Identity‐based remote data possession checking in public clouds | Publicación