{"id":"https://openalex.org/W2961017266","doi":"https://doi.org/10.1109/tcc.2019.2929045","title":"Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage","display_name":"Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage","publication_year":2019,"publication_date":"2019-07-16","ids":{"openalex":"https://openalex.org/W2961017266","doi":"https://doi.org/10.1109/tcc.2019.2929045","mag":"2961017266"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2019.2929045","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2019.2929045","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fujian, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fujian, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101416411","display_name":"Hao Yan","orcid":"https://orcid.org/0000-0002-4569-4558"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hao Yan","raw_affiliation_strings":["College of Cyber Security, Jingling Institute of Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jingling Institute of Technology, Nanjing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341419","display_name":"Yichen Zhang","orcid":"https://orcid.org/0000-0002-6925-0775"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichen Zhang","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074149291"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":26.0382,"has_fulltext":false,"cited_by_count":179,"citation_normalized_percentile":{"value":0.99526816,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"10","issue":"1","first_page":"356","last_page":"365"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9424999952316284,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8072029948234558},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7182654142379761},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7179359197616577},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6392519474029541},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5441932678222656},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5376810431480408},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.49246105551719666},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45442652702331543},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.44723889231681824},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4388251304626465},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.43139001727104187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4041978120803833},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.347248911857605},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26327815651893616},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18019947409629822},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07775598764419556}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8072029948234558},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7182654142379761},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7179359197616577},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6392519474029541},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5441932678222656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5376810431480408},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.49246105551719666},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45442652702331543},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.44723889231681824},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4388251304626465},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43139001727104187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4041978120803833},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.347248911857605},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26327815651893616},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18019947409629822},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07775598764419556},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2019.2929045","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2019.2929045","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G4218693513","display_name":null,"funder_award_id":"61672207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5522573248","display_name":null,"funder_award_id":"61772009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6225451022","display_name":null,"funder_award_id":"6197070019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7244731676","display_name":null,"funder_award_id":"U1736112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320330337","display_name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1759101531","https://openalex.org/W1974304004","https://openalex.org/W1977367431","https://openalex.org/W1980461171","https://openalex.org/W1982946433","https://openalex.org/W1985409359","https://openalex.org/W1988537298","https://openalex.org/W1994788755","https://openalex.org/W1998436947","https://openalex.org/W2009497894","https://openalex.org/W2014239329","https://openalex.org/W2014698831","https://openalex.org/W2027703952","https://openalex.org/W2040193872","https://openalex.org/W2040477046","https://openalex.org/W2041547341","https://openalex.org/W2071874999","https://openalex.org/W2080488820","https://openalex.org/W2102881299","https://openalex.org/W2104348420","https://openalex.org/W2119137917","https://openalex.org/W2120622033","https://openalex.org/W2123069643","https://openalex.org/W2124861652","https://openalex.org/W2132027883","https://openalex.org/W2134544063","https://openalex.org/W2152924492","https://openalex.org/W2154460143","https://openalex.org/W2156498190","https://openalex.org/W2169710852","https://openalex.org/W2314118214","https://openalex.org/W2343895449","https://openalex.org/W2403350472","https://openalex.org/W2513202551","https://openalex.org/W2518462489","https://openalex.org/W2524322588","https://openalex.org/W2528685303","https://openalex.org/W2530249231","https://openalex.org/W2557181213","https://openalex.org/W2593472119","https://openalex.org/W2621249842","https://openalex.org/W2751141499","https://openalex.org/W2782900518","https://openalex.org/W2888094362","https://openalex.org/W2911261396","https://openalex.org/W2921870161"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W2363629235","https://openalex.org/W2998215210","https://openalex.org/W3088939963","https://openalex.org/W2375034746","https://openalex.org/W3199385136","https://openalex.org/W1504170878","https://openalex.org/W2963202145","https://openalex.org/W2357761884"],"abstract_inverted_index":{"To":[0,19,91],"increase":[1,92],"the":[2,7,21,69,93,128,132,136,157,168,190],"availability":[3],"and":[4,83,88,95,148,175,184,197],"durability":[5],"of":[6,23,37,71,80,104,138,151],"outsourced":[8],"data,":[9],"many":[10,64,78],"customers":[11],"store":[12,127],"multiple":[13,16,107],"copies":[14,43,115,140],"on":[15,47,68,106,167],"cloud":[17,50,108,120],"servers.":[18,110,199],"guarantee":[20],"integrity":[22,137],"multi-copies,":[24],"some":[25,54],"provable":[26],"data":[27],"possession":[28],"(PDP)":[29],"protocols":[30,40,66],"for":[31,161,195],"multi-copy":[32,56,105,196],"are":[33,116,154],"presented.":[34],"However,":[35],"most":[36],"previous":[38],"PDP":[39,65,102,193],"consider":[41],"all":[42,114,139],"to":[44,118,126],"be":[45,142],"stored":[46],"only":[48],"one":[49],"storage":[51,109,121],"server.":[52],"In":[53,111],"degree,":[55],"makes":[57],"little":[58],"sense":[59],"in":[60,156],"such":[61],"circumstance.":[62],"Furthermore,":[63],"depend":[67],"technique":[70],"public":[72],"key":[73],"infrastructure":[74],"(PKI),":[75],"which":[76,123],"suffers":[77],"types":[79],"security":[81,94,149,160],"vulnerabilities":[82],"also":[84],"brings":[85],"heavy":[86],"communicational":[87],"computational":[89],"cost.":[90],"efficiency,":[96],"we":[97],"provide":[98],"a":[99],"novel":[100],"identity-based":[101,192],"scheme":[103,153,163,181,188,194],"our":[112,152,162,180],"scheme,":[113],"delivered":[117],"different":[119],"servers,":[122],"work":[124],"cooperatively":[125],"customer's":[129],"data.":[130],"By":[131],"homomorphic":[133],"verifiable":[134],"tags,":[135],"can":[141],"checked":[143],"simultaneously.":[144],"The":[145,159,186],"system":[146],"model":[147,150],"provided":[155],"paper.":[158],"is":[164,182,189],"proved":[165],"based":[166],"computation":[169],"Diffie-Hellman":[170],"(CDH)":[171],"hard":[172],"problem.":[173],"Analysis":[174],"experimental":[176],"evaluation":[177],"show":[178],"that":[179],"efficient":[183],"practical.":[185],"proposed":[187],"first":[191],"multi-cloud":[198]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":39},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":26},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":26},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
