemes. IET Information Security, 2012, 6(4):249-257. Maheshwari N, Kiyawat K. Structural framing of protocol for secure multiparty cloud computation. In Proc. the 5th Asia Modelling Symp. (AMS), July 2011, pp.187-192. Hamari J, Sjöklint M, Ukkonen A. The sharing economy:Why people participate in collaborative consumption. Journal of the Association for Information Science and Technology, 2016, 67(9):2047-2059. Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613. Blakley G R. Safeguarding cryptographic keys. In Proc. AFIPS 1979 National Computer Conf., June 1979, pp.313-317. Antonopoulos A M. Mastering Bitcoin:Unlocking Digital Crypto-Currencies. O'Reilly Media, 2014. Rivest R, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 26(2):96-99. Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Stern J (ed.), Springer, 1999, pp.223-238. Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3):177-206. Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V. Blockchain-based database to ensure data integrity in cloud computing environments. In Proc. the 1st International Italian Conference on Cybersecurity, January 2017, pp.146-155. Ali M, Nelson J, Shea R, Freedman R J. Blockstack:A global naming and storage system secured by blockchains. In Proc. USENIX Annu. Technical Conf. (ACT), June 2016, pp.181-194. Liang X P, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L. ProvChain:A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proc. the 17th IEEE/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID), May 2017, pp.468-477. Cai C J, Yuan X L, Wang C. Towards trustworthy and private keyword search in encrypted decentralized storage. In Proc. IEEE International Conference on Communications (ICC), May 2017. Miller A, Juels A, Shi E, Parno B, Katz J. Permacoin:Repurposing bitcoin work for data preservation. In Proc. IEEE Symp. Security and Privacy (SP), May 2014, pp.475-490. Frikken K B. Secure multiparty computation. In Algorithms and Theory of Computation Handbook, Atallah M J (ed.), Chapman and Hall/CRC, 2010. Fouque P A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries. In Financial Cryptography, Frankel Y (ed.), Springer, 2000, pp.90-104. Baudron O, Fouque P A, Pointcheval D, Stern J, Poupard G. Practical multi-candidate election system. In Proc. the 20th Annu. ACM Symp. Principles of Distributed Computing (PODC), August 2001, pp.274-283.