{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:12:03Z","timestamp":1770228723953,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Central Guidance on Local Science and Technology Development Fund of Guangxi Province","award":["ZY23055008"],"award-info":[{"award-number":["ZY23055008"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["KX202329"],"award-info":[{"award-number":["KX202329"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"Natural Science Foundation of Guangxi","award":["2023GXNSFAA026236"],"award-info":[{"award-number":["2023GXNSFAA026236"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172119"],"award-info":[{"award-number":["62172119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01818-4","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T13:21:42Z","timestamp":1732540902000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fine-grained data deletion supporting dynamic data insertion for cloud storage"],"prefix":"10.1007","volume":"18","author":[{"given":"Changsong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yueling","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"issue":"3","key":"1818_CR1","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1080\/01611194.2018.1549123","volume":"43","author":"A Bentajer","year":"2019","unstructured":"Bentajer A, Hedabou M, Abouelmehdi K et al (2019) An ibe-based design for assured deletion in cloud storage. Cryptologia 43(3):254\u2013265. https:\/\/doi.org\/10.1080\/01611194.2018.1549123","journal-title":"Cryptologia"},{"key":"1818_CR2","unstructured":"Boneh D, Lipton RJ (1996) A revocable backup system. In: The Sixth USENIX Security Symposium, pp 91\u201396"},{"key":"1818_CR3","doi-asserted-by":"publisher","unstructured":"Du L, Zhang Z, Tan S, et\u00a0al (2018) An associated deletion scheme for multi-copy in cloud storage. In: International Conference on Algorithms and Architectures for Parallel Processing, Springer, pp 511\u2013526. https:\/\/doi.org\/10.1007\/978-3-030-05063-4_38","DOI":"10.1007\/978-3-030-05063-4_38"},{"issue":"2","key":"1818_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1109\/TKDE.2010.132","volume":"23","author":"D Eppstein","year":"2010","unstructured":"Eppstein D, Goodrich MT (2010) Straggler identification in round-trip data streams via newton\u2019s identities and invertible bloom filters. IEEE Trans Knowl Data Eng 23(2):297\u2013306. https:\/\/doi.org\/10.1109\/TKDE.2010.132","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"1818_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MSECP.2003.1176992","volume":"1","author":"SL Garfinkel","year":"2003","unstructured":"Garfinkel SL, Shelat A (2003) Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy 1(1):17\u201327. https:\/\/doi.org\/10.1109\/MSECP.2003.1176992","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"1818_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/08874417.2019.1683782","volume":"62","author":"H Hannila","year":"2022","unstructured":"Hannila H, Silvola R, Harkonen J et al (2022) Data-driven begins with data; potential of data assets. J Comput Inf Syst 62(1):29\u201338. https:\/\/doi.org\/10.1080\/08874417.2019.1683782","journal-title":"J Comput Inf Syst"},{"issue":"6","key":"1818_CR7","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/TDSC.2015.2423684","volume":"13","author":"F Hao","year":"2015","unstructured":"Hao F, Clarke D, Zorzo AF (2015) Deleting secret data with public verifiability. IEEE Trans Depend Sec Comput 13(6):617\u2013629. https:\/\/doi.org\/10.1109\/TDSC.2015.2423684","journal-title":"IEEE Trans Depend Sec Comput"},{"issue":"2","key":"1818_CR8","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/JIOT.2019.2953082","volume":"7","author":"J Hao","year":"2019","unstructured":"Hao J, Liu J, Wu W et al (2019) Secure and fine-grained self-controlled outsourced data deletion in cloud-based iot. IEEE Inter Things J 7(2):1140\u20131153. https:\/\/doi.org\/10.1109\/JIOT.2019.2953082","journal-title":"IEEE