{"id":"https://openalex.org/W7124921507","doi":"https://doi.org/10.3390/fi18010056","title":"MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data","display_name":"MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data","publication_year":2026,"publication_date":"2026-01-20","ids":{"openalex":"https://openalex.org/W7124921507","doi":"https://doi.org/10.3390/fi18010056"},"language":"en","primary_location":{"id":"doi:10.3390/fi18010056","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010056","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/fi18010056","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100414892","display_name":"Lihua Zhang","orcid":"https://orcid.org/0000-0001-7841-5562"},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lihua Zhang","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123392727","display_name":"Jiali Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiali Luo","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123429474","display_name":"Yi Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Yang","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China","institution_ids":["https://openalex.org/I13985625"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123429149","display_name":"Wenbiao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I13985625","display_name":"East China Jiaotong University","ror":"https://ror.org/05x2f1m38","country_code":"CN","type":"education","lineage":["https://openalex.org/I13985625"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbiao Wang","raw_affiliation_strings":["School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China","institution_ids":["https://openalex.org/I13985625"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100414892"],"corresponding_institution_ids":["https://openalex.org/I13985625"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26567657,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"1","first_page":"56","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.39959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.39959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.19300000369548798,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.07360000163316727,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.605400025844574},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5546000003814697},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4952000081539154},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.48840001225471497},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4632999897003174},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.4627000093460083},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.46149998903274536},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.435699999332428},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4327999949455261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.857200026512146},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.605400025844574},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5546000003814697},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5358999967575073},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4952000081539154},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.48840001225471497},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4632999897003174},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.4627000093460083},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.46149998903274536},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.435699999332428},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4327999949455261},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.41909998655319214},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4147999882698059},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.40779998898506165},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.40529999136924744},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3743000030517578},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.3711000084877014},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3540000021457672},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.34389999508857727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34380000829696655},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.3183000087738037},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.30979999899864197},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3041999936103821},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C121838778","wikidata":"https://www.wikidata.org/wiki/Q7619924","display_name":"Storage efficiency","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.29339998960494995},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26660001277923584},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.26019999384880066}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi18010056","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010056","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:91e8a09db5ec461dadff43257028c65e","is_oa":true,"landing_page_url":"https://doaj.org/article/91e8a09db5ec461dadff43257028c65e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 18, Iss 1, p 56 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi18010056","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi18010056","pdf_url":null,"source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6080869436264038,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2905972276","https://openalex.org/W2914424007","https://openalex.org/W2922361312","https://openalex.org/W2982634382","https://openalex.org/W2995782542","https://openalex.org/W2996405275","https://openalex.org/W3025728856","https://openalex.org/W3049284124","https://openalex.org/W3083181312","https://openalex.org/W3113315534","https://openalex.org/W3127497623","https://openalex.org/W3134644166","https://openalex.org/W3152395682","https://openalex.org/W3171482374","https://openalex.org/W3198924380","https://openalex.org/W3205713875","https://openalex.org/W3208100143","https://openalex.org/W4205196391","https://openalex.org/W4224443281","https://openalex.org/W4292862552","https://openalex.org/W4317796730","https://openalex.org/W4318477538","https://openalex.org/W4320725092","https://openalex.org/W4322631778","https://openalex.org/W4379987367","https://openalex.org/W4384926196","https://openalex.org/W4387262382","https://openalex.org/W4387490406","https://openalex.org/W4390604572","https://openalex.org/W4391252739","https://openalex.org/W4391467361","https://openalex.org/W4391653804","https://openalex.org/W4396589252","https://openalex.org/W4396941491","https://openalex.org/W4399331671","https://openalex.org/W4399767754","https://openalex.org/W4403735060","https://openalex.org/W7118013607"],"related_works":[],"abstract_inverted_index":{"The":[0,92],"entire":[1],"system":[2,143],"collapses":[3],"due":[4],"to":[5,20,179],"the":[6,33,54,62,80,108,115,120,125,137,142,155,175],"issues":[7],"of":[8,23,82,94,119,140],"inadequate":[9],"centralized":[10],"storage":[11,16,41,110,121,147],"capacity,":[12],"poor":[13],"scalability,":[14],"low":[15],"efficiency,":[17],"and":[18,42,59,96,113,117,146,168],"susceptibility":[19],"single":[21],"point":[22],"failure":[24],"brought":[25],"on":[26,124],"by":[27,136],"huge":[28],"power":[29,64],"consumption":[30],"data":[31,49,65,83,98],"in":[32],"smart":[34,47],"grid;":[35],"thus,":[36],"an":[37],"alliance":[38,57],"chain-driven":[39],"multi-cloud":[40,60,75],"verifiable":[43],"deletion":[44,104,111],"method":[45],"for":[46],"grid":[48],"is":[50,70,99],"proposed.":[51],"By":[52],"leveraging":[53],"synergy":[55],"between":[56],"blockchain":[58],"architecture,":[61],"encrypted":[63],"originating":[66],"from":[67,86],"edge":[68],"nodes":[69],"dispersed":[71],"across":[72],"a":[73,102],"decentralized":[74],"infrastructure,":[76],"which":[77],"effectively":[78],"mitigates":[79],"danger":[81],"loss":[84],"resulting":[85],"single-point":[87],"failures":[88],"or":[89],"malicious":[90],"intrusions.":[91],"removal":[93],"expired":[95],"user-defined":[97],"guaranteed":[100],"through":[101],"transaction":[103],"algorithm":[105],"integrated":[106],"into":[107],"indexed":[109],"chain":[112],"strengthens":[114],"flexibility":[116],"security":[118],"architecture.":[122],"Based":[123],"Practical":[126],"Byzantine":[127],"Fault-Tolerant":[128],"Consensus":[129],"Protocol":[130],"with":[131],"Ultra-Low":[132],"Storage":[133],"Overhead":[134],"(ULS-PBFT),":[135],"hierarchical":[138],"grouping":[139],"nodes,":[141],"communication":[144],"overhead":[145,148],"are":[149],"reduced.":[150],"Security":[151],"analysis":[152],"proves":[153],"that":[154,174],"scheme":[156,176],"can":[157],"resist":[158],"tampering":[159],"attacks,":[160,162,164,167],"impersonation":[161],"collusion":[163],"double":[165],"spend":[166],"replay":[169],"attacks.":[170],"Performance":[171],"evaluation":[172],"shows":[173],"improves":[177],"compared":[178],"similar":[180],"methods.":[181]},"counts_by_year":[],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2026-01-21T00:00:00"}
