{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:48:31Z","timestamp":1771613311886,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T00:00:00Z","timestamp":1689984000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T00:00:00Z","timestamp":1689984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2020501013"],"award-info":[{"award-number":["F2020501013"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072092"],"award-info":[{"award-number":["62072092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072093"],"award-info":[{"award-number":["62072093"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1708262"],"award-info":[{"award-number":["U1708262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015286","name":"Hebei Provincial Key Research Projects","doi-asserted-by":"publisher","award":["2019M653568"],"award-info":[{"award-number":["2019M653568"]}],"id":[{"id":"10.13039\/501100015286","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015286","name":"Hebei Provincial Key Research Projects","doi-asserted-by":"publisher","award":["20310702D"],"award-info":[{"award-number":["20310702D"]}],"id":[{"id":"10.13039\/501100015286","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012476","name":"Fundamental Research Funds for Central Universities of the Central South University","doi-asserted-by":"publisher","award":["N2023020"],"award-info":[{"award-number":["N2023020"]}],"id":[{"id":"10.13039\/501100012476","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11036-023-02146-2","type":"journal-article","created":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T12:01:51Z","timestamp":1690027311000},"page":"1477-1488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SEA: Secure and Efficient Public Auditing for Edge-Assisted IoT Aggregated Data Sharing"],"prefix":"10.1007","volume":"29","author":[{"given":"Mingxi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ning","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yihong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Qingfeng","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2275-480X","authenticated-orcid":false,"given":"Wenbo","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,22]]},"reference":[{"issue":"9","key":"2146_CR1","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/TVT.2020.2971254","volume":"69","author":"Q Jiang","year":"2020","unstructured":"Jiang Q, Zhang N, Ni J, Ma J, Ma X (2020) Choo, K-KR: Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69(9):9390\u20139401. https:\/\/doi.org\/10.1109\/TVT.2020.2971254","journal-title":"IEEE Trans Veh Technol"},{"key":"2146_CR2","unstructured":"RACUNTEUR: A Day in Data, https:\/\/www.raconteur.net\/infographics\/a-day-in-data\/"},{"issue":"2","key":"2146_CR3","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1007\/s11276-019-02142-z","volume":"26","author":"S Abbasian Dehkordi","year":"2020","unstructured":"Abbasian Dehkordi S, Farajzadeh K, Rezazadeh J, Farahbakhsh R, Sandrasegaran K, Abbasian Dehkordi M (2020) A survey on data aggregation techniques in iot sensor networks. Wirel Netw 26(2):1243\u20131263. https:\/\/doi.org\/10.1007\/s11276-019-02142-z","journal-title":"Wirel Netw"},{"key":"2146_CR4","unstructured":"Malik, H, Fatema, N, Iqbal, A (2021) Intelligent data-analytics for condition monitoring: smart grid applications. Elsevier , pp. 1\u2013252"},{"key":"2146_CR5","doi-asserted-by":"publisher","unstructured":"Ma, X, Li, B, Kong, Q, Ouyang, Y, Lu, R(2021) On secure and efficient data sharing for smart grids: An anti-collusion scheme. In: ICC 2021-IEEE International Conference on Communications, pp. 1\u20136 . https:\/\/doi.org\/10.1109\/ICC42927.2021.9500639","DOI":"10.1109\/ICC42927.2021.9500639"},{"key":"2146_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102189","volume":"103","author":"K Li","year":"2021","unstructured":"Li K, Yang Y, Wang S, Shi R, Li J (2021) A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid. Comput Secur 103:102189. https:\/\/doi.org\/10.1016\/j.cose.2021.102189","journal-title":"Comput Secur"},{"key":"2146_CR7","doi-asserted-by":"publisher","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","volume":"8","author":"P Yang","year":"2020","unstructured":"Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: A survey. IEEE Access 8:131723\u2013131740. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009876","journal-title":"IEEE Access"},{"key":"2146_CR8","doi-asserted-by":"publisher","unstructured":"Wang D, Zhang X, Zhang Z, Wang P (2020) Understanding security failures of multi-factor authentication schemes for multi-server environments. Comput Secur 88. https:\/\/doi.org\/10.1016\/j.cose.2019.101619","DOI":"10.1016\/j.cose.2019.101619"},{"key":"2146_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comcom.2021.03.022","volume":"173","author":"Q Jiang","year":"2021","unstructured":"Jiang Q, Zhang X, Zhang N, Tian Y, Ma X, Ma J (2021) Three-factor authentication protocol using physical unclonable function for iov. Comput Commun 173:45\u201355. https:\/\/doi.org\/10.1016\/j.comcom.2021.03.022","journal-title":"Comput Commun"},{"key":"2146_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3013927","author":"L Zhou","year":"2020","unstructured":"Zhou L, Fu A, Yang G, Wang H, Zhang Y (2020) Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2020.3013927","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2146_CR11","doi-asserted-by":"publisher","unstructured":"Wang, Q, Wang, D, Cheng, C, He, D (2021) Quantum2fa: Efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Trans Dependable Secure Comput, pp. 1\u20131 . https:\/\/doi.org\/10.1109\/TDSC.2021.3129512","DOI":"10.1109\/TDSC.2021.3129512"},{"key":"2146_CR12","doi-asserted-by":"publisher","unstructured":"Li, Z, Wang, D, Morais, E (2020) Quantum-safe round-optimal password authentication for mobile devices. IEEE Trans Dependable Secure Comput, pp. 1\u20131 . https:\/\/doi.org\/10.1109\/TDSC.2020.3040776","DOI":"10.1109\/TDSC.2020.3040776"},{"issue":"11","key":"2146_CR13","doi-asserted-by":"publisher","first-page":"7669","DOI":"10.1109\/TII.2021.3049141","volume":"17","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE Trans Industr Inform 17(11):7669\u20137678. https:\/\/doi.org\/10.1109\/TII.2021.3049141","journal-title":"IEEE Trans Industr Inform"},{"issue":"4","key":"2146_CR14","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1145\/571637.571640","volume":"20","author":"M Castro","year":"2002","unstructured":"Castro M, Liskov B (2002) Practical byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst 20(4):398\u2013461","journal-title":"ACM Trans Comput Syst"},{"issue":"1","key":"2146_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-020-2975-6","volume":"65","author":"C Wang","year":"2022","unstructured":"Wang C, Wang D, Xu G, He D (2022) Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci China Inf Sci 65(1):1\u201315","journal-title":"Sci China Inf Sci"},{"issue":"1","key":"2146_CR16","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TII.2013.2277938","volume":"10","author":"C-I Fan","year":"2013","unstructured":"Fan C-I, Huang S-Y, Lai Y-L (2013) Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans Industr Inform 10(1):666\u2013675. https:\/\/doi.org\/10.1109\/TII.2013.2277938","journal-title":"IEEE Trans Industr Inform"},{"issue":"5","key":"2146_CR17","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1109\/TSG.2017.2720159","volume":"8","author":"D He","year":"2017","unstructured":"He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans Smart Grid 8(5):2411\u20132419. https:\/\/doi.org\/10.1109\/TSG.2017.2720159","journal-title":"IEEE Trans Smart Grid"},{"key":"2146_CR18","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2677520","volume":"5","author":"R Lu","year":"2017","unstructured":"Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access 5:3302\u20133312. https:\/\/doi.org\/10.1109\/ACCESS.2017.2677520","journal-title":"IEEE Access"},{"issue":"1","key":"2146_CR19","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TSG.2016.2553647","volume":"9","author":"A Abdallah","year":"2016","unstructured":"Abdallah A, Shen XS (2016) A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans Smart Grid 9(1):396\u2013405. https:\/\/doi.org\/10.1109\/TSG.2016.2553647","journal-title":"IEEE Trans Smart Grid"},{"issue":"3","key":"2146_CR20","doi-asserted-by":"publisher","first-page":"4755","DOI":"10.1109\/JIOT.2018.2874473","volume":"6","author":"X Li","year":"2018","unstructured":"Li X, Liu S, Wu F, Kumari S, Rodrigues JJ (2018) Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet Things J 6(3):4755\u20134763. https:\/\/doi.org\/10.1109\/JIOT.2018.2874473","journal-title":"IEEE Internet Things J"},{"key":"2146_CR21","doi-asserted-by":"publisher","unstructured":"Ateniese, G, Burns, R, Curtmola, R, Herring, J, Kissner, L, Peterson, Z, Song, D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. pp. 598\u2013609 . https:\/\/doi.org\/10.1145\/1315245.1315318","DOI":"10.1145\/1315245.1315318"},{"key":"2146_CR22","doi-asserted-by":"publisher","unstructured":"Juels, A, Kaliski Jr, BS(2007) Pors: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584\u2013597. https:\/\/doi.org\/10.1145\/1315245.1315317","DOI":"10.1145\/1315245.1315317"},{"issue":"5","key":"2146_CR23","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2010","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2010) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u2013859. https:\/\/doi.org\/10.1109\/TPDS.2010.183","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"2146_CR24","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","volume":"10","author":"H Tian","year":"2015","unstructured":"Tian H, Chen Y, Chang C-C, Jiang H, Huang Y, Chen Y, Liu J (2015) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701\u2013714. https:\/\/doi.org\/10.1109\/TSC.2015.2512589","journal-title":"IEEE Trans Serv Comput"},{"key":"2146_CR25","doi-asserted-by":"publisher","first-page":"513","DOI":"10.2197\/ipsjdc.2.513","volume":"2","author":"H Kikuchi","year":"2006","unstructured":"Kikuchi H, Abe K, Nakanishi S (2006) Online certification status verification with a red-black hash tree. IPSJ Digital Courier 2:513\u2013523","journal-title":"IPSJ Digital Courier"},{"key":"2146_CR26","doi-asserted-by":"publisher","first-page":"75117","DOI":"10.1109\/ACCESS.2021.3079143","volume":"9","author":"Z Liu","year":"2021","unstructured":"Liu Z, Liu Y, Yang X, Li X (2021) Integrity auditing for multi-copy in cloud storage based on red-black tree. IEEE Access 9:75117\u201375131","journal-title":"IEEE