Inter Things J"},{"issue":"102","key":"1818_CR9","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.sysarc.2021.102332","volume":"121","author":"G Kan","year":"2021","unstructured":"Kan G, Jin C, Zhu H et al (2021) An identity-based proxy re-encryption for data deduplication in cloud. J Syst Archi 121(102):332. https:\/\/doi.org\/10.1016\/j.sysarc.2021.102332","journal-title":"J Syst Archi"},{"key":"1818_CR10","doi-asserted-by":"publisher","unstructured":"Liu Y, Wang XA, Cao Y, et\u00a0al (2018) Improved provable data transfer from provable data possession and deletion in cloud storage. In: International Conference on Intelligent Networking and Collaborative Systems, Springer, pp 445\u2013452. https:\/\/doi.org\/10.1007\/978-3-319-98557-2_40","DOI":"10.1007\/978-3-319-98557-2_40"},{"key":"1818_CR11","doi-asserted-by":"publisher","unstructured":"Luo Y, Xu M, Fu S, et\u00a0al (2016) Enabling assured deletion in the cloud storage by overwriting. In: Proceedings of the 4th ACM international workshop on security in cloud computing, pp 17\u201323, https:\/\/doi.org\/10.1145\/2898445.2898447","DOI":"10.1145\/2898445.2898447"},{"key":"1818_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8855341","volume":"2021","author":"J Ma","year":"2021","unstructured":"Ma J, Wang M, Xiong J et al (2021) Cp-abe-based secure and verifiable data deletion in cloud. Secur Commu Netw 2021:1\u201314. https:\/\/doi.org\/10.1155\/2021\/8855341","journal-title":"Secur Commu Netw"},{"issue":"10","key":"1818_CR13","doi-asserted-by":"publisher","first-page":"5349","DOI":"10.1007\/s11227-018-2427-1","volume":"74","author":"N Mansouri","year":"2018","unstructured":"Mansouri N, Javidi MM (2018) A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers. The J Supercomput 74(10):5349\u20135372. https:\/\/doi.org\/10.1007\/s11227-018-2427-1","journal-title":"The J Supercomput"},{"key":"1818_CR14","doi-asserted-by":"publisher","first-page":"2625","DOI":"10.1109\/TDSC.2022.3188740","volume":"20","author":"Q Mei","year":"2023","unstructured":"Mei Q, Yang M, Chen J et al (2023) Expressive data sharing and self-controlled fine-grained data deletion in cloud-assisted iot. IEEE Trans Depend Sec Comput 20:2625\u20132640. https:\/\/doi.org\/10.1109\/TDSC.2022.3188740","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"1818_CR15","doi-asserted-by":"publisher","unstructured":"Nawab F (2021) Wedgechain: A trusted edge-cloud store with asynchronous (lazy) trust. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), IEEE, pp 408\u2013419. https:\/\/doi.org\/10.1109\/ICDE51399.2021.00042","DOI":"10.1109\/ICDE51399.2021.00042"},{"issue":"4","key":"1818_CR16","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1109\/TCC.2019.2911679","volume":"9","author":"H Qiu","year":"2019","unstructured":"Qiu H, Noura H, Qiu M et al (2019) A user-centric data protection method for cloud storage based on invertible dwt. IEEE Trans Cloud Comput 9(4):1293\u20131304. https:\/\/doi.org\/10.1109\/TCC.2019.2911679","journal-title":"IEEE Trans Cloud Comput"},{"key":"1818_CR17","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.future.2020.09.019","volume":"115","author":"Y Ren","year":"2021","unstructured":"Ren Y, Leng Y, Qi J et al (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Future Gener Comput Syst 115:304\u2013313. https:\/\/doi.org\/10.1016\/j.future.2020.09.019","journal-title":"Future Gener Comput Syst"},{"issue":"102","key":"1818_CR18","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/j.jnca.2020.102633","volume":"160","author":"K Riad","year":"2020","unstructured":"Riad K, Huang T, Ke L (2020) A dynamic and hierarchical access control for iot in multi-authority cloud storage. J Netw Comput Appl 160(102):633. https:\/\/doi.org\/10.1016\/j.jnca.2020.102633","journal-title":"J Netw Comput Appl"},{"key":"1818_CR19","doi-asserted-by":"publisher","unstructured":"Shao T, Tian Y, Li Z, et\u00a0al (2019) Fdscd: Fast deletion scheme of cloud data. In: International Conference on Security and Privacy in New Computing Environments, Springer, pp 354\u2013361. https:\/\/doi.org\/10.1007\/978-3-030-21373-2_27","DOI":"10.1007\/978-3-030-21373-2_27"},{"issue":"6","key":"1818_CR20","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/TDSC.2012.49","volume":"9","author":"Y Tang","year":"2012","unstructured":"Tang Y, Lee PP, Lui JC et al (2012) Secure overlay cloud storage with access control and assured deletion. IEEE Trans Depend Sec Comput 9(6):903\u2013916. https:\/\/doi.org\/10.1109\/TDSC.2012.49","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"1818_CR21","doi-asserted-by":"publisher","unstructured":"Tian J, Wang Z (2020) Fine-grained assured data deletion scheme based on attribute association. Comput Secur 96. https:\/\/doi.org\/10.1016\/j.cose.2020.101936","DOI":"10.1016\/j.cose.2020.101936"},{"issue":"7","key":"1818_CR22","doi-asserted-by":"publisher","first-page":"9326","DOI":"10.1007\/s11227-021-04297-z","volume":"78","author":"J Tian","year":"2022","unstructured":"Tian J, Zhang T (2022) Secure and effective assured deletion scheme with orderly overwriting for cloud data. The J Supercomput 78(7):9326\u20139354. https:\/\/doi.org\/10.1007\/s11227-021-04297-z","journal-title":"The J Supercomput"},{"issue":"4","key":"1818_CR23","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1007\/s11036-019-01497-z","volume":"26","author":"Y Tian","year":"2021","unstructured":"Tian Y, Shao T, Li Z (2021) An efficient scheme of cloud data assured deletion. Mobile Netw Appl 26(4):1597\u20131608. https:\/\/doi.org\/10.1007\/s11036-019-01497-z","journal-title":"Mobile Netw Appl"},{"key":"1818_CR24","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.future.2016.05.002","volume":"67","author":"J Wang","year":"2017","unstructured":"Wang J, Chen X, Li J et al (2017) Towards achieving flexible and verifiable search for outsourced database in cloud computing. Future Gener Comput Syst 67:266\u2013275. https:\/\/doi.org\/10.1016\/j.future.2016.05.002","journal-title":"Future Gener Comput Syst"},{"key":"1818_CR25","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2019.07.058","volume":"504","author":"L Wang","year":"2019","unstructured":"Wang L, Wang B, Song W et al (2019) A key-sharing based secure deduplication scheme in cloud storage. Inf Sci 504:48\u201360. https:\/\/doi.org\/10.1016\/j.ins.2019.07.058","journal-title":"Inf Sci"},{"key":"1818_CR26","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1016\/j.future.2020.09.028","volume":"115","author":"Q Wang","year":"2021","unstructured":"Wang Q, Zhou F, Xu J et al (2021) Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener Comput Syst 115:553\u2013567. https:\/\/doi.org\/10.1016\/j.future.2020.09.028","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"1818_CR27","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TCC.2014.2372758","volume":"2","author":"J Xiong","year":"2014","unstructured":"Xiong J, Liu X, Yao Z et al (2014) A secure data self-destructing scheme in cloud computing. IEEE Trans Cloud Comput 2(4):448\u2013458. https:\/\/doi.org\/10.1109\/TCC.2014.2372758","journal-title":"IEEE Trans Cloud Comput"},{"key":"1818_CR28","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1016\/j.future.2019.10.017","volume":"111","author":"J Xiong","year":"2020","unstructured":"Xiong J, Chen L, Bhuiyan MZA et al (2020) A secure data deletion scheme for iot devices through key derivation encryption and data analysis. Future Gener Comput Syst 111:741\u2013753. https:\/\/doi.org\/10.1016\/j.future.2019.10.017","journal-title":"Future Gener Comput Syst"},{"key":"1818_CR29","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.csi.2016.08.006","volume":"54","author":"L Xue","year":"2017","unstructured":"Xue L, Ni J, Li Y et al (2017) Provable data transfer from provable data possession and deletion in cloud storage. Comput Stand Inter 54:46\u201354. https:\/\/doi.org\/10.1016\/j.csi.2016.08.006","journal-title":"Comput