{"id":"https://openalex.org/W4293731588","doi":"https://doi.org/10.1109/jsyst.2022.3198098","title":"Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT","display_name":"Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT","publication_year":2022,"publication_date":"2022-08-29","ids":{"openalex":"https://openalex.org/W4293731588","doi":"https://doi.org/10.1109/jsyst.2022.3198098"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2022.3198098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3198098","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053797144","display_name":"Tongtong Sang","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tongtong Sang","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]},{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Peng Zeng","orcid":"https://orcid.org/0000-0002-3904-9245"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Zeng","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053797144"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":6.368,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.96714297,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":"1","first_page":"224","last_page":"233"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9603000283241272,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.804179847240448},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.790625810623169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7698906660079956},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.662033200263977},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5639474391937256},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.5496540665626526},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4899994432926178},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47651517391204834},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.46746233105659485},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44314947724342346},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43720391392707825},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.41538119316101074},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3574761748313904},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34722664952278137},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12838727235794067},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.09620204567909241}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.804179847240448},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.790625810623169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7698906660079956},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.662033200263977},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5639474391937256},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.5496540665626526},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4899994432926178},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47651517391204834},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.46746233105659485},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44314947724342346},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43720391392707825},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.41538119316101074},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3574761748313904},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34722664952278137},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12838727235794067},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.09620204567909241},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2022.3198098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3198098","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4814151915","display_name":null,"funder_award_id":"22ZR1419600","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G5791007902","display_name":null,"funder_award_id":"2022D05","funder_id":"https://openalex.org/F4320336270","funder_display_name":"National Mobile Communications Research Laboratory, Southeast University"},{"id":"https://openalex.org/G7546529557","display_name":null,"funder_award_id":"62072184","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7955105451","display_name":null,"funder_award_id":"12071138","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336270","display_name":"National Mobile Communications Research Laboratory, Southeast University","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W868998051","https://openalex.org/W1788452017","https://openalex.org/W1984153141","https://openalex.org/W1988537298","https://openalex.org/W2018524855","https://openalex.org/W2040477046","https://openalex.org/W2041547341","https://openalex.org/W2042759467","https://openalex.org/W2056349387","https://openalex.org/W2058406610","https://openalex.org/W2079493184","https://openalex.org/W2080488820","https://openalex.org/W2102881299","https://openalex.org/W2120622033","https://openalex.org/W2123069643","https://openalex.org/W2124861652","https://openalex.org/W2125858711","https://openalex.org/W2132027883","https://openalex.org/W2148888468","https://openalex.org/W2152144666","https://openalex.org/W2156498190","https://openalex.org/W2292320942","https://openalex.org/W2474861573","https://openalex.org/W2518462489","https://openalex.org/W2528685303","https://openalex.org/W2553934243","https://openalex.org/W2557181213","https://openalex.org/W2557530247","https://openalex.org/W2794873445","https://openalex.org/W2811082328","https://openalex.org/W2961017266","https://openalex.org/W3046515131","https://openalex.org/W3047335002","https://openalex.org/W3047486032","https://openalex.org/W3119574432","https://openalex.org/W4205896572","https://openalex.org/W4300349690"],"related_works":["https://openalex.org/W2171633791","https://openalex.org/W2091937751","https://openalex.org/W2505329523","https://openalex.org/W2371282533","https://openalex.org/W2046466541","https://openalex.org/W1606781580","https://openalex.org/W2986069939","https://openalex.org/W2248905259","https://openalex.org/W1852630156","https://openalex.org/W2625231702"],"abstract_inverted_index":{"Cloud-based":[0],"Internet":[1],"of":[2,22,59,64,83,118,146,166,228],"Things":[3],"systems":[4],"facilitate":[5],"cloud":[6,10,31,47],"storage":[7],"and":[8,209],"provide":[9],"users":[11,27,53,84,101,194],"with":[12],"convenient":[13],"data":[14,51,61,89],"outsourcing":[15,173],"service,":[16],"although":[17],"there":[18],"are":[19,90],"a":[20,134,176,199],"number":[21],"associated":[23],"risks":[24],"to":[25,43,55,114,149,169,189,203,240,244],"the":[26,46,50,57,65,76,81,88,107,116,120,128,143,147,155,215,218,226],"(e.g.,":[28,158,195],"an":[29],"untrusted":[30],"server":[32,48],"or":[33],"their":[34],"employee/vendor":[35],"may":[36],"delete":[37],"rarely":[38],"accessed":[39],"data).":[40],"In":[41],"order":[42],"ensure":[44],"that":[45],"stores":[49],"correctly,":[52],"need":[54,168],"verify":[56],"integrity":[58,117,137],"remote":[60],"periodically.":[62],"Most":[63],"existing":[66],"public":[67],"auditing":[68,95,138,243,246,250],"protocols":[69],"only":[70],"considered":[71],"storing":[72],"single":[73],"copy":[74],"on":[75,106],"cloud;":[77],"in":[78],"this":[79,131],"case,":[80,178],"loss":[82],"is":[85],"irreparable":[86],"when":[87],"damaged.":[91],"Subsequently,":[92],"some":[93],"multicopy":[94,136],"schemes":[96],"have":[97],"been":[98],"proposed":[99,183],"where":[100,159],"can":[102,111,185,237],"store":[103],"multiple":[104,207,249],"replicas":[105],"cloud.":[108],"However,":[109],"it":[110],"be":[112,170,186,238],"challenging":[113],"check":[115],"all":[119],"copies":[121,208],"without":[122],"incurring":[123],"significant":[124],"computation":[125,191],"overheads":[126],"for":[127,193,248],"auditor/user.":[129],"Hence,":[130],"article":[132],"proposes":[133],"provable":[135],"scheme":[139,184],"(PMCIA),":[140],"which":[141],"reduces":[142],"verification":[144],"cost":[145],"auditor":[148],"several":[150],"lightweight":[151],"hash":[152],"operations.":[153],"Using":[154],"medical":[156],"settings":[157],"electronic":[160],"health":[161],"records":[162],"containing":[163],"sensitive":[164],"information":[165,201],"patients":[167,205],"preprocessed":[171],"before":[172],"storage)":[174],"as":[175,222,224],"use":[177],"we":[179,197,233],"explain":[180,234],"how":[181,235],"our":[182,229],"deployed.":[187],"Specifically,":[188],"minimize":[190],"overhead":[192],"patients),":[196],"introduce":[198],"hospital":[200],"center":[202],"help":[204],"generate":[206],"corresponding":[210],"tags.":[211],"We":[212],"then":[213],"prove":[214],"security":[216],"under":[217],"computational":[219],"Diffie\u2013Hellman":[220],"assumption":[221],"well":[223],"evaluate":[225],"performance":[227],"PMCIA":[230,236],"scheme.":[231],"Finally,":[232],"extended":[239],"support":[241],"batch":[242],"improve":[245],"efficiency":[247],"tasks.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
