{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:13:22Z","timestamp":1771517602544,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003787","name":"natural science foundation of hebei province","doi-asserted-by":"publisher","award":["F2016201244"],"award-info":[{"award-number":["F2016201244"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-021-04297-z","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T12:02:53Z","timestamp":1642420973000},"page":"9326-9354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Secure and effective assured deletion scheme with orderly overwriting for cloud data"],"prefix":"10.1007","volume":"78","author":[{"given":"Junfeng","family":"Tian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3632-4982","authenticated-orcid":false,"given":"Tianfeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"4297_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MNET.011.1900165","volume":"34","author":"D Zheng","year":"2020","unstructured":"Zheng D, Liang X, Li YuY, Yu Y (2020) Toward Assured Data Deletion in Cloud Storage. IEEE Netw 34:101\u2013107. https:\/\/doi.org\/10.1109\/MNET.011.1900165","journal-title":"IEEE Netw"},{"issue":"2","key":"4297_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.4018\/IJITWE.2019040105","volume":"14","author":"F Shan","year":"2019","unstructured":"Shan F, Li H, Li F, Guo Y, Xiong J (2019) An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int J Inf Technol Web Eng (IJITWE) 14(2):74\u201391. https:\/\/doi.org\/10.4018\/IJITWE.2019040105","journal-title":"Int J Inf Technol Web Eng (IJITWE)"},{"key":"4297_CR3","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jisa.2020.102454","volume":"51","author":"R Reyhaneh","year":"2020","unstructured":"Reyhaneh R, Mahmoud A, Maryam R, Mohammad R (2020) A lightweight identitybased provable data possession supporting users\u2019 identity privacy and traceability. J Inf Secur Appl 51:214\u20132126. https:\/\/doi.org\/10.1016\/j.jisa.2020.102454","journal-title":"J Inf Secur Appl"},{"key":"4297_CR4","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2017","unstructured":"Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12:767\u2013778. https:\/\/doi.org\/10.1109\/TIFS.2016.2615853","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4297_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.ins.2015.09.004","volume":"380","author":"M Sookhak","year":"2017","unstructured":"Sookhak M, Gani A, Khan MK, Buyya R (2017) Dynamic remote data auditing for securing big data storage in cloud computing. Inf Sci 380:101\u2013116. https:\/\/doi.org\/10.1016\/j.ins.2015.09.004","journal-title":"Inf Sci"},{"key":"4297_CR6","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.future.2019.01.009","volume":"95","author":"W Guo","year":"2019","unstructured":"Guo W, Zhang H, Qin SJ et al (2019) Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener Comput Syst 95:309\u2013322. https:\/\/doi.org\/10.1016\/j.future.2019.01.009","journal-title":"Future Gener Comput Syst"},{"key":"4297_CR7","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.jnca.2017.11.011.175","volume":"103","author":"CS Yang","year":"2018","unstructured":"Yang CS, Chen XF, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185\u2013193. https:\/\/doi.org\/10.1016\/j.jnca.2017.11.011.175","journal-title":"J Netw Comput Appl"},{"key":"4297_CR8","doi-asserted-by":"publisher","unstructured":"Kopo M et al. (2016) Assured Deletion in the Cloud: Requirements, Challenges and Future Directions. In: Proceedings of the 2016 ACM on Cloud Computing Security Workshop (CCSW '16) 97\u2013108. https:\/\/doi.org\/10.1145\/2996429.2996434.","DOI":"10.1145\/2996429.2996434"},{"key":"4297_CR9","doi-asserted-by":"publisher","unstructured":"Elli A, Artem B et al. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth Euro Sys Conference (EuroSys '18) Article 30:1\u201315. https:\/\/doi.org\/10.1145\/3190508.3190538.","DOI":"10.1145\/3190508.3190538"},{"key":"4297_CR10","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-Policy Attribute-Based Encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907) 321\u2013334. https:\/\/doi.org\/10.1109\/SP.2007.11.","DOI":"10.1109\/SP.2007.11"},{"key":"4297_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101936","volume":"96","author":"JF Tian","year":"2020","unstructured":"Tian JF, Wang ZD (2020) Fine-grained assured data deletion scheme based on attribute association. Comput Secur 96:101936. https:\/\/doi.org\/10.1016\/j.cose.2020.101936","journal-title":"Comput Secur"},{"key":"4297_CR12","doi-asserted-by":"publisher","unstructured":"Luo YH, Xu M, Fu SJ, Wang DS (2016) Enabling Assured Deletion in the Cloud Storage by Overwriting. In: Proceedings of the 4th ACM International Workshop on Security in Cloud Computing (SCC '16) 17\u201323. https:\/\/doi.org\/10.1145\/2898445.2898447.","DOI":"10.1145\/2898445.2898447"},{"key":"4297_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISCC47284.2019.8969763","volume":"2019","author":"M