{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T18:08:06Z","timestamp":1762193286243,"version":"build-2065373602"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T00:00:00Z","timestamp":1758240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T00:00:00Z","timestamp":1758240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05565-w","type":"journal-article","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T20:08:09Z","timestamp":1758312489000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The hybrid-encryption-based data sharing scheme with keyword-based auditing function in cloud storage setting"],"prefix":"10.1007","volume":"28","author":[{"given":"Luyao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jinyong","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yuhang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yurong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,19]]},"reference":[{"issue":"1","key":"5565_CR1","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.dcan.2023.01.014","volume":"10","author":"S Guan","year":"2024","unstructured":"Guan, S., Zhang, C., Wang, Y., et al.: Hadoop-Based Secure Storage Solution for Big Data in Cloud Computing Environment. Digit. Commun. Netw. 10(1), 227\u2013236 (2024)","journal-title":"Digit. Commun. Netw."},{"issue":"1","key":"5565_CR2","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TCC.2019.2929045","volume":"10","author":"J Li","year":"2022","unstructured":"Li, J., Yan, H., Zhang, Y.: Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage. IEEE Trans. Cloud Computing 10(1), 356\u2013365 (2022)","journal-title":"IEEE Trans. Cloud Computing"},{"key":"5565_CR3","doi-asserted-by":"publisher","first-page":"10180","DOI":"10.1109\/ACCESS.2023.3240000","volume":"11","author":"A Chiquito","year":"2023","unstructured":"Chiquito, A., Bodin, U., Schel\u00e9n, O.: Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts. IEEE Access 11, 10180\u201310195 (2023)","journal-title":"IEEE Access"},{"issue":"3","key":"5565_CR4","doi-asserted-by":"publisher","first-page":"4804","DOI":"10.1109\/JSYST.2022.3169601","volume":"16","author":"C Zhao","year":"2022","unstructured":"Zhao, C., Xu, L., Li, J., et al.: Toward Secure and Privacy-Preserving Cloud Data Sharing: Online\/Offline Multiauthority CP-ABE With Hidden Policy. IEEE Syst. J. 16(3), 4804\u20134815 (2022)","journal-title":"IEEE Syst. J."},{"issue":"8","key":"5565_CR5","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TC.2023.3248278","volume":"72","author":"Q Zhang","year":"2023","unstructured":"Zhang, Q., Sui, D., Cui, J., et al.: Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage. IEEE Trans. Comput. 72(8), 2365\u20132376 (2023)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"5565_CR6","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2022.3220980","volume":"10","author":"J Feng","year":"2023","unstructured":"Feng, J., Xiong, H., Chen, J., et al.: Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT. IEEE Internet Things J. 10(6), 4815\u20134829 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"5565_CR7","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1109\/TDSC.2022.3228699","volume":"20","author":"W Shen","year":"2023","unstructured":"Shen, W., Yu, J., Yang, M., et al.: Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. IEEE Trans. Dependable Secure Comput. 20(6), 4593\u20134606 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"5565_CR8","doi-asserted-by":"publisher","first-page":"3774","DOI":"10.1109\/TDSC.2021.3106780","volume":"19","author":"X Gao","year":"2022","unstructured":"Gao, X., Yu, J., Chang, Y., et al.: Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. IEEE Trans. Dependable Secure Comput. 19(6), 3774\u20133789 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5565_CR9","doi-asserted-by":"crossref","unstructured":"Shamir, A.: \u201cIdentity-Based Cryptosystems and Signature Schemes,\u201d Advances in Cryptology: Proceedings of CRYPTO 84 4., vol. 196. Heidelberg, Germany: Springer, pp. 47-53, (1985)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"5565_CR10","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in Cloud Computing: Opportunities and Challenges. Inf. Sci. 305, 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"key":"5565_CR11","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., et al.: \u201cAttribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,\u201d Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). New York, NY, USA, pp. 89-98 (2006)","DOI":"10.1145\/1180405.1180418"},{"issue":"9","key":"5565_CR12","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang, K., Susilo, W.: Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 10(9), 1981\u20131992 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"5565_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MWC.001.1900433","volume":"27","author":"D Zheng","year":"2020","unstructured":"Zheng, D., Qin, B., Li, Y., et al.: Cloud-Assisted Attribute-Based Data Sharing With Efficient User Revocation in the Internet of Things. IEEE Wirel. Commun. 27(3), 18\u201323 (2020)","journal-title":"IEEE Wirel. Commun."