{"id":"https://openalex.org/W4407361674","doi":"https://doi.org/10.1109/tc.2025.3540670","title":"Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage","display_name":"Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage","publication_year":2025,"publication_date":"2025-02-11","ids":{"openalex":"https://openalex.org/W4407361674","doi":"https://doi.org/10.1109/tc.2025.3540670"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2025.3540670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3540670","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015149253","display_name":"Qingyang Zhang","orcid":"https://orcid.org/0000-0002-2600-6748"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qingyang Zhang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103728576","display_name":"Shuai Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Qian","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081525426","display_name":"Jie Cui","orcid":"https://orcid.org/0000-0001-7258-3418"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Cui","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016260066","display_name":"Hong Zhong","orcid":"https://orcid.org/0000-0002-0392-9734"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Zhong","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031717657","display_name":"Fengqun Wang","orcid":"https://orcid.org/0000-0003-2465-7982"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengqun Wang","raw_affiliation_strings":["Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology and Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5015149253"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":52.0354,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.99826914,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"74","issue":"5","first_page":"1717","last_page":"1729"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.8926471471786499},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8678230047225952},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7081677913665771},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6473581194877625},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5849504470825195},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.549263596534729},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5358603596687317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49851274490356445},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4585222601890564},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.29753953218460083},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14909842610359192},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.12879642844200134},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10168281197547913}],"concepts":[{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.8926471471786499},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8678230047225952},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7081677913665771},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6473581194877625},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5849504470825195},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.549263596534729},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5358603596687317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49851274490356445},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4585222601890564},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.29753953218460083},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14909842610359192},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.12879642844200134},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10168281197547913}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2025.3540670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3540670","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5289009734","display_name":null,"funder_award_id":"62372002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6532556903","display_name":null,"funder_award_id":"U24A20243","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G827846473","display_name":null,"funder_award_id":"62202005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8497496367","display_name":null,"funder_award_id":"62272002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W142078693","https://openalex.org/W1601035152","https://openalex.org/W1610688607","https://openalex.org/W1675372141","https://openalex.org/W1991352533","https://openalex.org/W2102881299","https://openalex.org/W2123069643","https://openalex.org/W2129167380","https://openalex.org/W2157240622","https://openalex.org/W2165257856","https://openalex.org/W2317570624","https://openalex.org/W2523200020","https://openalex.org/W2603054666","https://openalex.org/W2763513601","https://openalex.org/W2900957219","https://openalex.org/W2913630803","https://openalex.org/W3039635909","https://openalex.org/W3041188391","https://openalex.org/W3047486032","https://openalex.org/W3049672706","https://openalex.org/W3154781724","https://openalex.org/W3201382077","https://openalex.org/W4211068006","https://openalex.org/W4321608034","https://openalex.org/W4387448089","https://openalex.org/W4389076267","https://openalex.org/W6793285265"],"related_works":["https://openalex.org/W1892538828","https://openalex.org/W2185747496","https://openalex.org/W3113693895","https://openalex.org/W3179902838","https://openalex.org/W3098509882","https://openalex.org/W3098351737","https://openalex.org/W2615003995","https://openalex.org/W2169841341","https://openalex.org/W1999333545","https://openalex.org/W4394009775"],"abstract_inverted_index":{"Ensuring":[0],"cloud":[1,6],"data":[2,66],"security":[3,136],"and":[4,24,77,84,137,140,148],"reducing":[5],"storage":[7],"costs":[8],"have":[9],"become":[10],"particularly":[11],"important.":[12],"Many":[13],"schemes":[14,43],"expose":[15],"user":[16,87],"file":[17,70,88],"ownership":[18,89],"privacy":[19,72],"when":[20],"deduplicating":[21],"authentication":[22,78],"tags":[23],"during":[25,73],"integrity":[26,62,120],"auditing.":[27],"Moreover,":[28],"key":[29,93,108],"management":[30,94],"becomes":[31],"more":[32],"difficult":[33],"as":[34],"the":[35,123,132],"number":[36],"of":[37,75,143],"files":[38],"increases.":[39],"Also,":[40],"many":[41],"audit":[42,63,81],"rely":[44],"on":[45],"third-party":[46],"auditors":[47],"(TPAs),":[48],"but":[49],"finding":[50],"a":[51,60,126,141],"fully":[52,127],"trustworthy":[53],"TPA":[54],"is":[55],"challenging.":[56],"Therefore,":[57],"we":[58,96,115],"propose":[59],"blockchain-based":[61],"scheme":[64,134],"supporting":[65],"deduplication.":[67],"It":[68],"protects":[69,86],"tag":[71],"deduplication":[74],"ciphertexts":[76],"tags,":[79],"safeguards":[80],"proof":[82],"privacy,":[83],"effectively":[85],"privacy.":[90],"To":[91],"reduce":[92],"costs,":[95],"introduce":[97],"identity-based":[98],"broadcast":[99],"encryption":[100],"(IBBE)":[101],"that":[102],"does":[103],"not":[104],"require":[105],"interaction":[106],"with":[107],"servers,":[109],"eliminating":[110,122],"additional":[111],"communication":[112],"costs.":[113],"Additionally,":[114],"use":[116],"smart":[117],"contracts":[118],"for":[119,125],"auditing,":[121],"need":[124],"trusted":[128],"TPA.":[129],"We":[130],"evaluate":[131],"proposed":[133],"through":[135],"theoretical":[138],"analyses":[139],"series":[142],"experiments,":[144],"demonstrating":[145],"its":[146],"efficiency":[147],"practicality.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":13}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
