{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T03:34:28Z","timestamp":1773804868365,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62462014"],"award-info":[{"award-number":["62462014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guizhou Province Hundred-level Innovative Talent Project","award":["GCC[2022]018-1"],"award-info":[{"award-number":["GCC[2022]018-1"]}]},{"name":"Natural Science Research Project of the Guizhou Provincial Department of Education","award":["[2023]010"],"award-info":[{"award-number":["[2023]010"]}]},{"name":"Guizhou Provincial Science and Technology Plan Project","award":["ZK[2024]Key058"],"award-info":[{"award-number":["ZK[2024]Key058"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s00607-026-01639-8","type":"journal-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:47:36Z","timestamp":1773802056000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Certificateless integrity auditing scheme with different audit frequencies for different value files"],"prefix":"10.1007","volume":"108","author":[{"given":"Jian","family":"Wen","sequence":"first","affiliation":[]},{"given":"Lunzhi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yaying","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Na","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanli","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,18]]},"reference":[{"issue":"4","key":"1639_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"issue":"10","key":"1639_CR2","first-page":"2554","volume":"33","author":"W Xia","year":"2022","unstructured":"Xia W, Wei C, Li Z, Wang X, Zou X (2022) Netsync: a network adaptive and deduplication-inspired delta synchronization approach for cloud storage services. IEEE Trans Parallel Distrib Syst 33(10):2554\u20132570","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1639_CR3","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: 2009 17th Int. Workshop Qual. Serv., pp. 1\u20139 . IEEE","DOI":"10.1109\/IWQoS.2009.5201385"},{"key":"1639_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.cose.2016.10.006","volume":"65","author":"F Zafar","year":"2017","unstructured":"Zafar F, Khan A, Malik SUR, Ahmed M, Anjum A, Khan MI, Javed N, Alam M, Jamil F (2017) A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput Secur 65:29\u201349","journal-title":"Comput Secur"},{"key":"1639_CR5","doi-asserted-by":"publisher","first-page":"206396","DOI":"10.1109\/ACCESS.2020.3037696","volume":"8","author":"L Deng","year":"2020","unstructured":"Deng L, Yang B, Wang X (2020) A lightweight identity-based remote data auditing scheme for cloud storage. IEEE Access 8:206396\u2013206405","journal-title":"IEEE Access"},{"key":"1639_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103267","volume":"156","author":"J Wen","year":"2024","unstructured":"Wen J, Deng L (2024) Certificateless integrity auditing scheme for sensitive information protection in cloud storage. J Syst Archit 156:103267","journal-title":"J Syst Archit"},{"key":"1639_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.ins.2020.06.043","volume":"542","author":"Y Su","year":"2021","unstructured":"Su Y, Li Y, Zhang K, Yang B (2021) A privacy-preserving public integrity check scheme for outsourced ehrs. Inf Sci 542:112\u2013130","journal-title":"Inf Sci"},{"key":"1639_CR8","doi-asserted-by":"crossref","unstructured":"Deng L, Chen Z, Ruan Y, Zhou H, Li S (2023) Certificateless provable data possession scheme suitable for smart grid management systems. IEEE Syst J","DOI":"10.1109\/JSYST.2023.3284230"},{"key":"1639_CR9","unstructured":"Statista: Volume of data\/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025 (2022). https:\/\/www.statista.com\/statistics\/871513\/worldwide-data-created\/"},{"issue":"2","key":"1639_CR10","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2011","unstructured":"Wang C, Chow SS, Wang Q, Ren K, Lou W (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362\u2013375","journal-title":"IEEE Trans Comput"},{"issue":"5","key":"1639_CR11","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1016\/j.compeleceng.2013.10.004","volume":"40","author":"SG Worku","year":"2014","unstructured":"Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40(5):1703\u20131713","journal-title":"Comput Electr Eng"},{"key":"1639_CR12","doi-asserted-by":"crossref","unstructured":"Deng L, Feng S, Wang T, Hu Z, Li S (2023) Identity-based data auditing scheme with provable security in the standard model suitable for cloud storage. IEEE Trans Dependable Secur Comput","DOI":"10.1109\/TSC.2023.3303185"},{"key":"1639_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103181","volume":"128","author":"Y Huang","year":"2023","unstructured":"Huang Y, Shen W, Qin J, Hou H (2023) Privacy-preserving certificateless public auditing supporting different auditing frequencies. Comput Secur 128:103181","journal-title":"Comput Secur"},{"key":"1639_CR14","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proc ACM Conf Comput Commun Secur, pp. 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"1639_CR15","doi-asserted-by":"crossref","unstructured":"Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proc 4th Int Conf Secur Priv Commun Netw, pp. 1\u201310","DOI":"10.1145\/1460877.1460889"},{"issue":"4","key":"1639_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway CC, K\u00fcp\u00e7\u00fc A, Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur 17(4):1\u201329","journal-title":"ACM Trans Inf Syst Secur"},{"key":"1639_CR17","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proc. IEEE INFOCOM, pp. 1\u20139. IEEE","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"5","key":"1639_CR18","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2010","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2010) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"1639_CR19","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/TIFS.2015.2416688","volume":"10","author":"J Liu","year":"2015","unstructured":"Liu J, Huang K, Rong H, Wang H, Xian M (2015) Privacy-preserving public auditing for regenerating-code-based cloud storage. IEEE Trans Inf Forensic Secur 10(7):1513\u20131528","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1639_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102953","volume":"142","author":"M