{"id":"https://openalex.org/W3081037879","doi":"https://doi.org/10.1109/dsc50466.2020.00026","title":"StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature","display_name":"StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3081037879","doi":"https://doi.org/10.1109/dsc50466.2020.00026","mag":"3081037879"},"language":"en","primary_location":{"id":"doi:10.1109/dsc50466.2020.00026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc50466.2020.00026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044249138","display_name":"Peiru Fan","orcid":"https://orcid.org/0000-0003-1303-232X"},"institutions":[{"id":"https://openalex.org/I4210118281","display_name":"National Earthquake Response Support Service","ror":"https://ror.org/02gzvm828","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118281"]},{"id":"https://openalex.org/I4387152112","display_name":"China Industrial Control Systems Cyber Emergency Response Team","ror":"https://ror.org/010gf3m33","country_code":null,"type":"other","lineage":["https://openalex.org/I4387152112"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peiru Fan","raw_affiliation_strings":["China Industrial Control Systems Cyber Emergency Response Team,Beijing,China","China Industrial Control Systems Cyber Emergency Response Team, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Industrial Control Systems Cyber Emergency Response Team,Beijing,China","institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"]},{"raw_affiliation_string":"China Industrial Control Systems Cyber Emergency Response Team, Beijing, China","institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079343970","display_name":"Chonghua Wang","orcid":"https://orcid.org/0000-0001-9797-6736"},"institutions":[{"id":"https://openalex.org/I4387152112","display_name":"China Industrial Control Systems Cyber Emergency Response Team","ror":"https://ror.org/010gf3m33","country_code":null,"type":"other","lineage":["https://openalex.org/I4387152112"]},{"id":"https://openalex.org/I4210118281","display_name":"National Earthquake Response Support Service","ror":"https://ror.org/02gzvm828","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118281"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chonghua Wang","raw_affiliation_strings":["China Industrial Control Systems Cyber Emergency Response Team,Beijing,China","China Industrial Control Systems Cyber Emergency Response Team, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Industrial Control Systems Cyber Emergency Response Team,Beijing,China","institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"]},{"raw_affiliation_string":"China Industrial Control Systems Cyber Emergency Response Team, Beijing, China","institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361665","display_name":"Jun Li","orcid":"https://orcid.org/0000-0001-7344-3070"},"institutions":[{"id":"https://openalex.org/I4387152112","display_name":"China Industrial Control Systems Cyber Emergency Response Team","ror":"https://ror.org/010gf3m33","country_code":null,"type":"other","lineage":["https://openalex.org/I4387152112"]},{"id":"https://openalex.org/I4210118281","display_name":"National Earthquake Response Support Service","ror":"https://ror.org/02gzvm828","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210118281"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Li","raw_affiliation_strings":["China Industrial Control Systems Cyber Emergency Response Team,Beijing,China","China Industrial Control Systems Cyber Emergency Response Team, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Industrial Control Systems Cyber Emergency Response Team,Beijing,China","institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"]},{"raw_affiliation_string":"China Industrial Control Systems Cyber Emergency Response Team, Beijing, China","institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071895912","display_name":"Bo Zhao","orcid":"https://orcid.org/0000-0003-4307-9380"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Zhao","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering,WuHan,China","Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering, Wuhan University, WuHan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering,WuHan,China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering, Wuhan University, WuHan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023147131","display_name":"Zhaoxu Ji","orcid":"https://orcid.org/0000-0002-3084-6205"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoxu Ji","raw_affiliation_strings":["Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering,WuHan,China","Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering, Wuhan University, WuHan, China"],"affiliations":[{"raw_affiliation_string":"Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering,WuHan,China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering, Wuhan