{"id":"https://openalex.org/W2560836446","doi":"https://doi.org/10.1109/tsc.2016.2589248","title":"Comments on \u201cIdentity-Based Distributed Provable Data Possession in Multicloud Storage\u201d","display_name":"Comments on \u201cIdentity-Based Distributed Provable Data Possession in Multicloud Storage\u201d","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2560836446","doi":"https://doi.org/10.1109/tsc.2016.2589248","mag":"2560836446"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2016.2589248","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2016.2589248","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101679135","display_name":"Su Peng","orcid":"https://orcid.org/0000-0002-3073-5695"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Su Peng","raw_affiliation_strings":["School of Computer Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101669124","display_name":"Fucai Zhou","orcid":"https://orcid.org/0000-0003-2667-6853"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fucai Zhou","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085728168","display_name":"Jian Xu","orcid":"https://orcid.org/0000-0001-5590-8540"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Xu","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103008969","display_name":"Zifeng Xu","orcid":"https://orcid.org/0000-0001-5564-2770"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zifeng Xu","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101679135"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":6.8044,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.96833066,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"9","issue":"6","first_page":"996","last_page":"998"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8442649841308594},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.7142677307128906},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7082409262657166},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.6857918500900269},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6077436208724976},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5853502154350281},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.578842282295227},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.532720685005188},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5288408994674683},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49766805768013},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.47416865825653076},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3716861605644226},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3332154154777527},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31615108251571655},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21632876992225647},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18485009670257568},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08726760745048523},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07198193669319153}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8442649841308594},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.7142677307128906},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7082409262657166},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.6857918500900269},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6077436208724976},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5853502154350281},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.578842282295227},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.532720685005188},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5288408994674683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49766805768013},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.47416865825653076},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3716861605644226},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3332154154777527},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31615108251571655},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21632876992225647},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18485009670257568},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08726760745048523},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07198193669319153},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2016.2589248","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2016.2589248","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G1513420983","display_name":null,"funder_award_id":"61272546","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5605848857","display_name":null,"funder_award_id":"61472184","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6667581590","display_name":null,"funder_award_id":"61321491","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W89672345","https://openalex.org/W1535147830","https://openalex.org/W1980461171","https://openalex.org/W2102881299"],"related_works":["https://openalex.org/W931969443","https://openalex.org/W2381781572","https://openalex.org/W2350339206","https://openalex.org/W4210480003","https://openalex.org/W2522015974","https://openalex.org/W1581260473","https://openalex.org/W2530249231","https://openalex.org/W2940759613","https://openalex.org/W2330627264","https://openalex.org/W4224442046"],"abstract_inverted_index":{"In":[0],"2015,":[1],"Wang":[2],"proposed":[3],"the":[4,32,48,59,84,98,102],"first":[5],"identity-based":[6],"provable":[7],"data":[8,29,61,76,85],"possession":[9],"scheme":[10,44,71],"named":[11],"ID-DPDP":[12],"(IEEE":[13],"Transactions":[14],"on":[15],"Services":[16],"Computing,":[17],"vol.":[18],"8,":[19],"no.":[20],"2,":[21],"pp.":[22],"328-340,":[23],"Mar./Apr.":[24],"2015)":[25],"to":[26,74,93],"verify":[27],"outsourced":[28],"publicly":[30],"without":[31,57],"implementation":[33],"of":[34,101],"PKI.":[35],"Unfortunately,":[36],"in":[37,47,69],"this":[38,43,70],"letter,":[39],"we":[40,90],"demonstrate":[41],"that":[42,50],"is":[45],"insecure":[46],"sense":[49],"cloud":[51],"servers":[52],"can":[53,78],"generate":[54],"valid":[55],"proofs":[56],"possessing":[58],"original":[60,103],"blocks.":[62],"We":[63],"also":[64],"show":[65],"another":[66],"security":[67,99],"issue":[68],"which":[72],"leads":[73],"some":[75],"blocks":[77,86],"never":[79],"be":[80],"verified":[81],"unless":[82],"all":[83],"are":[87],"challenged.":[88],"Meanwhile,":[89],"provide":[91],"solutions":[92],"these":[94],"problems":[95],"while":[96],"preserving":[97],"features":[100],"scheme.":[104]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
