{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T02:40:11Z","timestamp":1758854411015,"version":"3.44.0"},"reference-count":40,"publisher":"Wiley","issue":"23-24","license":[{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2025,10,25]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>With the widespread application of cloud computing, large\u2010scale datasets in fields such as deep learning are increasingly stored in the cloud. Advanced techniques for data integrity verification are necessitated due to the frequent incremental updates of these datasets. In practice, existing Merkle tree\u2010based schemes face challenges, including high computational costs, low real\u2010time performance, and inefficient handling of incremental updates. To address these issues, a novel data structure named dynamic Merkle tree ladder (DMTL) was proposed in this paper, which enhanced Merkle trees by establishing ladder rungs for each dataset and incorporating a flexible dataset partition strategy. Based on the DMTL, we designed an integrity verification scheme that supported adaptive incremental updates of cloud datasets. Experimental results demonstrated that our scheme had outperformed mainstream schemes in dynamic operation efficiency, especially under workloads with intensive data insertions. Security analysis further showed that our scheme could defend against malicious behaviors effectively.<\/jats:p>","DOI":"10.1002\/cpe.70264","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:54:44Z","timestamp":1756947284000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["<scp>DMTL<\/scp>: An Adaptive Integrity Verification Scheme for Dynamic Cloud Datasets"],"prefix":"10.1002","volume":"37","author":[{"given":"Xinfeng","family":"He","sequence":"first","affiliation":[{"name":"School of Cyber Security and Computer Hebei University  Baoding People's Republic of China"},{"name":"Key Lab on High Trusted Information System of Hebei Province  Baoding People's Republic of China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0755-1735","authenticated-orcid":false,"given":"Qing","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Security and Computer Hebei University  Baoding People's Republic of China"},{"name":"Key Lab on High Trusted Information System of Hebei Province  Baoding People's Republic of China"}]}],"member":"311","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109270"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103181"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3216614"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104250"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103404"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.019"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3051622"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3211642"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110040"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415562"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.109013"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3424878"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.07.006"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102217"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3162397"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.191"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.014"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2986879"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03248-w"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102677"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3207384"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030717"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104096"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.103981"},{"key":"e_1_2_9_28_1","doi-asserted-by":"crossref","unstructured":"G.Ateniese R.Burns R.Curtmola et al. \u201cProvable Data Possession at Untrusted Stores \u201d2007Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM; 598\u2013609.","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1489"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110360"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8285"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3237221"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.51"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699909"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2784423"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705620"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107890"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622517"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30872-7_16"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.70264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T02:24:49Z","timestamp":1758853489000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.70264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":40,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2025,10,25]]}},"alternative-id":["10.1002\/cpe.70264"],"URL":"https:\/\/doi.org\/10.1002\/cpe.70264","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-05-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70264"}}