University, WuHan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5044249138"],"corresponding_institution_ids":["https://openalex.org/I4210118281","https://openalex.org/I4387152112"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14714551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"120","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784282922744751},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7806097269058228},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7696894407272339},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.626828670501709},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5756974816322327},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5003962516784668},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4663139283657074},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4614187180995941},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4468374252319336},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.426662415266037},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4241725206375122},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.42188626527786255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4004901647567749},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3432108163833618},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3211243450641632},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3095954358577728},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12827643752098083},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12629246711730957},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11924225091934204},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10171246528625488}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784282922744751},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7806097269058228},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7696894407272339},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.626828670501709},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5756974816322327},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5003962516784668},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4663139283657074},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4614187180995941},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4468374252319336},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.426662415266037},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4241725206375122},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.42188626527786255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4004901647567749},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3432108163833618},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3211243450641632},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3095954358577728},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12827643752098083},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12629246711730957},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11924225091934204},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10171246528625488},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc50466.2020.00026","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc50466.2020.00026","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W56540897","https://openalex.org/W650087235","https://openalex.org/W1504669610","https://openalex.org/W1716371291","https://openalex.org/W2055456945","https://openalex.org/W2065085847","https://openalex.org/W2095224642","https://openalex.org/W2158699246","https://openalex.org/W2293923001","https://openalex.org/W2360287872","https://openalex.org/W2362941995","https://openalex.org/W2371428279","https://openalex.org/W2402699914","https://openalex.org/W2505676064","https://openalex.org/W2514500337","https://openalex.org/W2547926162","https://openalex.org/W2557515658","https://openalex.org/W2907931444","https://openalex.org/W2943630833"],"related_works":["https://openalex.org/W4394650907","https://openalex.org/W154364797","https://openalex.org/W4254119641","https://openalex.org/W3196207352","https://openalex.org/W2951724202","https://openalex.org/W3084261076","https://openalex.org/W2576399385","https://openalex.org/W2963408011","https://openalex.org/W4236324517","https://openalex.org/W1586813864"],"abstract_inverted_index":{"Plain":[0],"proofs":[1,38,109,133],"(e.g.,":[2],"raw":[3],"logs,":[4],"report,":[5],"etc.)":[6],"are":[7,65],"significant":[8],"and":[9,17,118,150,157],"effective":[10],"for":[11],"integrity":[12,76,102,167],"verification.":[13],"In":[14,121],"our":[15,96,172,183],"analysis":[16,160],"comparison":[18],"of":[19,25,95,153,193],"existing":[20],"work,":[21],"we":[22,71,123,139],"found":[23],"most":[24],"them":[26],"did":[27],"not":[28],"employ":[29,124],"any":[30],"protection":[31],"mechanisms":[32],"on":[33,80,128,134,147,161,174],"the":[34,49,62,88,101,111,148],"proofs.":[35],"However,":[36],"these":[37],"contain":[39],"sensitive":[40],"information,":[41],"which":[42],"may":[43],"cause":[44],"privacy":[45,89],"leakage":[46,90],"risks":[47],"when":[48,61],"third":[50],"party":[51],"verifier":[52],"(TPV)":[53],"is":[54,58,98,185],"compromised.":[55],"The":[56,92,178],"situation":[57],"even":[59],"worse":[60],"verification":[63,77],"objects":[64],"cloud":[66,112,129,155],"components.":[67],"Motivated":[68],"by":[69],"this,":[70],"present":[72],"StateConsisIV,":[73],"a":[74,81,141,190],"privacy-preserving":[75],"method":[78,184],"based":[79,146],"novel":[82,142],"state":[83,143],"consistency":[84,144],"feature":[85,145,159],"to":[86,99,114,131,163],"address":[87],"problem.":[91],"core":[93],"idea":[94],"work":[97],"enable":[100],"judgment":[103,168],"through":[104],"encrypted":[105],"proofs,":[106],"withholding":[107],"plain":[108],"inside":[110],"only":[113],"reduce":[115],"attack":[116],"surface":[117],"enhance":[119],"privacy.":[120],"specific,":[122],"random":[125],"transformation":[126],"algorithm":[127],"nodes":[130],"encrypt":[132],"their":[135],"birth":[136],"places.":[137],"Besides,":[138],"design":[140],"deployment":[149],"operation":[151],"pattern":[152],"structural":[154],"components":[156],"perform":[158],"TPV":[162],"guarantee":[164],"an":[165],"accurate":[166],"result.":[169],"We":[170],"evaluate":[171],"approach":[173],"one":[175],"typical":[176],"dataset.":[177],"experimental":[179],"results":[180],"show":[181],"that":[182],"considered":[186],"more":[187],"worthy":[188],"with":[189],"little":[191],"bit":[192],"extra":[194],"computation":[195],"overhead.":[196]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
