{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:12:01Z","timestamp":1766067121783,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T00:00:00Z","timestamp":1583280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T00:00:00Z","timestamp":1583280000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11280-019-00761-2","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T11:02:27Z","timestamp":1583319747000},"page":"2215-2238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Outsourced data integrity verification based on blockchain in untrusted environment"],"prefix":"10.1007","volume":"23","author":[{"given":"Kun","family":"Hao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2077-8269","authenticated-orcid":false,"given":"Junchang","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Zhiqiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"761_CR1","unstructured":"1e96a1b27a6cb85df68d728cf3695b0c46dbd44d: Filecoin: A cryptocurrency operated file storage network (2014)"},{"key":"761_CR2","unstructured":"Apache hadoop. http:\/\/hadoop.apache.org\/"},{"key":"761_CR3","unstructured":"Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: A global naming and storage system secured by blockchains. https:\/\/www.zurich.ibm.com\/dccl\/paper-s\/nelson_dccl_slides.pdf (2016)"},{"key":"761_CR4","unstructured":"Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: A global naming and storage system secured by blockchains (2016)"},{"key":"761_CR5","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: ACM Sigsac conference on computer and communications security, pp. 831\u2013843 (2014)","DOI":"10.1145\/2660267.2660310"},{"key":"761_CR6","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM conference on computer and communications security, pp. 598\u2013609 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"761_CR7","doi-asserted-by":"crossref","unstructured":"Bajaj, S., Sion, R.: Trusteddb: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD international conference on management of data, SIGMOD 2011, Athens, Greece, June, pp. 205\u2013216 (2011)","DOI":"10.1145\/1989323.1989346"},{"key":"761_CR8","volume-title":"Merkle signature schemes, merkle trees and their cryptanalysis","author":"G Becker","year":"2008","unstructured":"Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum, Tech. Rep (2008)"},{"key":"761_CR9","unstructured":"Brenner, S., Wulf, C., Kapitza, R.: Running zookeeper coordination services in untrusted clouds (2014)"},{"key":"761_CR10","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform (2014)"},{"key":"761_CR11","doi-asserted-by":"crossref","unstructured":"Chen, W., Liu, M., Zhang, R., Zhang, Y., Liu, S.: Secure outsourced skyline query processing via untrusted cloud service providers. In: IEEE INFOCOM 2016 - the IEEE international conference on computer communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524509"},{"key":"761_CR12","doi-asserted-by":"crossref","unstructured":"Dang, H., Dinh, T.T.A., Loghin, D., Chang, E.C., Lin, Q., Ooi, B.C.: Towards scaling blockchain systems via sharding. In: Proceedings of the 2019 international conference on management of data, pp. 123\u2013140. ACM (2019)","DOI":"10.1145\/3299869.3319889"},{"key":"761_CR13","doi-asserted-by":"crossref","unstructured":"Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.L.: Blockbench: A framework for analyzing private blockchains (2017)","DOI":"10.1145\/3035918.3064033"},{"key":"761_CR14","unstructured":"Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: Sporc: group collaboration using untrusted cloud resources. In: Usenix conference on operating systems design and implementation, pp. 337\u2013350 (2010)"},{"key":"761_CR15","doi-asserted-by":"crossref","unstructured":"Han, S., Xu, Z., Zeng, Y., Chen, L.: Fluid: A blockchain based framework for crowdsourcing. In: Proceedings of the 2019 international conference on management of data, pp. 1921\u20131924. ACM (2019)","DOI":"10.1145\/3299869.3320238"},{"key":"761_CR16","doi-asserted-by":"crossref","unstructured":"Hao, K., Xin, J., Wang, Z., Jiang, Z., Wang, G.: Decentralized data integrity verification model in untrusted environment. In: Asia-Pacific Web (APWeb) and Web-age information management (WAIM) joint international conference on Web and big data, pp. 410\u2013424. Springer (2018)","DOI":"10.1007\/978-3-319-96893-3_31"},{"issue":"4","key":"761_CR17","first-page":"742","volume":"54","author":"W Jiye","year":"2017","unstructured":"Jiye, W., Lingchao, G., Aiqiang, D.: Block chain based data security sharing network architecture research. J. Comput. Res. Development 54(4), 742\u2013749 (2017)","journal-title":"J. Comput. Res. Development"},{"key":"761_CR18","doi-asserted-by":"crossref","unstructured":"Juels, A.: Pors: proofs of retrievability for large files. In: ACM conference on computer and communications security, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"761_CR19","doi-asserted-by":"crossref","unstructured":"Li, Y., Zheng, K., Yan, Y., Liu, Q., Zhou, X.: Etherql: A query layer for blockchain system (2017)","DOI":"10.1007\/978-3-319-55699-4_34"},{"key":"761_CR20","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jnca.2016.08.017","volume":"77","author":"C Lin","year":"2017","unstructured":"Lin, C., Shen, Z., Chen, Q., Sheldon, F.T.: A data integrity verification scheme in mobile cloud computing. J. Netw. Comput. Appl. 77, 146\u2013151 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"761_CR21","unstructured":"Lowry, S., Wilkinson, J.: Metadisk: Blockchain-based decentralized file storage application. https:\/\/storj.io\/metadisk.pdf March 2, 2017"},{"issue":"8","key":"761_CR22","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1007\/s00500-015-1918-8","volume":"21","author":"J Mao","year":"2017","unstructured":"Mao, J., Zhang, Y., Li, P., Li, T., Wu, Q., Liu, J.: A position-aware merkle tree for dynamic cloud data integrity verification. Soft. Comput. 21(8), 2151\u20132164 (2017)","journal-title":"Soft. Comput."},{"key":"761_CR23","unstructured":"McConaghy, T., Marques, R.: Bigchaindb: A scalable blockchain database. https:\/\/www.bigchaindb.com\/whitepaper\/bigchaindb-whitepaper.pdf January 11, 2017"},{"key":"761_CR24","doi-asserted-by":"crossref","unstructured":"Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: Repurposing bitcoin work for data preservation. In: IEEE symposium on security and privacy, pp. 475\u2013490 (2014)","DOI":"10.1109\/SP.2014.37"},{"key":"761_CR25","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"761_CR26","unstructured":"Ongaro, D., Ousterhout, J.K.: In search of an understandable consensus algorithm. In: USENIX annual technical conference, pp. 305\u2013319 (2014)"},{"key":"761_CR27","doi-asserted-by":"crossref","unstructured":"Sengupta, B., Bag, S., Ruj, S., Sakurai, K.: Retricoin: Bitcoin based on compact proofs of retrievability. In: International conference on distributed computing and networking, pp. 14 (2016)","DOI":"10.1145\/2833312.2833317"},{"issue":"3","key":"761_CR28","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"key":"761_CR29","doi-asserted-by":"crossref","unstructured":"Shraer, A., Cachin, C., Cidon, A., Keidar, I., Yan, M., Shaket, D.: Venus:verification for untrusted cloud storage. In: ACM workshop on cloud computing security workshop, pp. 19\u201330 (2010)","DOI":"10.1145\/1866835.1866841"},{"key":"761_CR30","unstructured":"Tsai, W.T., Yu, L., Wang, R., Liu, N., Deng, E.Y.: Blockchain application development techniques (2017)"},{"key":"761_CR31","doi-asserted-by":"crossref","unstructured":"Wang, S., Dinh, T.T. A., Lin, Q., Xie, Z., Zhang, M., Cai, Q., Chen, G., Fu, W., Ooi, B.C., Ruan, P.: Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv:1802.04949 (2018)","DOI":"10.14778\/3231751.3231762"},{"issue":"3","key":"761_CR32","first-page":"442","volume":"26","author":"B Waters","year":"2008","unstructured":"Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2008)","journal-title":"J. Cryptol."},{"key":"761_CR33","unstructured":"Weil, S.A., Brandt, S.A., Miller, E.L., Long, D.D., Maltzahn, C.: Ceph: A scalable, high-performance distributed file system. In: Proceedings of the 7th symposium on Operating systems design and implementation, pp. 307\u2013320. USENIX Association (2006)"},{"key":"761_CR34","unstructured":"Wilkinson, S., Boshexski, T.: Metadisk: Blockchain-based decentralized file storage application. https:\/\/storj.io\/storj.pdf January11, 2017"},{"key":"761_CR35","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhang, C., Xu, J.: vchain: Enabling verifiable boolean range queries over blockchain databases. In: Proceedings of the 2019 international conference on management of data, pp. 141\u2013158. ACM (2019)","DOI":"10.1145\/3299869.3300083"},{"key":"761_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, C., Xu, C., Xu, J., Tang, Y., Choi, B.: Gem\u02c6 2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 2019 IEEE 35th international conference on data engineering (ICDE), pp. 842\u2013853. IEEE (2019)","DOI":"10.1109\/ICDE.2019.00080"},{"key":"761_CR37","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Zhang, Z., Jin, C., Zhou, A., Yan, Y.: Sebdb: Semantics empowered blockchain database. In: 2019 IEEE 35th international conference on data engineering (ICDE), pp. 1820\u20131831. IEEE (2019)","DOI":"10.1109\/ICDE.2019.00198"},{"key":"761_CR38","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: Using blockchain to protect personal data. In: IEEE security and privacy workshops, pp. 180\u2013184 (2015)","DOI":"10.1109\/SPW.2015.27"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00761-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-019-00761-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00761-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T01:05:20Z","timestamp":1614819920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-019-00761-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,4]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["761"],"URL":"https:\/\/doi.org\/10.1007\/s11280-019-00761-2","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2020,3,4]]},"assertion":[{"value":"7 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}