{"id":"https://openalex.org/W3011462710","doi":"https://doi.org/10.1109/jsyst.2020.2978146","title":"Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage","display_name":"Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage","publication_year":2020,"publication_date":"2020-03-18","ids":{"openalex":"https://openalex.org/W3011462710","doi":"https://doi.org/10.1109/jsyst.2020.2978146","mag":"3011462710"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2020.2978146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2020.2978146","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101416411","display_name":"Hao Yan","orcid":"https://orcid.org/0000-0002-4569-4558"},"institutions":[{"id":"https://openalex.org/I4210166603","display_name":"Jinling Institute of Technology","ror":"https://ror.org/05em1gq62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210166603"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Yan","raw_affiliation_strings":["College of Cyber Security, Jinling Institute of Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinling Institute of Technology, Nanjing, China","institution_ids":["https://openalex.org/I4210166603"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341419","display_name":"Yichen Zhang","orcid":"https://orcid.org/0000-0002-6925-0775"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichen Zhang","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074149291"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":21.7024,"has_fulltext":false,"cited_by_count":131,"citation_normalized_percentile":{"value":0.99394617,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"15","issue":"1","first_page":"577","last_page":"585"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7944232821464539},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.708699107170105},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6415881514549255},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6095768213272095},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5858975648880005},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5634727478027344},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5341386198997498},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5279606580734253},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5002155303955078},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4886079430580139},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4604623317718506},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.39441120624542236},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.38580891489982605},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1481657326221466}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7944232821464539},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.708699107170105},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6415881514549255},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6095768213272095},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5858975648880005},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5634727478027344},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5341386198997498},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5279606580734253},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5002155303955078},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4886079430580139},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4604623317718506},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.39441120624542236},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.38580891489982605},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1481657326221466},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2020.2978146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2020.2978146","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6700000166893005,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1358783770","display_name":null,"funder_award_id":"61902140","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1430923456","display_name":null,"funder_award_id":"1908085QF288","funder_id":"https://openalex.org/F4320334897","funder_display_name":"Natural Science Foundation of Anhui Province"},{"id":"https://openalex.org/G3041179666","display_name":null,"funder_award_id":"61872089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3289934160","display_name":null,"funder_award_id":"61972095","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5270768167","display_name":null,"funder_award_id":"61822202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5522573248","display_name":null,"funder_award_id":"61772009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7244731676","display_name":null,"funder_award_id":"U1736112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334897","display_name":"Natural Science Foundation of Anhui Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W142078693","https://openalex.org/W168593163","https://openalex.org/W189916820","https://openalex.org/W575232860","https://openalex.org/W1161827896","https://openalex.org/W1802540854","https://openalex.org/W1974304004","https://openalex.org/W1977367431","https://openalex.org/W1980461171","https://openalex.org/W1994788755","https://openalex.org/W2009497894","https://openalex.org/W2014239329","https://openalex.org/W2014698831","https://openalex.org/W2027095160","https://openalex.org/W2027703952","https://openalex.org/W2034944725","https://openalex.org/W2040193872","https://openalex.org/W2041547341","https://openalex.org/W2071874999","https://openalex.org/W2079493184","https://openalex.org/W2080488820","https://openalex.org/W2102881299","https://openalex.org/W2104348420","https://openalex.org/W2119137917","https://openalex.org/W2123069643","https://openalex.org/W2152924492","https://openalex.org/W2154205416","https://openalex.org/W2154460143","https://openalex.org/W2169710852","https://openalex.org/W2261354470","https://openalex.org/W2310212673","https://openalex.org/W2314118214","https://openalex.org/W2343895449","https://openalex.org/W2495086702","https://openalex.org/W2513202551","https://openalex.org/W2518462489","https://openalex.org/W2521325306","https://openalex.org/W2528685303","https://openalex.org/W2548207196","https://openalex.org/W2557181213","https://openalex.org/W2593472119","https://openalex.org/W2621249842","https://openalex.org/W2751141499","https://openalex.org/W2758068229","https://openalex.org/W2782900518","https://openalex.org/W2888094362","https://openalex.org/W2898455119","https://openalex.org/W2911261396","https://openalex.org/W2948230089","https://openalex.org/W2961017266","https://openalex.org/W2969074717","https://openalex.org/W2970213526","https://openalex.org/W2972507722","https://openalex.org/W2977014769","https://openalex.org/W4255189582","https://openalex.org/W6605846825"],"related_works":["https://openalex.org/W2771225061","https://openalex.org/W2355766212","https://openalex.org/W1852630156","https://openalex.org/W2625231702","https://openalex.org/W4311223005","https://openalex.org/W2370840345","https://openalex.org/W2602423869","https://openalex.org/W2605525988","https://openalex.org/W2187109955","https://openalex.org/W2599115144"],"abstract_inverted_index":{"Although":[0],"cloud":[1],"storage":[2],"service":[3],"enables":[4],"people":[5],"easily":[6],"maintain":[7],"and":[8,57,140],"manage":[9],"amounts":[10],"of":[11,21,30,53,83,127],"data":[12,32,38,54,94,113],"with":[13],"lower":[14],"cost,":[15],"it":[16],"cannot":[17],"ensure":[18],"the":[19,28,31,50,89,105,112,115,125],"integrity":[20,39,116],"people's":[22],"data.":[23],"In":[24],"order":[25],"to":[26,87],"audit":[27],"correctness":[29],"without":[33],"downloading":[34],"them,":[35],"many":[36],"remote":[37],"checking":[40,117],"(RDIC)":[41],"schemes":[42,48],"have":[43],"been":[44],"presented.":[45],"Most":[46],"existing":[47],"ignore":[49],"important":[51],"issue":[52],"privacy":[55],"preserving":[56],"suffer":[58],"from":[59,64,107],"complicated":[60],"certificate":[61],"management":[62],"derived":[63],"public":[65],"key":[66],"infrastructure.":[67],"To":[68],"overcome":[69],"these":[70],"shortcomings,":[71],"this":[72],"article":[73],"proposes":[74],"a":[75],"new":[76],"Identity-based":[77],"RDIC":[78],"scheme":[79,120,136],"that":[80,134],"makes":[81],"use":[82],"homomorphic":[84],"verifiable":[85],"tag":[86],"decrease":[88],"system":[90],"complexity.":[91],"The":[92],"original":[93],"in":[95],"proof":[96],"are":[97],"masked":[98],"by":[99],"random":[100],"integer":[101],"addition,":[102],"which":[103],"protects":[104],"verifier":[106],"obtaining":[108],"any":[109],"knowledge":[110],"about":[111],"during":[114],"process.":[118],"Our":[119],"is":[121,137],"proved":[122],"secure":[123],"under":[124],"assumption":[126],"computational":[128],"Diffie-Hellman":[129],"problem.":[130],"Experiment":[131],"result":[132],"exhibits":[133],"our":[135],"very":[138],"efficient":[139],"feasible":[141],"for":[142],"real-life":[143],"applications.":[144]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":11}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
