{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:26:10Z","timestamp":1772119570318,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. U21A20466"],"award-info":[{"award-number":["No. U21A20466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China,China","doi-asserted-by":"crossref","award":["61702153"],"award-info":[{"award-number":["61702153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China,China","doi-asserted-by":"crossref","award":["61972124"],"award-info":[{"award-number":["61972124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10586-023-04078-8","type":"journal-article","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T17:29:35Z","timestamp":1687541375000},"page":"2165-2179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A collusion-resistant certificateless provable data possession scheme for shared data with user revocation"],"prefix":"10.1007","volume":"27","author":[{"given":"Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lidong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jingguo","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Fuqun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"key":"4078_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598\u2013609. Association for Computing Machinery (2007)","DOI":"10.1145\/1315245.1315318"},{"issue":"5","key":"4078_CR2","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2010","unstructured":"Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"4078_CR3","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen, W., Qin, J., Yu, J., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331\u2013346 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4078_CR4","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: International Conference on Applied Cryptography and Network Security, pp. 507\u2013525. Springer (2012)","DOI":"10.1007\/978-3-642-31284-7_30"},{"issue":"1","key":"4078_CR5","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2013","unstructured":"Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92\u2013106 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"4078_CR6","first-page":"1394","volume":"18","author":"K He","year":"2019","unstructured":"He, K., Chen, J., Yuan, Q., et al.: Dynamic group-oriented provable data possession in the cloud. IEEE Trans. Dependable Secure Comput. 18(3), 1394\u20131408 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4078_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.ins.2018.09.009","volume":"472","author":"H Tian","year":"2019","unstructured":"Tian, H., Nan, F., Jiang, H., et al.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107\u2013125 (2019)","journal-title":"Inf. Sci."},{"key":"4078_CR8","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.cose.2017.12.004","volume":"73","author":"Y Luo","year":"2018","unstructured":"Luo, Y., Xu, M., Huang, K., et al.: Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73, 492\u2013506 (2018)","journal-title":"Comput. Secur."},{"issue":"3","key":"4078_CR9","first-page":"608","volume":"17","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Yu, J., Hao, R., et al.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608\u2013619 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4078_CR10","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452\u2013473. Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"1","key":"4078_CR11","first-page":"71","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Yan, H., Zhang, Y.: Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 14(1), 71\u201381 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4078_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3013927","author":"L Zhou","year":"2020","unstructured":"Zhou, L., Fu, A., Yang, G., et al.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secure Comput. (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.3013927","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4078_CR13","doi-asserted-by":"publisher","first-page":"102176","DOI":"10.1016\/j.cose.2020.102176","volume":"103","author":"JR Gudeme","year":"2021","unstructured":"Gudeme, J.R., Pasupuleti, S.K., Kandukuri, R.: Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage. Comput. Secur. 103, 102176 (2021)","journal-title":"Comput. Secur."},{"key":"4078_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3128775","author":"Z Xu","year":"2021","unstructured":"Xu, Z., He, D., Vijayakumar, P., et al.: Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs. IEEE J. Biomed. Health Inform. (2021). https:\/\/doi.org\/10.1109\/JBHI.2021.3128775","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"4078_CR15","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di\u00a0Pietro, R., Mancini, L.V., et al.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1\u201310. Association for Computing Machinery (2008)","DOI":"10.1145\/1460877.1460889"},{"issue":"4","key":"4078_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699909","volume":"17","author":"CC Erway","year":"2015","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., et al.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1\u201329 (2015)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"2","key":"4078_CR17","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2011","unstructured":"Zhu, Y., Ahn, G.J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227\u2013238 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"4078_CR18","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","volume":"10","author":"H Tian","year":"2015","unstructured":"Tian, H., Chen, Y., Chang, C., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701\u2013714 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4078_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Hu, H., Ahn, G.J., et al.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 191\u2013200. IEEE (2011)","DOI":"10.4108\/icst.collaboratecom.2011.247089"},{"issue":"2","key":"4078_CR20","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2011","unstructured":"Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2011)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"4078_CR21","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767\u2013778 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"4078_CR22","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/JSYST.2020.2978146","volume":"15","author":"J Li","year":"2020","unstructured":"Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15(1), 577\u2013585 (2020)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"4078_CR23","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10586-021-03408-y","volume":"25","author":"Y Ji","year":"2022","unstructured":"Ji, Y., Shao, B., Chang, J., et al.: Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. Clust. Comput. 25(1), 337\u2013349 (2022)","journal-title":"Clust. Comput."},{"key":"4078_CR24","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6639634","author":"H Yan","year":"2021","unstructured":"Yan, H., Liu, Y., Zhang, Z., et al.: Efficient privacy-preserving certificateless public auditing of data in cloud storage. Secur. Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/6639634","journal-title":"Secur. Commun. Netw."},{"key":"4078_CR25","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2016.09.003","volume":"78","author":"Y Li","year":"2018","unstructured":"Li, Y., Yu, Y., Yang, B., et al.: Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78, 789\u2013798 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"4078_CR26","doi-asserted-by":"publisher","first-page":"101847","DOI":"10.1016\/j.cose.2020.101847","volume":"95","author":"J Tian","year":"2020","unstructured":"Tian, J., Jing, X.: Cloud data integrity verification scheme for associated tags. Comput. Secur. 95, 101847 (2020)","journal-title":"Comput. Secur."},{"issue":"1","key":"4078_CR27","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"B Wang","year":"2014","unstructured":"Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43\u201356 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"6","key":"4078_CR28","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TPDS.2012.331","volume":"24","author":"X Liu","year":"2012","unstructured":"Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182\u20131191 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"4078_CR29","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, B., Li, H., et al.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136\u2013144. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682701"},{"issue":"1","key":"4078_CR30","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/JSYST.2015.2428620","volume":"12","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12(1), 64\u201373 (2015)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"4078_CR31","doi-asserted-by":"publisher","first-page":"183","DOI":"10.32604\/csse.2023.031030","volume":"45","author":"Y Qi","year":"2023","unstructured":"Qi, Y., Luo, Y., Huang, Y., et al.: Blockchain-based privacy-preserving group data auditing with secure user revocation. Comput. Syst. Sci. Eng. 45(1), 183\u2013199 (2023)","journal-title":"Comput. Syst. Sci. Eng."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04078-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04078-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04078-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T13:34:21Z","timestamp":1712064861000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04078-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,23]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["4078"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04078-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1800460\/v1","asserted-by":"object"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,23]]},"assertion":[{"value":"27 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies involving human or animal subjects.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}