{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:25:08Z","timestamp":1752985508389,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602061"],"award-info":[{"award-number":["61602061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s12083-022-01332-5","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T12:03:56Z","timestamp":1654517036000},"page":"2021-2036","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8454-5064","authenticated-orcid":false,"given":"Jinyong","family":"Chang","sequence":"first","affiliation":[]},{"given":"Maozhi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"1332_CR1","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In Proceedings of 1st edition of the MCC workshop on mobile cloud computing. New York, pp 13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"1332_CR2","doi-asserted-by":"crossref","unstructured":"Wang H, Feng L, Ji Y et al (2022) Toward usable cloud storage auditing, revisited. IEEE Syst J 16(1):693\u2013700","DOI":"10.1109\/JSYST.2021.3055021"},{"key":"1332_CR3","unstructured":"Zhang T (2016) Fog boosts capabilities to add more things securely to the internet. In http:\/\/blogs.cisco.com\/innovation\/fog-boosts-capabilities-to-add-more-things-securely-to-the-internet"},{"key":"1332_CR4","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing fog et al.: A survey and analysis of security threats and challenges. Future Gen Comput Syst 78:680\u2013698","journal-title":"Future Generation Computer Systems"},{"key":"1332_CR5","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R et al (2007) Provable data possession at untrusted stores. In CCS\u20192014, ACM. Alexandria, Virginia, USA, pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"1332_CR6","doi-asserted-by":"crossref","unstructured":"Barsoum A, Hasan  MA (2015) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Sec 10(3):485\u2013497","DOI":"10.1109\/TIFS.2014.2384391"},{"key":"1332_CR7","doi-asserted-by":"crossref","unstructured":"Chang J, Ji Y, Xu M et al (2019) General transformations from single-genearation to multi-generation for homomorphic message authentication schemes in network coding. Futur Gener Comput Syst 91:416\u2013425","DOI":"10.1016\/j.future.2018.08.039"},{"key":"1332_CR8","doi-asserted-by":"publisher","first-page":"50858","DOI":"10.1109\/ACCESS.2019.2908244","volume":"7","author":"J Chang","year":"2019","unstructured":"Chang J, Ma H, Zhang A, Xu M, Xue R (2019) RKA security of identity-based homomorphic signature scheme. IEEE Access 7:50858\u201350868","journal-title":"IEEE Access"},{"key":"1332_CR9","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26:442\u2013483","journal-title":"J Cryptol"},{"key":"1332_CR10","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","volume":"10","author":"H Tian","year":"2017","unstructured":"Tian H, Chen Y, Chang C, Jiang H, Huang Y, Chen Y, Liu J (2017) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10:701\u2013714","journal-title":"IEEE Trans Serv Comput"},{"key":"1332_CR11","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2018.12.004","volume":"127","author":"H Tian","year":"2019","unstructured":"Tian H, Nan F, Chang C, Huang Y, Lu J, Du Y (2019) Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Netw Comput Appl 127:59\u201369","journal-title":"J Netw Comput Appl"},{"key":"1332_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MNET.2010.5510914","volume":"24","author":"C Wang","year":"2010","unstructured":"Wang C, Ren K, Lou W, Li J (2010) Toward publicly auditable secure cloud data storage sevices. IEEE Network 24:19\u201324","journal-title":"IEEE Network"},{"key":"1332_CR13","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22:847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1332_CR14","doi-asserted-by":"crossref","unstructured":"Wu Y, Jiang Z, Wang X et al (2017) Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage. IEEE Int Conf on Comput Sci Eng","DOI":"10.1109\/CSE-EUC.2017.104"},{"key":"1332_CR15","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TIFS.2015.2423264","volume":"10","author":"J Yuan","year":"2015","unstructured":"Yuan J, Yu S (2015) Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans Inf Forensics Secur 10:1717\u20131726","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1332_CR16","doi-asserted-by":"crossref","unstructured":"Zhu Y, Ahn G, Hu H et al (2013) Dynamic audit services for outsourced storages in clouds. In IEEE Trans. Services Computing 6:227\u2013238","DOI":"10.1109\/TSC.2011.51"},{"key":"1332_CR17","doi-asserted-by":"crossref","unstructured":"Lin Q, Li J, Huang Z et al (2018) A short linearly homomorphic proxy signature scheme.\u00a0IEEE Access\u00a06:12966\u201312972","DOI":"10.1109\/ACCESS.2018.2809684"},{"key":"1332_CR18","doi-asserted-by":"publisher","unstructured":"Rabaninejad R, Attari MA, Asaar MR et al (2019) A lightweight auditing service for shared data with secure user revocation in cloud storage. in ieee transac serv comput early access.\u00a0https:\/\/doi.org\/10.1109\/TSC.2019.2919627","DOI":"10.1109\/TSC.2019.2919627"},{"key":"1332_CR19","doi-asserted-by":"crossref","unstructured":"Jues A, Kaliski J (2007) PoRs: Proofs of retrievability for large files. In CCS\u20192007, ACM. Alexandria, Virginiz, USA, 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"key":"1332_CR20","doi-asserted-by":"crossref","unstructured":"Erway C, K\u00fcp\u00e7\u00fc A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. ACM CCS, pp 213\u2013222","DOI":"10.1145\/1653662.1653688"},{"key":"1332_CR21","doi-asserted-by":"crossref","unstructured":"Yu Y, Au M, Ateniese  G et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12:767\u2013778","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"1332_CR22","doi-asserted-by":"crossref","unstructured":"Shen J, Shen J, Huang X et al (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur\u00a012:2402\u20132415","DOI":"10.1109\/TIFS.2017.2705620"},{"key":"1332_CR23","doi-asserted-by":"crossref","unstructured":"Merkle RC (1980) Protocols for public key cryptosystems. In IEEE Security and Privacy, pp 122\u2013122","DOI":"10.1109\/SP.1980.10006"},{"key":"1332_CR24","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.pmcj.2018.02.003","volume":"46","author":"A Kaswan","year":"2018","unstructured":"Kaswan A, Singh V, Jana PK (2018) A Multi-objective and pso based energy efficient path design for mobile sink in wireless sensor networks. Pervasive Mobile Computing 46:122\u2013136","journal-title":"Pervasive Mobile Computing"},{"key":"1332_CR25","unstructured":"Wang T, Li Y, Wang G, Cao J, Bhuiyan M, Jia W (2017) Sustainable and efficient data collection from wsns to cloud. IEEE Trans Sustain Comput\u00a0"},{"key":"1332_CR26","doi-asserted-by":"publisher","first-page":"37951","DOI":"10.1109\/ACCESS.2020.2971630","volume":"9","author":"X Zhang","year":"2021","unstructured":"Zhang X, Si W (2021) Efficient auditing scheme for secure data storage in fog-to-cloud computing. IEEE Access 9:37951\u201337960","journal-title":"IEEE Access"},{"key":"1332_CR27","doi-asserted-by":"crossref","unstructured":"Akinyele J et al (2013) Charm: A framework for rapidly prototyping cryptosystems. J Cryptogr Eng 3(2):111\u2013128","DOI":"10.1007\/s13389-013-0057-3"},{"key":"1332_CR28","unstructured":"Lynn B. The standard pairing based crypto library. In http:\/\/crypto.standford.edu\/pbc"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01332-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01332-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01332-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T12:31:48Z","timestamp":1656765108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01332-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["1332"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01332-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"14 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}