{"id":"https://openalex.org/W3189726619","doi":"https://doi.org/10.1109/icc42927.2021.9500841","title":"A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service","display_name":"A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3189726619","doi":"https://doi.org/10.1109/icc42927.2021.9500841","mag":"3189726619"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9500841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039576301","display_name":"Ziye Geng","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ziye Geng","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009109404","display_name":"Yunhua He","orcid":"https://orcid.org/0000-0003-3258-7160"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunhua He","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407063","display_name":"Chao Wang","orcid":"https://orcid.org/0009-0000-5147-3295"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045319978","display_name":"Gang Xu","orcid":"https://orcid.org/0000-0002-1409-252X"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xu","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014818716","display_name":"Ke Xiao","orcid":"https://orcid.org/0000-0002-8654-1339"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Xiao","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5039576301"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":null,"apc_paid":null,"fwci":1.377,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.85162231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.8201584815979004},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.7525069713592529},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7443534135818481},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.738240122795105},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7204091548919678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6971129775047302},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.5502731800079346},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5478004813194275},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.519980251789093},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.517952561378479},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.46748608350753784},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.453681617975235},{"id":"https://openalex.org/keywords/reputation-management","display_name":"Reputation management","score":0.4500768184661865},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4488263726234436},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.44461894035339355},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4434834420681},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.44200509786605835},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.435176819562912},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3502451181411743},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2922555208206177},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2155287265777588},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.08643803000450134}],"concepts":[{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.8201584815979004},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.7525069713592529},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7443534135818481},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.738240122795105},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7204091548919678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6971129775047302},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.5502731800079346},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5478004813194275},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.519980251789093},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.517952561378479},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.46748608350753784},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.453681617975235},{"id":"https://openalex.org/C2985362895","wikidata":"https://www.wikidata.org/wiki/Q478594","display_name":"Reputation management","level":3,"score":0.4500768184661865},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4488263726234436},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.44461894035339355},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4434834420681},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.44200509786605835},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.435176819562912},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3502451181411743},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2922555208206177},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2155287265777588},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.08643803000450134},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc42927.2021.9500841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W315555386","https://openalex.org/W2051576372","https://openalex.org/W2053362405","https://openalex.org/W2402534533","https://openalex.org/W2542873015","https://openalex.org/W2787634488","https://openalex.org/W2891996945","https://openalex.org/W2906655903","https://openalex.org/W2940959676","https://openalex.org/W2946896393","https://openalex.org/W3003575154","https://openalex.org/W3012209760","https://openalex.org/W6761750580"],"related_works":["https://openalex.org/W3165167681","https://openalex.org/W2560500356","https://openalex.org/W1863772788","https://openalex.org/W4403065891","https://openalex.org/W2948403925","https://openalex.org/W2135181784","https://openalex.org/W2150669607","https://openalex.org/W1530456482","https://openalex.org/W2101139861","https://openalex.org/W3158612892"],"abstract_inverted_index":{"Nowadays,":[0],"the":[1,26,52,87,94,119,129,135,141,147,153],"quality":[2],"of":[3,132,137,155],"cloud":[4,27,65],"services":[5],"offered":[6],"by":[7],"different":[8],"service":[9,18,28,66],"providers":[10],"varies":[11],"greatly.":[12],"Reputation":[13],"mechanism,":[14],"as":[15],"a":[16,37,57,68,100,104,115],"better":[17],"evaluation":[19],"method,":[20],"can":[21],"help":[22],"standardize":[23],"and":[24,43,67,90,152],"regulate":[25],"market.":[29],"However,":[30],"existing":[31],"reputation":[32,62,69,79,82],"systems":[33],"either":[34],"rely":[35],"on":[36,140],"trusted":[38,78],"third":[39],"party":[40],"with":[41],"security":[42,136],"privacy":[44],"issues,":[45,54],"or":[46],"lack":[47],"reliable":[48],"evaluation.":[49,102],"To":[50],"address":[51],"above":[53],"we":[55],"propose":[56],"blockchain":[58],"based":[59],"privacy-preserving":[60],"dynamic":[61],"mechanism":[63],"for":[64],"management":[70],"smart":[71],"contract":[72],"(RM)":[73],"is":[74,108,125,150,157],"designed":[75,109],"to":[76,98,110,127],"implement":[77],"computation.":[80],"The":[81],"integrates":[83],"conformance":[84],"trust":[85,92],"in":[86,93],"subjective":[88],"view":[89,96],"recommendation":[91],"objective":[95],"together":[97],"provide":[99],"comprehensive":[101],"Besides,":[103],"miner":[105],"selection":[106],"algorithm":[107,123],"prevent":[111],"miners":[112],"from":[113],"launching":[114],"collusion":[116],"attack.":[117],"Moreover,":[118],"Paillier":[120],"homomorphic":[121],"encryption":[122,156],"(PHE)":[124],"introduced":[126],"encrypt":[128],"sensitive":[130],"data":[131,138],"customers,":[133],"ensuring":[134],"stored":[139],"blockchain.":[142],"Experiment":[143],"results":[144],"reveal":[145],"that":[146],"proposed":[148],"model":[149],"feasible":[151],"performance":[154],"acceptable.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