Access"},{"key":"2146_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101971","volume":"114","author":"T Wang","year":"2021","unstructured":"Wang T, Mei Y, Liu X, Wang J, Dai H-N, Wang Z (2021) Edge-based auditing method for data security in resource-constrained internet of things. J Syst Archit 114:101971","journal-title":"J Syst Archit"},{"issue":"1","key":"2146_CR28","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1504\/IJWGS.2018.088396","volume":"14","author":"Y Wang","year":"2018","unstructured":"Wang Y, Tao X, Ni J, Yu Y (2018) Data integrity checking with reliable data transfer for secure cloud storage. Int J Web Grid Serv 14(1):106\u2013121","journal-title":"Int J Web Grid Serv"},{"key":"2146_CR29","doi-asserted-by":"publisher","first-page":"3295","DOI":"10.1109\/TIFS.2020.2986879","volume":"15","author":"Y Sun","year":"2020","unstructured":"Sun Y, Liu Q, Chen X, Du X (2020) An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Trans Inf Forensics Secur 15:3295\u20133310. https:\/\/doi.org\/10.1109\/TIFS.2020.2986879","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2146_CR30","doi-asserted-by":"publisher","first-page":"2564","DOI":"10.1109\/TIFS.2021.3059270","volume":"16","author":"S Li","year":"2021","unstructured":"Li S, Zhang Y, Xu C, Chen K (2021) Cryptoanalysis of an authenticated data structure scheme with public privacy-preserving auditing. IEEE Trans Inf Forensics Secur 16:2564\u20132565. https:\/\/doi.org\/10.1109\/TIFS.2021.3059270","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2146_CR31","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.renene.2020.09.096","volume":"164","author":"G Jim\u00e9nez-Castillo","year":"2021","unstructured":"Jim\u00e9nez-Castillo G, Rus-Casas C, Tina G, Mu\u00f1oz-Rodriguez F (2021) Effects of smart meter time resolution when analyzing photovoltaic self-consumption system on a daily and annual basis. Renew Energy 164:889\u2013896. https:\/\/doi.org\/10.1016\/j.renene.2020.09.096","journal-title":"Renew Energy"},{"key":"2146_CR32","doi-asserted-by":"crossref","unstructured":"Qiu, Z, Chen, R, Yan, M (2020) Monitoring data analysis technology of smart grid based on cloud computing. In: IOP Conference Series: Materials Science and Engineering, vol. 750. IOP Publishing, p. 012221","DOI":"10.1088\/1757-899X\/750\/1\/012221"},{"key":"2146_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2993728","author":"J Gao","year":"2020","unstructured":"Gao J, Wang H, Shen H (2020) Task failure prediction in cloud data centers using deep learning. IEEE transactions on services computing. https:\/\/doi.org\/10.1109\/TSC.2020.2993728","journal-title":"IEEE transactions on services computing"},{"key":"2146_CR34","doi-asserted-by":"publisher","unstructured":"Hanke, S (1999) The performance of concurrent red-black tree algorithms. In: International Workshop on Algorithm Engineering. Springer, pp. 286\u2013300. https:\/\/doi.org\/10.1007\/3-540-48318-7_23","DOI":"10.1007\/3-540-48318-7_23"},{"key":"2146_CR35","doi-asserted-by":"publisher","unstructured":"\u00cdzdemir, F, \u00cddemi\u015f \u00cdzger, Z, et al.(2021) Boneh-goh-nissim algorithm. In: Partially Homomorphic Encryption, pp. 123\u2013133. https:\/\/doi.org\/10.1007\/978-3-030-87629-6_11","DOI":"10.1007\/978-3-030-87629-6_11"},{"key":"2146_CR36","doi-asserted-by":"publisher","unstructured":"Ateniese, G, Hohenberger, S(2005) Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. pp. 310\u2013319. https:\/\/doi.org\/10.1109\/TSC.2020.2993728","DOI":"10.1109\/TSC.2020.2993728"},{"key":"2146_CR37","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.(2013) Elligator: Elliptic-curve points indistinguishable from uniform random strings. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 967\u2013980","DOI":"10.1145\/2508859.2516734"},{"key":"2146_CR38","unstructured":"Muanalifah, A., Sergeev, S.: On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product"},{"key":"2146_CR39","doi-asserted-by":"publisher","unstructured":"Wang W, Huang H, Zhang L, Su C (2020) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Networking and Applications 1\u201313. https:\/\/doi.org\/10.1007\/s12083-020-01020-2","DOI":"10.1007\/s12083-020-01020-2"},{"key":"2146_CR40","unstructured":"JPBC Library, http:\/\/gas.dia.unisa.it\/projects\/jpbc\/"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02146-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02146-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02146-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:20:36Z","timestamp":1744204836000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02146-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,22]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["2146"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02146-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,22]]},"assertion":[{"value":"12 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. Mingxi Liu provided the algorithm and wrote the manuscript. Mingxi Liu and Ning lu provided experimental results. Ning Lu and Yihong Wen supervised and analyzed the experiment. Qingfeng Cheng and Wenbo Shi revised the paper. We also declare that data availability and ethics approval are not applicable in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}