{"id":"https://openalex.org/W2774146847","doi":"https://doi.org/10.1109/tsc.2017.2778250","title":"Analysis of the comments on \u201cIdentity-Based Distributed Provable Data Possession in Multicloud Storage\u201d","display_name":"Analysis of the comments on \u201cIdentity-Based Distributed Provable Data Possession in Multicloud Storage\u201d","publication_year":2017,"publication_date":"2017-11-30","ids":{"openalex":"https://openalex.org/W2774146847","doi":"https://doi.org/10.1109/tsc.2017.2778250","mag":"2774146847"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2017.2778250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2017.2778250","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035423020","display_name":"Caihui Lan","orcid":"https://orcid.org/0000-0001-7702-8173"},"institutions":[{"id":"https://openalex.org/I4210140336","display_name":"Lanzhou City University","ror":"https://ror.org/03cd4ja39","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210140336"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Caihui Lan","raw_affiliation_strings":["School of Electronic and Information Engineering, Lanzhou City University, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Lanzhou City University, Lanzhou, China","institution_ids":["https://openalex.org/I4210140336"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100398347","display_name":"Haifeng Li","orcid":"https://orcid.org/0000-0002-4475-8310"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haifeng Li","raw_affiliation_strings":["School of Software, Dalian University of Technology, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056553377","display_name":"Caifen Wang","orcid":"https://orcid.org/0000-0003-0759-3251"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Caifen WANG","raw_affiliation_strings":["School of Computer Science and Engineering, Northwest Normal University, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Northwest Normal University, Lanzhou, China","institution_ids":["https://openalex.org/I68986083"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035423020"],"corresponding_institution_ids":["https://openalex.org/I4210140336"],"apc_list":null,"apc_paid":null,"fwci":1.9345,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90049192,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8051885962486267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6187646985054016},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.6067792773246765},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6057707667350769},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5776649713516235},{"id":"https://openalex.org/keywords/provable-security","display_name":"Provable security","score":0.5412724614143372},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5008597373962402},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4606061577796936},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.41972506046295166},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3364124000072479},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2703858017921448},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2594357132911682},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13442298769950867},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1255216896533966}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8051885962486267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6187646985054016},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.6067792773246765},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6057707667350769},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5776649713516235},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.5412724614143372},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5008597373962402},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4606061577796936},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.41972506046295166},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3364124000072479},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2703858017921448},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2594357132911682},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13442298769950867},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1255216896533966},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsc.2017.2778250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2017.2778250","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},{"id":"pmh:oai:ir.lzu.edu.cn/:262010/468172","is_oa":false,"landing_page_url":"http://ir.lzu.edu.cn/handle/262010/468172","pdf_url":null,"source":{"id":"https://openalex.org/S4406923049","display_name":"Lanzhou University Institutional Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"\u671f\u520a\u8bba\u6587"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4513619283","display_name":null,"funder_award_id":"61602080","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G94601242","display_name":null,"funder_award_id":"61562077","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1980461171","https://openalex.org/W2102881299","https://openalex.org/W2524195644","https://openalex.org/W2528685303","https://openalex.org/W2560836446"],"related_works":["https://openalex.org/W931969443","https://openalex.org/W2381781572","https://openalex.org/W2350339206","https://openalex.org/W4210480003","https://openalex.org/W2310251353","https://openalex.org/W2392139924","https://openalex.org/W2093968286","https://openalex.org/W2940759613","https://openalex.org/W2330627264","https://openalex.org/W4224442046"],"abstract_inverted_index":{"In":[0],"2016,":[1],"Peng":[2,47,58],"et":[3,48,59],"al.":[4,49],"pointed":[5],"out":[6],"in":[7],"the":[8,51,86,90,94],"literature":[9],"(IEEE":[10],"Transactions":[11,31],"on":[12,32],"Services":[13,33],"Computing,":[14,34],"Vol.":[15],"9,":[16],"No.":[17],"6,":[18],"pp.":[19,39],"996-998,":[20],"Nov./Dec.":[21],"2016)":[22],"that":[23,57,67],"Wang's":[24],"identity-based":[25],"provable":[26],"data":[27],"possessing":[28],"scheme":[29],"ID-DPDP(IEEE":[30],"vol.":[35],"8,":[36],"no.":[37],"2,":[38],"328-340,":[40],"Mar./Apr.":[41],"2015)":[42],"has":[43,63],"security":[44,65,91],"vulnerability,":[45],"and":[46],"offered":[50],"remedy":[52],"solutions.":[53],"Unfortunately,":[54],"we":[55,80],"demonstrate":[56],"al.'s":[60],"method":[61],"also":[62],"a":[64,82],"loophole":[66],"malicious":[68],"cloud":[69],"servers":[70],"can":[71],"produce":[72],"valid":[73],"proof":[74],"information":[75],"without":[76],"original":[77],"data.":[78],"Accordingly,":[79],"provide":[81],"revised":[83],"solution":[84],"to":[85],"problem":[87],"while":[88],"preserving":[89],"features":[92],"of":[93],"ID-DPDP.":[95]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