Stand Inter"},{"key":"1818_CR30","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.jnca.2017.11.011","volume":"103","author":"C Yang","year":"2018","unstructured":"Yang C, Chen X, Xiang Y (2018) Blockchain-based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl 103:185\u2013193. https:\/\/doi.org\/10.1016\/j.jnca.2017.11.011","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"1818_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/15501477198789","volume":"15","author":"C Yang","year":"2019","unstructured":"Yang C, Tao X, Zhao F (2019) Publicly verifiable data transfer and deletion scheme for cloud storage. Int J Distrib Sensor Netw 15(10):1\u201315. https:\/\/doi.org\/10.1177\/15501477198789","journal-title":"Int J Distrib Sensor Netw"},{"issue":"2","key":"1818_CR32","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1049\/cje.2020.02.015","volume":"29","author":"C Yang","year":"2020","unstructured":"Yang C, Tao X, Zhao F et al (2020) Secure data transfer and deletion from counting bloom filter in cloud computing. Chinese J Electron 29(2):273\u2013280. https:\/\/doi.org\/10.1049\/cje.2020.02.015","journal-title":"Chinese J Electron"},{"key":"1818_CR33","doi-asserted-by":"publisher","unstructured":"Yang C, Zhao F, Tao X et al (2021) Publicly verifiable outsourced data migration scheme supporting efficient integrity checking. J Netw Comput Appl 192. https:\/\/doi.org\/10.1016\/j.jnca.2021.103184","DOI":"10.1016\/j.jnca.2021.103184"},{"key":"1818_CR34","doi-asserted-by":"publisher","unstructured":"Yang C, Liu Y, Ding Y (2022a) Efficient data transfer supporting provable data deletion for secure cloud storage. Soft Comput 26(14):6463\u20136479. https:\/\/doi.org\/10.1007\/s00500-022-07116-6","DOI":"10.1007\/s00500-022-07116-6"},{"key":"1818_CR35","doi-asserted-by":"publisher","unstructured":"Yang C, Liu Y, Zhao F, et\u00a0al (2022b) Provable data deletion from efficient data integrity auditing and insertion in cloud storage. Comput Stand Inter 82. https:\/\/doi.org\/10.1016\/j.csi.2022.103629","DOI":"10.1016\/j.csi.2022.103629"},{"key":"1818_CR36","doi-asserted-by":"publisher","unstructured":"Yu Y, Ni J, Wu W, et\u00a0al (2015) Provable data possession supporting secure data transfer for cloud storage. In: 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), IEEE, pp 38\u201342, https:\/\/doi.org\/10.1109\/BWCCA.2015.44","DOI":"10.1109\/BWCCA.2015.44"},{"issue":"10","key":"1818_CR37","doi-asserted-by":"publisher","first-page":"4538","DOI":"10.1109\/TII.2018.2841047","volume":"14","author":"Y Yu","year":"2018","unstructured":"Yu Y, Xue L, Li Y et al (2018) Assured data deletion with fine-grained access control for fog-based industrial applications. IEEE Trans Indust Inf 14(10):4538\u20134547. https:\/\/doi.org\/10.1109\/TII.2018.2841047","journal-title":"IEEE Trans Indust Inf"},{"issue":"3","key":"1818_CR38","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MNET.011.1900165","volume":"34","author":"D Zheng","year":"2020","unstructured":"Zheng D, Xue L, Yu C et al (2020) Toward assured data deletion in cloud storage. IEEE Netw 34(3):101\u2013107. https:\/\/doi.org\/10.1109\/MNET.011.1900165","journal-title":"IEEE Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01818-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01818-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01818-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:16Z","timestamp":1747474336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01818-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1818"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01818-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"23 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"There is no need for ethical approval while conducting the study in this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"All authors have read this manuscript and are willing to process it for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"17"}}