{"id":"https://openalex.org/W4414001335","doi":"https://doi.org/10.1002/cpe.70264","title":"<scp>DMTL</scp>: An Adaptive Integrity Verification Scheme for Dynamic Cloud Datasets","display_name":"<scp>DMTL</scp>: An Adaptive Integrity Verification Scheme for Dynamic Cloud Datasets","publication_year":2025,"publication_date":"2025-09-03","ids":{"openalex":"https://openalex.org/W4414001335","doi":"https://doi.org/10.1002/cpe.70264"},"language":"en","primary_location":{"id":"doi:10.1002/cpe.70264","is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.70264","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Concurrency and Computation: Practice and Experience","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113040663","display_name":"Xinfeng He","orcid":null},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinfeng He","raw_affiliation_strings":["Key Lab on High Trusted Information System of Hebei Province  Baoding People's Republic of China","School of Cyber Security and Computer Hebei University  Baoding People's Republic of China","Key Lab on High Trusted Information System of Hebei Province, Baoding, People's Republic of China","School of Cyber Security and Computer, Hebei University, Baoding, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Key Lab on High Trusted Information System of Hebei Province  Baoding People's Republic of China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer Hebei University  Baoding People's Republic of China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"Key Lab on High Trusted Information System of Hebei Province, Baoding, People's Republic of China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Baoding, People's Republic of China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111479275","display_name":"Qing F. Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qing Zhou","raw_affiliation_strings":["Key Lab on High Trusted Information System of Hebei Province  Baoding People's Republic of China","School of Cyber Security and Computer Hebei University  Baoding People's Republic of China","Key Lab on High Trusted Information System of Hebei Province, Baoding, People's Republic of China","School of Cyber Security and Computer, Hebei University, Baoding, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Key Lab on High Trusted Information System of Hebei Province  Baoding People's Republic of China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer Hebei University  Baoding People's Republic of China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"Key Lab on High Trusted Information System of Hebei Province, Baoding, People's Republic of China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Baoding, People's Republic of China","institution_ids":["https://openalex.org/I43337087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111479275"],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35115354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"23-24","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8779599070549011},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6388775110244751},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5700805187225342},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5118836164474487},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41073551774024963},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.24835219979286194},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22547507286071777}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8779599070549011},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6388775110244751},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5700805187225342},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5118836164474487},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41073551774024963},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.24835219979286194},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22547507286071777},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/cpe.70264","is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.70264","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Concurrency and Computation: Practice and Experience","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W2005759443","https://openalex.org/W2078656587","https://openalex.org/W2086042811","https://openalex.org/W2102881299","https://openalex.org/W2120622033","https://openalex.org/W2123069643","https://openalex.org/W2149140091","https://openalex.org/W2414912788","https://openalex.org/W2585855180","https://openalex.org/W2616646314","https://openalex.org/W2777112730","https://openalex.org/W2793196814","https://openalex.org/W3015952374","https://openalex.org/W3021654819","https://openalex.org/W3085364681","https://openalex.org/W3117572899","https://openalex.org/W3119451820","https://openalex.org/W3124820193","https://openalex.org/W3129228256","https://openalex.org/W4210655227","https://openalex.org/W4226354698","https://openalex.org/W4285809709","https://openalex.org/W4293013083","https://openalex.org/W4296207716","https://openalex.org/W4310054768","https://openalex.org/W4313058932","https://openalex.org/W4316661034","https://openalex.org/W4319799431","https://openalex.org/W4323922285","https://openalex.org/W4366310665","https://openalex.org/W4386997663","https://openalex.org/W4390452972","https://openalex.org/W4393229787","https://openalex.org/W4400412016","https://openalex.org/W4402156409","https://openalex.org/W4402191458","https://openalex.org/W4402927282","https://openalex.org/W4405105764","https://openalex.org/W4406820033","https://openalex.org/W4409316425"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1522862521","https://openalex.org/W2205866749"],"abstract_inverted_index":{"ABSTRACT":[0],"With":[1],"the":[2,20,32,99],"widespread":[3],"application":[4],"of":[5,36,57,112],"cloud":[6,113],"computing,":[7],"large\u2010scale":[8],"datasets":[9],"in":[10,19,76,125],"fields":[11],"such":[12],"as":[13],"deep":[14],"learning":[15],"are":[16,28],"increasingly":[17],"stored":[18],"cloud.":[21],"Advanced":[22],"techniques":[23],"for":[24,87],"data":[25,66,134],"integrity":[26,104],"verification":[27,105],"necessitated":[29],"due":[30],"to":[31],"frequent":[33],"incremental":[34,58,110],"updates":[35,111],"these":[37,62],"datasets.":[38,114],"In":[39],"practice,":[40],"existing":[41],"Merkle":[42,70,81],"tree\u2010based":[43],"schemes":[44,124],"face":[45],"challenges,":[46],"including":[47],"high":[48],"computational":[49],"costs,":[50],"low":[51],"real\u2010time":[52],"performance,":[53],"and":[54,90],"inefficient":[55],"handling":[56],"updates.":[59],"To":[60],"address":[61],"issues,":[63],"a":[64,92],"novel":[65],"structure":[67],"named":[68],"dynamic":[69,126],"tree":[71],"ladder":[72,85],"(DMTL)":[73],"was":[74],"proposed":[75],"this":[77],"paper,":[78],"which":[79],"enhanced":[80],"trees":[82],"by":[83],"establishing":[84],"rungs":[86],"each":[88],"dataset":[89,94],"incorporating":[91],"flexible":[93],"partition":[95],"strategy.":[96],"Based":[97],"on":[98],"DMTL,":[100],"we":[101],"designed":[102],"an":[103],"scheme":[106,120,142],"that":[107,118,140],"supported":[108],"adaptive":[109],"Experimental":[115],"results":[116],"demonstrated":[117],"our":[119,141],"had":[121],"outperformed":[122],"mainstream":[123],"operation":[127],"efficiency,":[128],"especially":[129],"under":[130],"workloads":[131],"with":[132],"intensive":[133],"insertions.":[135],"Security":[136],"analysis":[137],"further":[138],"showed":[139],"could":[143],"defend":[144],"against":[145],"malicious":[146],"behaviors":[147],"effectively.":[148]},"counts_by_year":[],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
