{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:28:57Z","timestamp":1778344137962,"version":"3.51.4"},"reference-count":117,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11771407"],"award-info":[{"award-number":["11771407"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chinese Academy of Engineering Advisory Project","award":["2020-ZD-16"],"award-info":[{"award-number":["2020-ZD-16"]}]},{"name":"MOST Innovation Method Project","award":["2019IM050400"],"award-info":[{"award-number":["2019IM050400"]}]},{"DOI":"10.13039\/501100004605","name":"Key Discipline Construction Projects of Zhengzhou University","doi-asserted-by":"publisher","award":["XKZDQY202004"],"award-info":[{"award-number":["XKZDQY202004"]}],"id":[{"id":"10.13039\/501100004605","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3009876","type":"journal-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T20:04:45Z","timestamp":1594929885000},"page":"131723-131740","source":"Crossref","is-referenced-by-count":417,"title":["Data Security and Privacy Protection for Cloud Storage: A Survey"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4125-953X","authenticated-orcid":false,"given":"Pan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5392-291X","authenticated-orcid":false,"given":"Jingli","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2736886"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2596138"},{"key":"ref32","year":"2020","journal-title":"Fully Homomorphic Encryption Cloud Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01366-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_27"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0462-9"},{"key":"ref34","year":"2020","journal-title":"Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17% in 2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536498"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.052"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3529"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911166"},{"key":"ref25","year":"2019","journal-title":"Digital Economy Report"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2973623"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.208"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.022"},{"key":"ref58","first-page":"8","article-title":"Ciphertext policy attribute based encryption with efficient revocation","volume":"2","author":"liang","year":"2010"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.052"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.041"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2542813"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10868-6_17"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"271","DOI":"10.46586\/tosc.v2017.i3.271-293","article-title":"On leakage-resilient authenticated encryption with decryption leakages","volume":"2017","author":"berti","year":"2017","journal-title":"IACR Trans Symmetric Cryptol"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1945-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref47","year":"2020","journal-title":"Blockly"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2761806"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946202"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2534-z"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"ref73","year":"2020","journal-title":"Comparing File (NAS) and Block (SAN) Storage"},{"key":"ref72","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"Proc s of the IEEE"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.10.020"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705620"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2737789"},{"key":"ref77","first-page":"1","article-title":"Privacy preserving multi-party machine learning with homomorphic encryption","author":"takabi","year":"2016","journal-title":"Proc NIPS"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-017-3275-0"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.08.020"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.039"},{"key":"ref60","first-page":"272","article-title":"Directly revocable and verifiable key-policy attribute-based encryption for large universe","volume":"19","author":"ma","year":"2017","journal-title":"Int J Netw Secur"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/1250295"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.001"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2685524"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref68","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref2","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"ateniese","year":"2007","journal-title":"Proc ACM CSS"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_28"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.12.043"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2865221"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820162"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866411"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2012.113"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.12.030"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.025"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/493678"},{"key":"ref105","first-page":"28","article-title":"Identity privacy-preserving public auditing with dynamic group for secure mobile cloud storage","author":"yu","year":"2015","journal-title":"Proc NSS"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/EIDWT.2013.21"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.001"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2545668"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.11.044"},{"key":"ref102","first-page":"81","article-title":"Fine-grained outsourced data deletion scheme in cloud computing","volume":"11","author":"yang","year":"2019","journal-title":"Int J Electron Inf Eng"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2448099"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.4018\/IJTHI.2016040106"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0514-0"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.11.031"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.015"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.008"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.051"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_27"},{"key":"ref12","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Proc Crypto"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2017.10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.55"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682701"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2877177"},{"key":"ref19","article-title":"Network modernization: Essential for digital transformation and multicloud","author":"casemore","year":"2019"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.032"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2927219"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity.2017.12"},{"key":"ref80","year":"2020","journal-title":"The Growth in Connected IoT Devices Is Expected to Generate 79 4 ZB of Data in 2025"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3435-z"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2947920"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960853"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8706940"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961169"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09142202.pdf?arnumber=9142202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:08:44Z","timestamp":1641949724000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9142202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":117,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3009876","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}