{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:01Z","timestamp":1758987601737,"version":"3.44.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902327"],"award-info":[{"award-number":["61902327"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project of National Engi- neering Research Center of Oil & Gas Exploration Computer Software","award":["DFWT-ZYRJ-2024-JS-81"],"award-info":[{"award-number":["DFWT-ZYRJ-2024-JS-81"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02057-x","type":"journal-article","created":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T06:30:02Z","timestamp":1751697002000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight batch tamper proof detection for anonymous outsourced data in cloud-assisted industrial internet of things"],"prefix":"10.1007","volume":"18","author":[{"given":"Bingyun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaojun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingting","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,5]]},"reference":[{"key":"2057_CR1","doi-asserted-by":"crossref","unstructured":"Niu S, Shao H, Su Y, Wang C (2023) Efficient heterogeneous signcryption scheme based on edge computing for industrial internet of things. J Syst Architect 136:102836","DOI":"10.1016\/j.sysarc.2023.102836"},{"key":"2057_CR2","doi-asserted-by":"crossref","unstructured":"Stock T, Seliger G (2016) Opportunities of sustainable manufacturing in industry 4.0. procedia CIRP 40:536\u2013541","DOI":"10.1016\/j.procir.2016.01.129"},{"key":"2057_CR3","doi-asserted-by":"crossref","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361\u201374382","DOI":"10.1109\/ACCESS.2019.2919982"},{"key":"2057_CR4","doi-asserted-by":"crossref","unstructured":"Gudeme JR, Pasupuleti SK, Kandukuri R (2021) Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage. Comput Secur 103:102176","DOI":"10.1016\/j.cose.2020.102176"},{"key":"2057_CR5","doi-asserted-by":"crossref","unstructured":"Ibrahim SH, Sirat MM, Elbakri WM (2022) Data integrity for dynamic big data in cloud storage: A comprehensive review and critical issues. In: International Conference for Emerging Technologies in Computing, pp 67\u201381. Springer","DOI":"10.1007\/978-3-031-25161-0_5"},{"key":"2057_CR6","doi-asserted-by":"crossref","unstructured":"Li Y, Li Y, Zhang K, Ding Y (2023) Public integrity auditing for dynamic group cooperation files with efficient user revocation. Comput Stand Interfaces 83:103641","DOI":"10.1016\/j.csi.2022.103641"},{"key":"2057_CR7","doi-asserted-by":"crossref","unstructured":"Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process & Manage, 102382","DOI":"10.1016\/j.ipm.2020.102382"},{"issue":"4","key":"2057_CR8","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1007\/s12083-024-01717-8","volume":"17","author":"P Radhakrishnan","year":"2024","unstructured":"Radhakrishnan P, Sugumar PK, Ponnan P, Varadharajan GP (2024) Certificate-less aggregate signature authentication scheme (CLASAS) for secure and efficient data transmission in wireless sensor networks (wsns). Peer Peer Netw Appl 17(4):2572\u20132594","journal-title":"Peer Peer Netw Appl"},{"key":"2057_CR9","unstructured":"Deswarte Y, Quisquater J-J, Saidane A (2003) Remote integrity checking - how to trust files stored on untrusted servers. Integ Internal Contr Inf Syst"},{"key":"2057_CR10","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"2057_CR11","first-page":"22","volume":"30","author":"D Cash","year":"2017","unstructured":"Cash D, K\u00fcp\u00e7\u00fc A, Wichs D (2017) Dynamic proofs of retrievability via oblivious ram. Integ Internal Contr Inf Syst 30:22\u201357","journal-title":"Integ Internal Contr Inf Syst"},{"issue":"3","key":"2057_CR12","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TIFS.2016.2631951","volume":"12","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Xu C, Liang X, Li H, Mu Y, Zhang X (2016) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Foren Secur 12(3):676\u2013688","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"2057_CR13","doi-asserted-by":"crossref","unstructured":"Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manage 57(6):102382","DOI":"10.1016\/j.ipm.2020.102382"},{"key":"2057_CR14","doi-asserted-by":"crossref","unstructured":"Rizvi S, Razaque A, Cover K (2015) Third-party auditor (tpa): a potential solution for securing a cloud environment. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp 31\u201336. IEEE","DOI":"10.1109\/CSCloud.2015.87"},{"key":"2057_CR15","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"1","key":"2057_CR16","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","volume":"2","author":"B Wang","year":"2014","unstructured":"Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43\u201356","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"2057_CR17","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Foren Secur 12(4):767\u2013778","journal-title":"IEEE Trans Inf Foren Secur"},{"issue":"1","key":"2057_CR18","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/JSYST.2019.2923238","volume":"14","author":"R Ding","year":"2020","unstructured":"Ding R, Xu Y, Cui J, Zhong H (2020) A public auditing protocol for cloud storage system with intrusion-resilience. IEEE Syst J 14(1):633\u2013644","journal-title":"IEEE Syst J"},{"issue":"12","key":"2057_CR19","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1049\/iet-com.2013.0898","volume":"8","author":"K Huang","year":"2014","unstructured":"Huang K, Xian M, Fu S, Liu J (2014) Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor. IET Commun 8(12):2106\u20132113","journal-title":"IET