{"id":"https://openalex.org/W4312436023","doi":"https://doi.org/10.1109/tdsc.2022.3228699","title":"Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage","display_name":"Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage","publication_year":2022,"publication_date":"2022-12-19","ids":{"openalex":"https://openalex.org/W4312436023","doi":"https://doi.org/10.1109/tdsc.2022.3228699"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3228699","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09992132.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09992132.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060940932","display_name":"Wenting Shen","orcid":"https://orcid.org/0000-0003-1467-9619"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenting Shen","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China","Shandong Key Laboratory of Computer Networks, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Key Laboratory of Computer Networks, Jinan, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021485075","display_name":"Ming Yang","orcid":"https://orcid.org/0000-0002-8662-2438"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Yang","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Shandong Computer Science Center, Shandong Key Laboratory of Computer Networks, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Computer Science Center, Shandong Key Laboratory of Computer Networks, Jinan, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["Chair Professor and Research Director of Cyber Security Lab, School of Engineering and IT, University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"Chair Professor and Research Director of Cyber Security Lab, School of Engineering and IT, University of New South Wales at the Australian Defence Force Academy (UNSW@ADFA), Canberra, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.138,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":25,"citation_normalized_percentile":{"value":0.842952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"20","issue":"6","first_page":"4593","last_page":"4606"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9931,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain and Internet of Things Integration","score":0.976,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.69724447},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.67339534},{"id":"https://openalex.org/keywords/remote-data-checking","display_name":"Remote Data Checking","score":0.533911},{"id":"https://openalex.org/keywords/auditing","display_name":"Auditing","score":0.531169},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.528937},{"id":"https://openalex.org/keywords/identity-based-encryption","display_name":"Identity-Based Encryption","score":0.513638},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.51088}],"concepts":[{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.69724447},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.67339534},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65629286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5713079},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5602181},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5380063},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.45063725},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21286473},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14840358},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09871781},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3228699","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09992132.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3228699","pdf_url":"https://ieeexplore.ieee.org/ielx7/8858/4358699/09992132.pdf","source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62172245"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62102211"},{"funder":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences","award_id":"2022-MS-01"}],"datasets":[],"versions":[],"referenced_works_count":51,"referenced_works":["https://openalex.org/W1665450113","https://openalex.org/W1994788755","https://openalex.org/W2013940778","https://openalex.org/W2014143000","https://openalex.org/W2014239329","https://openalex.org/W2034944725","https://openalex.org/W2040193872","https://openalex.org/W2071004103","https://openalex.org/W2078656587","https://openalex.org/W2079493184","https://openalex.org/W2083257807","https://openalex.org/W2086042811","https://openalex.org/W2102881299","https://openalex.org/W2125858711","https://openalex.org/W2154205416","https://openalex.org/W2261354470","https://openalex.org/W2296554137","https://openalex.org/W2310212673","https://openalex.org/W2323162780","https://openalex.org/W2343351721","https://openalex.org/W2467335260","https://openalex.org/W2494776032","https://openalex.org/W2522089301","https://openalex.org/W2528685303","https://openalex.org/W2557530247","https://openalex.org/W2562735951","https://openalex.org/W2606779297","https://openalex.org/W2611557754","https://openalex.org/W2616646314","https://openalex.org/W2801274750","https://openalex.org/W2808671191","https://openalex.org/W2809795430","https://openalex.org/W2811082328","https://openalex.org/W2890178353","https://openalex.org/W2908628136","https://openalex.org/W2930871722","https://openalex.org/W2945520341","https://openalex.org/W2960809202","https://openalex.org/W2973440858","https://openalex.org/W2976339827","https://openalex.org/W3002342065","https://openalex.org/W3004382527","https://openalex.org/W3013499566","https://openalex.org/W3032772469","https://openalex.org/W3039255322","https://openalex.org/W3047335002","https://openalex.org/W3049284124","https://openalex.org/W3085589753","https://openalex.org/W3213901238","https://openalex.org/W4243292269","https://openalex.org/W89553247"],"related_works":["https://openalex.org/W4311223005","https://openalex.org/W3093925660","https://openalex.org/W2736386444","https://openalex.org/W2625231702","https://openalex.org/W2605525988","https://openalex.org/W2602423869","https://openalex.org/W2599115144","https://openalex.org/W2370840345","https://openalex.org/W2187109955","https://openalex.org/W1852630156"],"abstract_inverted_index":{"The":[0,96,152],"key":[1,18,66,102,107,137],"exposure":[2],"is":[3,21,60,70,90],"a":[4,44,64],"serious":[5],"threat":[6],"for":[7,19,56,92],"the":[8,15,25,85,105,114,118,121,131,134,140,156,161],"security":[9,153,166],"of":[10,24,136],"data":[11,27,49,79],"integrity":[12,28,50,80],"auditing.":[13,81],"Once":[14],"user's":[16],"private":[17,101,106],"auditing":[20,29,51],"exposed,":[22],"most":[23],"existing":[26],"schemes":[30],"would":[31],"inevitably":[32],"become":[33],"unable":[34],"to":[35],"work.":[36],"To":[37],"deal":[38],"with":[39,53,73],"this":[40],"problem,":[41],"we":[42],"construct":[43],"novel":[45,65],"and":[46,113,133,155,167],"efficient":[47],"identity-based":[48,78,145],"scheme":[52,123,142,163],"key-exposure":[54],"resilience":[55],"cloud":[57],"storage.":[58],"This":[59],"achieved":[61],"by":[62],"designing":[63],"update":[67,94,99,115],"technique,":[68],"which":[69,128,147],"fully":[71],"compatible":[72],"BLS":[74],"signature":[75],"used":[76],"in":[77,108],"In":[82],"our":[83],"design,":[84],"Third":[86],"Party":[87],"Auditor":[88],"(TPA)":[89],"responsible":[91],"generating":[93],"information.":[95],"user":[97],"can":[98],"his":[100],"based":[103],"on":[104,144],"one":[109],"previous":[110],"time":[111],"period":[112],"information":[116],"from":[117],"TPA.":[119],"Furthermore,":[120],"proposed":[122,141,162],"supports":[124],"real":[125],"lazy":[126],"update,":[127],"greatly":[129],"improves":[130],"efficiency":[132],"feasibility":[135],"update.":[138],"Meanwhile,":[139],"relies":[143],"cryptography,":[146],"makes":[148],"certificate":[149],"management":[150],"easy.":[151],"proof":[154],"performance":[157],"analysis":[158],"demonstrate":[159],"that":[160],"achieves":[164],"desirable":[165],"efficiency.":[168]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4312436023","counts_by_year":[{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":10}],"updated_date":"2024-11-19T22:16:07.822575","created_date":"2023-01-04"}