},{"key":"5565_CR14","doi-asserted-by":"publisher","first-page":"85190","DOI":"10.1109\/ACCESS.2020.2992203","volume":"8","author":"H Li","year":"2020","unstructured":"Li, H., Pei, L., Liao, D., et al.: FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain. IEEE Access 8, 85190\u201385203 (2020)","journal-title":"IEEE Access"},{"issue":"8","key":"5565_CR15","doi-asserted-by":"publisher","first-page":"7011","DOI":"10.1109\/JIOT.2022.3228550","volume":"10","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Wang, G., Li, Y., et al.: Accountable Attribute-Based Data-Sharing Scheme Based on Blockchain for Vehicular Ad Hoc Network. IEEE Internet Things J. 10(8), 7011\u20137026 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"5565_CR16","doi-asserted-by":"publisher","first-page":"10977","DOI":"10.1109\/TII.2023.3242815","volume":"19","author":"H Xiong","year":"2023","unstructured":"Xiong, H., Wang, H., Meng, W., et al.: Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System. IEEE Trans. Industr. Inf. 19(11), 10977\u201310986 (2023)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"5565_CR17","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., et al.: \u201cProvable Data Possession at Untrusted Stores,\u201d Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). New York, NY, USA, pp. 598-609, (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"5565_CR18","doi-asserted-by":"crossref","unstructured":"Juels, A., Jr, B.: \u201cPors: Proofs of Retrievability for Large Files,\u201d Proceedings of the 14th ACM conference on Computer and communications security (CCS). New York, NY, USA, pp. 584-597 (2007)","DOI":"10.1145\/1315245.1315317"},{"issue":"2","key":"5565_CR19","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.M., Wang, Q., et al.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"5565_CR20","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","volume":"8","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., et al.: Identity-Based Remote Data Possession Checking in Public Clouds. IET Inf. Secur. 8(2), 114\u2013121 (2014)","journal-title":"IET Inf. Secur."},{"issue":"22","key":"5565_CR21","doi-asserted-by":"publisher","first-page":"20065","DOI":"10.1109\/JIOT.2023.3282939","volume":"10","author":"C Gai","year":"2023","unstructured":"Gai, C., Shen, W., Yang, M., et al.: PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data. IEEE Internet Things J. 10(22), 20065\u201320079 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5565_CR22","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/TIFS.2020.3032283","volume":"16","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Lu, R., Wang, B., et al.: Comments on \u201cPrivacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage\u2019\u2019. IEEE Trans. Inf. Forensics Secur. 16, 1288\u20131289 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5565_CR23","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.future.2020.01.029","volume":"106","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wang, B., Wang, X.A., et al.: New group user based privacy preserving cloud auditing protocol. Futur. Gener. Comput. Syst. 106, 585\u2013594 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"5565_CR24","first-page":"2556","volume":"24","author":"X Li","year":"2023","unstructured":"Li, X., Shang, S., Liu, S., et al.: An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2), 2556\u20132567 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"18","key":"5565_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5600","volume":"32","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wang, B., Ogiela, M.R., et al.: \u201cNew public auditing protocol based on homomorphic tags for secure cloud storage\u2019\u2019. Concurrency and Computation: Practice and Experience 32(18), e5600 (2020)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"5565_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102287","volume":"57","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Li, Z., Wang, B., et al.: Enhanced certificateless auditing protocols for cloud data management and transformative computation. Inf. Process. Manage. 57, 102287 (2020)","journal-title":"Inf. Process. Manage."},{"key":"5565_CR27","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.ins.2020.06.043","volume":"542","author":"Y Su","year":"2021","unstructured":"Su, Y., Li, Y., Zhang, K., et al.: A Privacy-Preserving Public Integrity Check Scheme for Outsourced EHRs. Inf. Sci. 542, 112\u2013130 (2021)","journal-title":"Inf. Sci."},{"key":"5565_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102856","volume":"138","author":"J Xue","year":"2023","unstructured":"Xue, J., Luo, S., Deng, Q., et al.: Ka: Keyword-Based Auditing With Frequency Hiding and Retrieval Reliability for Smart Government. J. Syst. Architect. 138, 102856 (2023)","journal-title":"J. Syst. Architect."},{"key":"5565_CR29","unstructured":"Shen, W., Gai, C., Yu, J., et al.: \u201cKeyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics,\u201d IEEE Transactions on Services Computing, pp. 1-14, (2023)"},{"issue":"6","key":"5565_CR30","doi-asserted-by":"publisher","first-page":"4220","DOI":"10.1109\/TSC.2023.3315972","volume":"16","author":"X Wang","year":"2023","unstructured":"Wang, X., Zhang, X., Zhang, X., et al.: Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems. IEEE Trans. Serv. Comput. 16(6), 4220\u20134232 (2023)","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05565-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05565-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05565-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T17:56:20Z","timestamp":1762192580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05565-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,19]]},"references-count":30,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5565"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05565-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,19]]},"assertion":[{"value":"18 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"835"}}