Commun"},{"key":"2057_CR20","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.future.2022.01.019","volume":"131","author":"L Chen","year":"2022","unstructured":"Chen L, Fu Q, Mu Y, Zeng L, Rezaeibagha F, Hwang M-S (2022) Blockchain-based random auditor committee for integrity verification. Future Gener Comput Syst 131:183\u2013193","journal-title":"Future Gener Comput Syst"},{"key":"2057_CR21","doi-asserted-by":"crossref","unstructured":"Qi H, Li H, Huang S, Li P, Dai W, Wang C (2022) Integrity audit method for cloud data based on blockchain. In: 2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), pp 652\u2013659. IEEE","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00089"},{"issue":"26","key":"2057_CR22","doi-asserted-by":"publisher","first-page":"34517","DOI":"10.1007\/s11042-020-08776-y","volume":"80","author":"D Lee","year":"2021","unstructured":"Lee D, Park N (2021) Blockchain based privacy preserving multimedia intelligent video surveillance using secure merkle tree. Multimed Tools Appl 80(26):34517\u201334534","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"2057_CR23","first-page":"2556","volume":"24","author":"X Li","year":"2023","unstructured":"Li X, Shang S, Liu S, Gu K, Jan MA, Zhang X, Khan F (2023) An identity-based data integrity auditing scheme for cloud-based maritime transportation systems. IEEE Trans Intell Transport Syst 24(2):2556\u20132567","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"5","key":"2057_CR24","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1109\/JBHI.2021.3128775","volume":"27","author":"Z Xu","year":"2021","unstructured":"Xu Z, He D, Vijayakumar P, Gupta BB, Shen J (2021) Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical wsns. IEEE J Biomed Health Inf 27(5):2334\u20132344","journal-title":"IEEE J Biomed Health Inf"},{"issue":"4","key":"2057_CR25","doi-asserted-by":"publisher","first-page":"5333","DOI":"10.1109\/TNSM.2022.3189650","volume":"19","author":"X Zhang","year":"2022","unstructured":"Zhang X, Wang X, Gu D, Xue J, Tang W (2022) Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems. IEEE Trans Netw Serv Manage 19(4):5333\u20135347","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2057_CR26","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317","volume-title":"Pors: Proofs of retrievability for large files","author":"A Juels","year":"2007","unstructured":"Juels A, Kaliski B (2007) Pors: Proofs of retrievability for large files. IACR Cryptology ePrint Archive, IACR Cryptology ePrint Archive"},{"key":"2057_CR27","doi-asserted-by":"crossref","unstructured":"Zhang Y, Xu C, Liang X, Li H, Mu Y, Zhang X (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Foren Secur, 676\u2013688","DOI":"10.1109\/TIFS.2016.2631951"},{"key":"2057_CR28","doi-asserted-by":"crossref","unstructured":"Li S, Xu C, Zhang Y, Du Y, Chen K (2022) Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans Serv Comput, 1\u20131","DOI":"10.1109\/TSC.2022.3144430"},{"issue":"13","key":"2057_CR29","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1109\/JIOT.2021.3130291","volume":"9","author":"Y Li","year":"2022","unstructured":"Li Y, Zhang F (2022) An efficient certificate-based data integrity auditing protocol for cloud-assisted wbans. IEEE Internet Things J 9(13):11513\u201311523","journal-title":"IEEE Internet Things J"},{"key":"2057_CR30","unstructured":"Huang L, Zhou J, Zhang G, Sun J, Wei T, Yu S, Hu S (2022) Ipanm: Incentive public auditing scheme for non-manager groups in clouds. IEEE Trans Depend Secur Comput 19(2):936\u2013952"},{"key":"2057_CR31","doi-asserted-by":"crossref","unstructured":"Guan X, Chang J, Zhang W (2024) Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage. Comput Commun 224:285\u2013301","DOI":"10.1016\/j.comcom.2024.06.013"},{"key":"2057_CR32","doi-asserted-by":"publisher","unstructured":"Huang Y, Shen W, Qin J (2024) Certificateless cloud storage auditing supporting data ownership transfer. Comput Secur 139:103738 https:\/\/doi.org\/10.1016\/j.cose.2024.103738","DOI":"10.1016\/j.cose.2024.103738"},{"key":"2057_CR33","doi-asserted-by":"crossref","unstructured":"Huang Y, Shen W, Qin J, Hou H (2023) Privacy-preserving certificateless public auditing supporting different auditing frequencies. Comput Secur 128:103181","DOI":"10.1016\/j.cose.2023.103181"},{"key":"2057_CR34","doi-asserted-by":"crossref","unstructured":"Liu Z, Wang S, Liu Y (2023) Blockchain-based integrity auditing for shared data in cloud storage with file prediction. Comput Netw 236:110040","DOI":"10.1016\/j.comnet.2023.110040"},{"key":"2057_CR35","doi-asserted-by":"crossref","unstructured":"Liu Q, Zhang X, Xue J, Zhou R, Wang X, Tang W (2023) Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems. J Syst Architect, 102898","DOI":"10.1016\/j.sysarc.2023.102898"},{"issue":"4","key":"2057_CR36","doi-asserted-by":"publisher","first-page":"3688","DOI":"10.1109\/TDSC.2023.3335413","volume":"21","author":"Y Miao","year":"2024","unstructured":"Miao Y, Gai K, Zhu L, Choo KR, Vaidya J (2024) Blockchain-based shared data integrity auditing and deduplication. IEEE Trans Depend Secur Comput 21(4):3688\u20133703","journal-title":"IEEE Trans Depend Secur Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02057-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02057-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02057-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:50Z","timestamp":1758986570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02057-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2057"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02057-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"22 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"233"}}