{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:24:45Z","timestamp":1774023885741,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Australian Research Council Discovery","award":["DP180100212"],"award-info":[{"award-number":["DP180100212"]}]},{"name":"Australian Research Council Discovery","award":["DP200102491"],"award-info":[{"award-number":["DP200102491"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tcc.2021.3059448","type":"journal-article","created":{"date-parts":[[2021,2,16]],"date-time":"2021-02-16T21:20:28Z","timestamp":1613510428000},"page":"2691-2703","source":"Crossref","is-referenced-by-count":60,"title":["Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3226-388X","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-4556","authenticated-orcid":false,"given":"Qiang","family":"He","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5455-3792","authenticated-orcid":false,"given":"Feifei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7868-5471","authenticated-orcid":false,"given":"Yun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2384391"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0052-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(98)00167-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2917900"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","article-title":"Security and privacy issues of fog computing: A survey","author":"yi","year":"2015","journal-title":"Proc Int Conf Wireless Algorithms Syst Appl"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869966"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00027"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33702-5_37"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.30"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2512589"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3008440"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid49817.2020.00-85"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155365"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","article-title":"A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability","volume":"23","author":"hao","year":"2011","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.191"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2902090"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2871147"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737385"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375190"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2841758"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3043755"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00104"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2587242"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869954"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3016344"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3015316"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3010521"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2604803"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3055559"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2938944"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33702-5_8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD49709.2020.00037"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3008448"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2929045"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_15"},{"key":"ref43","article-title":"Standards for efficient cryptography sec 2: Recommended elliptic curve domain parameters","author":"brown","year":"2010"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9970353\/09354962.pdf?arnumber=9354962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:14:24Z","timestamp":1672082064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9354962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":56,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2021.3059448","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}