{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:20:55Z","timestamp":1725693655954},"reference-count":22,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2016YFB0800402","2016QY01W0202"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836204","U1936108","61572221","61433006","U1401258","61502185"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Projects of the National Social Science Foundation","award":["16ZDA092"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Parallel and Distributed Computing"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1016\/j.jpdc.2020.06.007","type":"journal-article","created":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T01:57:00Z","timestamp":1592791020000},"page":"1-14","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":42,"special_numbering":"C","title":["Blockchain-based verification framework for data integrity in edge-cloud storage"],"prefix":"10.1016","volume":"146","author":[{"given":"Dongdong","family":"Yue","sequence":"first","affiliation":[]},{"given":"Ruixuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenlong","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jpdc.2020.06.007_b1","first-page":"485","article-title":"Data security, privacy, availability and integrity in cloud computing: issues and current solutions","volume":"7","author":"Aldossary","year":"2016","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"10.1016\/j.jpdc.2020.06.007_b2","series-title":"ACM Conference on Computer and Communications Security (CCS 2007)","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"Ateniese","year":"2007"},{"key":"10.1016\/j.jpdc.2020.06.007_b3","series-title":"The 4th International Conference on Security and Privacy in Communication Netowrks (SecureComm 2008)","first-page":"1","article-title":"Scalable and efficient provable data possession","author":"Ateniese","year":"2008"},{"key":"10.1016\/j.jpdc.2020.06.007_b4","series-title":"IPFS - content addressed, versioned, P2P file system","author":"Benet","year":"2014"},{"key":"10.1016\/j.jpdc.2020.06.007_b5","series-title":"The 19th ACM Conference on Computer and Communications Security (CCS 2012)","first-page":"1043","article-title":"Robust dynamic remote data checking for public clouds","author":"Chen","year":"2012"},{"key":"10.1016\/j.jpdc.2020.06.007_b6","series-title":"The 28th International Conference on Distributed Computing Systems (ICDCS2008)","first-page":"411","article-title":"Mr-pdp: Multiple-replica provable data possession","author":"Curtmola","year":"2008"},{"key":"10.1016\/j.jpdc.2020.06.007_b7","series-title":"Integrity and Internal Control in Information Systems VI","first-page":"1","article-title":"Remote integrity checking","author":"Deswarte","year":"2004"},{"key":"10.1016\/j.jpdc.2020.06.007_b8","series-title":"The First Italian Conference on Cybersecurity (ITASEC 2017)","first-page":"146","article-title":"Blockchain-based database to ensure data integrity in cloud computing environments","author":"Gaetani","year":"2017"},{"issue":"22","key":"10.1016\/j.jpdc.2020.06.007_b9","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.4359","article-title":"Seshare: Secure cloud data sharing based on blockchain and public auditing","volume":"31","author":"Huang","year":"2019","journal-title":"Concurr. Comput.: Pract. Exper."},{"key":"10.1016\/j.jpdc.2020.06.007_b10","series-title":"The 14th ACM Conference on Computer and Communications Security (CCS 2007)","first-page":"584","article-title":"Pors: Proofs of retrievability for large files","author":"Juels","year":"2007"},{"key":"10.1016\/j.jpdc.2020.06.007_b11","series-title":"The 24th IEEE International Conference on Web Services (ICWS 2017)","first-page":"468","article-title":"Blockchain based data integrity service framework for iot data","author":"Liu","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.007_b12","series-title":"The 1st IEEE International Conference on Fog and Edge Computing (ICFEC2017) Madrid, Spain, May 14-15","first-page":"21","article-title":"Efficient edge storage management based on near real-time forecasts","author":"Lujic","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.007_b13","series-title":"Harvard Business Review","article-title":"The truth about blockchain","author":"Marco","year":"2017"},{"key":"10.1016\/j.jpdc.2020.06.007_b14","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.jpdc.2019.10.007","article-title":"Blockchain for secure location verification","volume":"136","author":"Nosouhi","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"issue":"1","key":"10.1016\/j.jpdc.2020.06.007_b15","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1109\/JIOT.2017.2767608","article-title":"Future edge cloud and edge computing for internet of things applications","volume":"5","author":"Pan","year":"2018","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.jpdc.2020.06.007_b16","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","article-title":"Efficient remote data possession checking in critical information infrastructures","volume":"20","author":"Seb\u00e9","year":"2008","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"10.1016\/j.jpdc.2020.06.007_b17","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","article-title":"Compact proofs of retrievability","volume":"26","author":"Shacham","year":"2013","journal-title":"J. Cryptol."},{"key":"10.1016\/j.jpdc.2020.06.007_b18","doi-asserted-by":"crossref","first-page":"4621","DOI":"10.1109\/ACCESS.2017.2682640","article-title":"Live data analytics with collaborative edge and cloud processing in wireless iot networks","volume":"5","author":"Sharma","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.jpdc.2020.06.007_b19","series-title":"Sia: simple decentralized storage","author":"Vorick","year":"2014"},{"key":"10.1016\/j.jpdc.2020.06.007_b20","series-title":"The 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France. Proceedings","first-page":"355","article-title":"Enabling public verifiability and data dynamics for storage security in cloud computing","author":"Wang","year":"2009"},{"key":"10.1016\/j.jpdc.2020.06.007_b21","unstructured":"C. Wang, Q. Wang, K. Ren, W. Lou, Ensuring data storage security in Cloud Computing, in: The 17th International Workshop on Quality of Service (IWQoS 2009), Charleston, South Carolina, USA, 2009, pp. 1\u20139."},{"key":"10.1016\/j.jpdc.2020.06.007_b22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.sysarc.2017.11.002","article-title":"A distributed multi-level model with dynamic replacement for the storage of smart edge computing","volume":"83","author":"Xing","year":"2018","journal-title":"J. Syst. Archit. - Embedded Syst. Des."}],"container-title":["Journal of Parallel and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731520303142?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731520303142?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T11:24:49Z","timestamp":1601465089000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0743731520303142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":22,"alternative-id":["S0743731520303142"],"URL":"https:\/\/doi.org\/10.1016\/j.jpdc.2020.06.007","relation":{},"ISSN":["0743-7315"],"issn-type":[{"value":"0743-7315","type":"print"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Blockchain-based verification framework for data integrity in edge-cloud storage","name":"articletitle","label":"Article Title"},{"value":"Journal of Parallel and Distributed Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jpdc.2020.06.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}