Wang","year":"2023","unstructured":"Wang M, Xu L, Hao R, Yang M (2023) Secure auditing and deduplication with efficient ownership management for cloud storage. J Syst Archit 142:102953. https:\/\/doi.org\/10.1016\/j.sysarc.2023.102953","journal-title":"J Syst Archit"},{"key":"1639_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103932","volume":"144","author":"J Yu","year":"2024","unstructured":"Yu J, Shen W, Zhang X (2024) Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based emr. Comput Secur 144:103932","journal-title":"Comput Secur"},{"key":"1639_CR22","doi-asserted-by":"publisher","unstructured":"Peng X, Shen W, Yang Y, Zhang X (2025) Secure deduplication and cloud storage auditing with efficient dynamic ownership management and data dynamics. IEEE Trans Netw Serv Manag: 1\u20131. https:\/\/doi.org\/10.1109\/TNSM.2025.3569833","DOI":"10.1109\/TNSM.2025.3569833"},{"issue":"2","key":"1639_CR23","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang H, Wu Q, Qin B, Domingo-Ferrer J (2014) Identity-based remote data possession checking in public clouds. IET Inf Secur 8(2):114\u2013121","journal-title":"IET Inf Secur"},{"issue":"4","key":"1639_CR24","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767\u2013778","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1639_CR25","doi-asserted-by":"publisher","first-page":"4238","DOI":"10.1109\/TII.2020.2991204","volume":"17","author":"W Zheng","year":"2020","unstructured":"Zheng W, Lai C-F, He D, Kumar N, Chen B (2020) Secure storage auditing with efficient key updates for cognitive industrial iot environment. IEEE Trans Ind Inform 17(6):4238\u20134247","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"1639_CR26","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/JSYST.2020.2978146","volume":"15","author":"J Li","year":"2020","unstructured":"Li J, Yan H, Zhang Y (2020) Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst J 15(1):577\u2013585","journal-title":"IEEE Syst J"},{"issue":"1","key":"1639_CR27","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10586-024-04800-0","volume":"28","author":"S Feng","year":"2025","unstructured":"Feng S, Deng L, Gao Y, Wu Y, Wen J (2025) Blockchain-based remote data integrity auditing scheme with deduplication mechanism. Clust Comput 28(1):33","journal-title":"Clust Comput"},{"key":"1639_CR28","doi-asserted-by":"publisher","first-page":"45822","DOI":"10.1109\/ACCESS.2021.3066497","volume":"9","author":"H Yan","year":"2021","unstructured":"Yan H, Gui W (2021) Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving. IEEE Access 9:45822\u201345831","journal-title":"IEEE Access"},{"key":"1639_CR29","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Int Conf Theory and Appl Cryptol Inform Secur, pp. 452\u2013473 . Springer","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"4","key":"1639_CR30","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TCSS.2016.2517205","volume":"2","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) Sclpv: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Soc Syst 2(4):159\u2013170","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"1","key":"1639_CR31","first-page":"71","volume":"14","author":"J Li","year":"2018","unstructured":"Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput 14(1):71\u201381","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"1639_CR32","first-page":"1118","volume":"19","author":"L Zhou","year":"2020","unstructured":"Zhou L, Fu A, Yang G, Wang H, Zhang Y (2020) Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans Dependable Secur Comput 19(2):1118\u20131132","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"4","key":"1639_CR33","doi-asserted-by":"publisher","first-page":"5333","DOI":"10.1109\/TNSM.2022.3189650","volume":"19","author":"X Zhang","year":"2022","unstructured":"Zhang X, Wang X, Gu D, Xue J, Tang W (2022) Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems. IEEE Trans Netw Serv Manage 19(4):5333\u20135347","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"1639_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103738","volume":"139","author":"Y Huang","year":"2024","unstructured":"Huang Y, Shen W, Qin J (2024) Certificateless cloud storage auditing supporting data ownership transfer. Comput Secur 139:103738. https:\/\/doi.org\/10.1016\/j.cose.2024.103738","journal-title":"Comput Secur"},{"key":"1639_CR35","doi-asserted-by":"crossref","unstructured":"Zhang X, Liu Q, Liu B, Zhang Y, Xue J (2025) Dynamic certificateless outsourced data auditing mechanism supporting multi-ownership transfer via blockchain systems. IEEE Trans Netw Serv Manage","DOI":"10.1109\/TNSM.2025.3525462"},{"issue":"1","key":"1639_CR36","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10619-024-07446-4","volume":"43","author":"Y Miao","year":"2025","unstructured":"Miao Y, Miao Y, Miao X (2025) Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization. Distrib Parallel Dat 43(1):3","journal-title":"Distrib Parallel Dat"},{"key":"1639_CR37","doi-asserted-by":"crossref","unstructured":"Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Int Conf Theory and Appl Cryptol Inform Secur, pp. 514\u2013532 . Springer","DOI":"10.1007\/3-540-45682-1_30"},{"key":"1639_CR38","doi-asserted-by":"crossref","unstructured":"McCurley KS (1990) The discrete logarithm problem. In: Proc of Symp in Applied Math vol. 42, pp. 49\u201374","DOI":"10.1090\/psapm\/042\/1095551"},{"key":"1639_CR39","doi-asserted-by":"crossref","unstructured":"Bao F, Deng RH Zhu H (2003) Variations of diffie-hellman problem. In: International Conference on Information and Communications Security, pp. 301\u2013312","DOI":"10.1007\/978-3-540-39927-8_28"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-026-01639-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-026-01639-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-026-01639-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:47:42Z","timestamp":1773802062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-026-01639-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,18]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1639"],"URL":"https:\/\/doi.org\/10.1007\/s00607-026-01639-8","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,18]]},"assertion":[{"value":"17 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"52"}}