Zhang","year":"2019","unstructured":"Zhang M, Zhang H, Yang Y, Shen Q (2019) PTAD: provable and traceable assured deletion in cloud storage. IEEE Symp Comput Commun (ISCC) 2019:1\u20136. https:\/\/doi.org\/10.1109\/ISCC47284.2019.8969763","journal-title":"IEEE Symp Comput Commun (ISCC)"},{"key":"4297_CR14","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1007\/s11036-019-01497-z","volume":"26","author":"YC Tian","year":"2020","unstructured":"Tian YC, Shao T, Li Z (2020) An efficient scheme of cloud data assured deletion. Mobile Netw Appl 26:1597\u20131608. https:\/\/doi.org\/10.1007\/s11036-019-01497-z","journal-title":"Mobile Netw Appl"},{"key":"4297_CR15","unstructured":"Boneh D, Lipton R (1996) Revocable Backup System. In Usenix Security 91\u201396."},{"key":"4297_CR16","doi-asserted-by":"publisher","unstructured":"Mo Z, Xiao Q, Zhou Y, et al (2014) On deletion of outsourced data in cloud computing. In: 2014 IEEE 7th International Conference on Cloud Computing (pp. 344-351). IEEE. https:\/\/doi.org\/10.1109\/CLOUD.2014.54.","DOI":"10.1109\/CLOUD.2014.54"},{"key":"4297_CR17","unstructured":"Geambasu R, Kohno T, Levy AA, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In: Proceedings of the 18th Conference on USENIX security symposium (SSYM\u201909) 299\u2013316."},{"key":"4297_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05063-4_38","volume-title":"Algorithms and Architecturesfor Parallel Processing (ICA3PP)","author":"L Du","year":"2018","unstructured":"Du L, Zhang Z, Tan S et al (2018) An Associated Deletion Scheme for M-ulti-copy in Cloud Storage. In: Vaidya J, Li J (eds) Algorithms and Architecturesfor Parallel Processing (ICA3PP). Springer International Publishing, Cham. https:\/\/doi.org\/10.1007\/978-3-030-05063-4_38"},{"key":"4297_CR19","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.ins.2018.02.015","volume":"479","author":"X Liang","year":"2019","unstructured":"Liang X, Yu Y, Li YN et al (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640\u2013650. https:\/\/doi.org\/10.1016\/j.ins.2018.02.015","journal-title":"Inf Sci"},{"key":"4297_CR20","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TCC.2014.2372758","volume":"2","author":"JB Xiong","year":"2014","unstructured":"Xiong JB et al (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2:448\u2013458. https:\/\/doi.org\/10.1109\/TCC.2014.2372758","journal-title":"IEEE Trans Cloud Comput"},{"key":"4297_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0871-4_9","volume-title":"Applications and Techniques in Information Security","author":"PT Suriya","year":"2019","unstructured":"Suriya PT, Meena V (2019) Integrity Checking of Cloud Data with an Audit-ing Mechanism Using ECC and Merkle Hash Tree. In: Shankar Sriram V, Subramaniyaswamy V, Sasikaladevi N, Zhang L, Batten L, Li G (eds) Applications and Techniques in Information Security. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-0871-4_9"},{"key":"4297_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101741","volume":"92","author":"N Lu","year":"2020","unstructured":"Lu N, Zhang YX, Shi WB et al (2020) A secure and scalable data integrity auditing scheme based on hyper ledger fabric. Comput Secur 92:101741. https:\/\/doi.org\/10.1016\/j.cose.2020.101741","journal-title":"Comput Secur"},{"issue":"11","key":"4297_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun ACM"},{"key":"4297_CR24","doi-asserted-by":"crossref","unstructured":"Cachin C, Haralambiev HK, Sorniotti HC (2013) A Policy-based secure deletion. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security - CCS, 13.","DOI":"10.1145\/2508859.2516690"},{"key":"4297_CR25","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2021\/8855341","volume":"2021","author":"J Ma","year":"2021","unstructured":"Ma J, Wang MS, Xiong JB et al (2021) CP-ABE-based secure and verifiable data deletion in cloud. Secur Commun Netw 2021:14. https:\/\/doi.org\/10.1155\/2021\/8855341","journal-title":"Secur Commun Netw"},{"key":"4297_CR26","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720958294","author":"C Yang","year":"2020","unstructured":"Yang C, Liu Y, Tao X (2020) Assure deletion supporting dynamic insertion -for outsourced data in cloud computing. Int J Distrib Sens Netw. https:\/\/doi.org\/10.1177\/1550147720958294","journal-title":"Int J Distrib Sens Netw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04297-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04297-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04297-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T15:22:50Z","timestamp":1650381770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04297-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4297"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04297-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"28 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}