{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:12Z","timestamp":1750220232123,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["62172328, U20A20175, U1808207"],"award-info":[{"award-number":["62172328, U20A20175, U1808207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Blockchain Core Technology Strategic Research Program of Ministry of Education","award":["2020KJ010801"],"award-info":[{"award-number":["2020KJ010801"]}]},{"name":"Natural Science Foundation of Shaanxi Province of China","award":["2021JM-344"],"award-info":[{"award-number":["2021JM-344"]}]},{"name":"Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data","award":["IPBED7"],"award-info":[{"award-number":["IPBED7"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1402700"],"award-info":[{"award-number":["2018YFB1402700"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>Cloud computing is an essential technique to provide item traceability for industrial internet of things (IIoT) systems by providing item data sharing services. However, a malicious cloud server may prevent industrial participants from acquiring accurate traceability of items by providing inconsistent item data. To fix this issue, we propose Acics, an item data consistency auditing scheme in untrusted cloud services for cloud-aided IIoT systems. Acics presents two variants named S-Acics and L-Acics. S-Acics enables industrial participants to audit item data consistency for each item and circularly play the auditing role. L-Acics further enables industrial participants to audit item data consistency for a sampled subset of items while resisting data selection attack via a new separated storage mechanism. Finally, Acics integrates a fair payment mechanism built on smart contract to incentivize the cloud server to provide consistent item data access service for industrial participants. The experiment results show that our solution can audit item data consistency with reasonable cost.<\/jats:p>","DOI":"10.1145\/3522740","type":"journal-article","created":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T11:54:49Z","timestamp":1651751689000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure and Efficient Item Traceability for Cloud-Aided IIoT"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4432","authenticated-orcid":false,"given":"Saiyu","family":"Qi","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-9205","authenticated-orcid":false,"given":"Wei","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, Shannxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8593-0706","authenticated-orcid":false,"given":"Jingxian","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3096-687X","authenticated-orcid":false,"given":"Yuanqing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6518-3130","authenticated-orcid":false,"given":"Zhou","family":"Su","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3390-7429","authenticated-orcid":false,"given":"Jingning","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7682-5653","authenticated-orcid":false,"given":"Yong","family":"Qi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,29]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407598"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystemseng.2013.09.006"},{"key":"e_1_3_1_4_2","unstructured":"Retrieved Jan. 2021 from https:\/\/www.forbes.com\/sites\/williamhaseltine\/2020\/11\/09\/are-frozen-foods-a-risk-for-covid-19-infection-possibly\/?sh=aabbc8f3a01c."},{"key":"e_1_3_1_5_2","unstructured":"Retrieved Jan. 2021 from https:\/\/www.forbes.com\/sites\/robertglatter\/2020\/08\/23\/covid-19-coronavirus-can-survive-on-frozen-meat-and-fish-for-up-to-3-weeks-study-finds\/?sh=706c85c68877."},{"issue":"1","key":"e_1_3_1_6_2","article-title":"Internet of Things in smart grid: Architecture, applications, services, key technologies, and challenges.","volume":"4","author":"Ghasempour A.","year":"2019","unstructured":"A. Ghasempour. 2019. Internet of Things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions Journal 4, 1 (2019), 1\u201312.","journal-title":"Inventions Journal"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"M. Ma D. He N. Kumar et\u00a0al. 2018. Certificateless searchable public key encryption scheme for industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics 14 2 (2018) 759\u2013767.","DOI":"10.1109\/TII.2017.2703922"},{"key":"e_1_3_1_8_2","volume-title":"Proceedings of the Usenix Atc","author":"Popa P.","year":"2010","unstructured":"P. Popa, J. Lorch, and D. Molnar. 2010. Enabling security in cloud storage SLAs with CloudProof. In Proceedings of the Usenix Atc. 31\u201331."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2998166"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3020979"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2908164"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2536626"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.59"},{"key":"e_1_3_1_14_2","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation","author":"Hu Y.","year":"2020","unstructured":"Y. Hu, S. Kumar, and R. A. Popa. 2020. Ghostor: Toward a secure data-sharing system from decentralized trust. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation."},{"issue":"3","key":"e_1_3_1_15_2","volume":"43","author":"Oded Goldreich R. O. Software Protection and Simulation on Oblivious RAMs[M].","year":"1996","unstructured":"Oded Goldreich R. O. Software Protection and Simulation on Oblivious RAMs[M]. Journal of the ACM (JACM) 43, 3 (1996), 431\u2013473.","journal-title":"Journal of the ACM (JACM)"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_1_17_2","unstructured":"Retrieved Aug. 2021 from https:\/\/cloud.oracle.com\/en_US\/manufacturing-cloud."},{"key":"e_1_3_1_18_2","unstructured":"Retrieved Aug. 2021 from https:\/\/www.ibm.com\/cloud\/services."},{"key":"e_1_3_1_19_2","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)","author":"Feldman A. J.","year":"2010","unstructured":"A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. 2010. SPORC: Group Collaboration using Untrusted Cloud Resources[C]. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)."},{"key":"e_1_3_1_20_2","volume-title":"Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop","author":"Shraer A.","year":"2010","unstructured":"A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket. 2010. Venus: Auditing for untrusted cloud storage. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM."},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"P. Mahajan S. Setty S. Lee A. Clement L. Alvisi M. Dahlin and M. Walfish. 2011. Depot: Cloud storage with minimal trust[J]. ACM Transactions on Computer Systems (TOCS) 29 4 (2011) 1\u201338.","DOI":"10.1145\/2063509.2063512"},{"volume-title":"Proceedings of the 2009 IEEE\/IFIP International Conference on Dependable Systems & Networks","author":"Cachin Christian","key":"e_1_3_1_22_2","unstructured":"Christian Cachin, Idit Keidar, Alexander Shraer. Fail-Aware Untrusted Storage. In Proceedings of the 2009 IEEE\/IFIP International Conference on Dependable Systems & Networks. IEEE, 2009."},{"issue":"2018","key":"e_1_3_1_23_2","article-title":"Verifying the consistency of remote untrusted services with conflict-free operations.","volume":"260","author":"Cachin C.","year":"2018","unstructured":"C. Cachin and O. Ohrimenko. 2018. Verifying the consistency of remote untrusted services with conflict-free operations. Information & Computation 260 (2018), 72\u201388.","journal-title":"Information & Computation"},{"key":"e_1_3_1_24_2","volume-title":"CoRR","author":"Goodrich M. T.","year":"2010","unstructured":"M. T. Goodrich and M. Mitzenmacher. 2010. MapReduce Parallel Cuckoo Hashing and Oblivious RAM Simulations. CoRR, abs\/1007.1259."},{"key":"e_1_3_1_25_2","volume-title":"Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics","author":"Goodrich M. T.","year":"2011","unstructured":"M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia. 2011. Privacy-preserving group data access via stateless oblivious RAM simulation[J]. In Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics. 157\u2013167."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046680"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.13"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455790"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382299"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382229"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.01.002"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139558"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.24"},{"key":"e_1_3_1_34_2","volume-title":"In Proceedings of the Conference on Theory of Cryptography","author":"Boyle E.","year":"2016","unstructured":"E. Boyle, K. M. Chung, and R. Pass. 2016. Oblivious parallel RAM and applications. In Proceedings of the Conference on Theory of Cryptography. Springer, Berlin."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.28"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3119896"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3079762"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2948914"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24313"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3010010"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360726"},{"key":"e_1_3_1_42_2","unstructured":"CDC. 2016. Estimates of Foodborne Illness in the United States . Retrieved Feb. 2020 from https:\/\/www.cdc.gov\/foodborneburden\/estimatesoverview.html."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522740","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3522740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:16Z","timestamp":1750188616000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3522740"],"URL":"https:\/\/doi.org\/10.1145\/3522740","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2021-09-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}