{"id":"https://openalex.org/W2616646314","doi":"https://doi.org/10.1109/tifs.2017.2705620","title":"An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data","display_name":"An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data","publication_year":2017,"publication_date":"2017-05-18","ids":{"openalex":"https://openalex.org/W2616646314","doi":"https://doi.org/10.1109/tifs.2017.2705620","mag":"2616646314"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2705620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2705620","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Shen","raw_affiliation_strings":["Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China","School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031318875","display_name":"Jun Shen","orcid":"https://orcid.org/0000-0002-9403-7140"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Shen","raw_affiliation_strings":["Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China","School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100766011"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I200845125","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":95.0639,"has_fulltext":false,"cited_by_count":376,"citation_normalized_percentile":{"value":0.99941849,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"12","issue":"10","first_page":"2402","last_page":"2415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.861721396446228},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7982385158538818},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7655659914016724},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7319380044937134},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.640341579914093},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.5412584543228149},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4828270375728607},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4614080488681793},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.45909199118614197},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.401180237531662},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3569563329219818},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35186874866485596},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11925670504570007},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.08363085985183716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.861721396446228},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7982385158538818},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7655659914016724},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7319380044937134},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.640341579914093},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.5412584543228149},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4828270375728607},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4614080488681793},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.45909199118614197},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.401180237531662},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3569563329219818},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35186874866485596},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11925670504570007},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.08363085985183716},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2017.2705620","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2705620","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers1-1416","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers1/415","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part B","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4000000059604645}],"awards":[{"id":"https://openalex.org/G2596279138","display_name":null,"funder_award_id":"U1405254","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4115904075","display_name":null,"funder_award_id":"61572382","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8217645079","display_name":null,"funder_award_id":"61672295","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324852","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1603198476","https://openalex.org/W1977367431","https://openalex.org/W1979493600","https://openalex.org/W1984462474","https://openalex.org/W1991717599","https://openalex.org/W1994788755","https://openalex.org/W1998146393","https://openalex.org/W1999458275","https://openalex.org/W2005430048","https://openalex.org/W2007877577","https://openalex.org/W2014239329","https://openalex.org/W2015482338","https://openalex.org/W2017864158","https://openalex.org/W2027703952","https://openalex.org/W2040193872","https://openalex.org/W2042759467","https://openalex.org/W2053478405","https://openalex.org/W2058477688","https://openalex.org/W2065726143","https://openalex.org/W2079493184","https://openalex.org/W2080851070","https://openalex.org/W2086042811","https://openalex.org/W2102881299","https://openalex.org/W2114486350","https://openalex.org/W2120622033","https://openalex.org/W2123069643","https://openalex.org/W2124406434","https://openalex.org/W2135568490","https://openalex.org/W2152924492","https://openalex.org/W2154205416","https://openalex.org/W2154460143","https://openalex.org/W2206536483","https://openalex.org/W2263562411","https://openalex.org/W2275530856","https://openalex.org/W2281748871","https://openalex.org/W2281830773","https://openalex.org/W2323162780","https://openalex.org/W2342902710","https://openalex.org/W2343351721","https://openalex.org/W2344670370","https://openalex.org/W2344811709","https://openalex.org/W2463724383","https://openalex.org/W2474001793","https://openalex.org/W2490265015","https://openalex.org/W2524195644","https://openalex.org/W6671828919","https://openalex.org/W6679808140","https://openalex.org/W6693027903","https://openalex.org/W6695796623","https://openalex.org/W6720368936"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W2788012436","https://openalex.org/W200604156","https://openalex.org/W4231184955","https://openalex.org/W2374784346","https://openalex.org/W2382515644","https://openalex.org/W1930396972"],"abstract_inverted_index":{"With":[0],"the":[1,61,101,104,107,111,150,162],"rapid":[2],"development":[3],"of":[4,16,34,63,106,119],"cloud":[5,7,46],"computing,":[6],"storage":[8],"has":[9],"been":[10],"accepted":[11],"by":[12],"an":[13,38,75],"increasing":[14],"number":[15],"organizations":[17],"and":[18,25,82,125,135,156],"individuals,":[19],"therein":[20],"serving":[21],"as":[22,86,88],"a":[23,120,126,132,166],"convenient":[24],"on-demand":[26],"outsourcing":[27],"application.":[28],"However,":[29],"upon":[30],"losing":[31],"local":[32],"control":[33],"data,":[35],"it":[36],"becomes":[37],"urgent":[39],"need":[40],"for":[41],"users":[42],"to":[43,60],"verify":[44],"whether":[45],"service":[47],"providers":[48],"have":[49,57],"stored":[50],"their":[51],"data":[52,92],"securely.":[53],"Hence,":[54],"many":[55],"researchers":[56],"devoted":[58],"themselves":[59],"design":[62],"auditing":[64,78],"protocols":[65],"directed":[66],"at":[67],"outsourced":[68],"data.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"propose":[74],"efficient":[76],"public":[77],"protocol":[79,117,147,164],"with":[80,103,130],"global":[81],"sampling":[83],"blockless":[84],"verification":[85],"well":[87],"batch":[89],"auditing,":[90],"where":[91],"dynamics":[93],"are":[94],"substantially":[95],"more":[96],"efficiently":[97],"supported":[98],"than":[99],"is":[100],"case":[102],"state":[105],"art.":[108],"Note":[109],"that,":[110],"novel":[112],"dynamic":[113],"structure":[114],"in":[115,169],"our":[116,146],"consists":[118],"doubly":[121],"linked":[122],"info":[123],"table":[124],"location":[127],"array.":[128],"Moreover,":[129,153],"such":[131],"structure,":[133],"computational":[134],"communication":[136],"overheads":[137],"can":[138,148],"be":[139],"reduced":[140],"substantially.":[141],"Security":[142],"analysis":[143,155],"indicates":[144],"that":[145,161],"achieve":[149],"desired":[151],"properties.":[152],"numerical":[154],"real-world":[157],"experimental":[158],"results":[159],"demonstrate":[160],"proposed":[163],"achieves":[165],"given":[167],"efficiency":[168],"practice.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":29},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":49},{"year":2022,"cited_by_count":53},{"year":2021,"cited_by_count":38},{"year":2020,"cited_by_count":37},{"year":2019,"cited_by_count":35},{"year":2018,"cited_by_count":67},{"year":2017,"cited_by_count":49}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
