{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:30:25Z","timestamp":1776443425486,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"IHUB NTIHAC Foundation, Indian Institute of Technology (IIT) Kanpur","award":["IHUB-NTIHAC\/2021\/01\/3"],"award-info":[{"award-number":["IHUB-NTIHAC\/2021\/01\/3"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3703790.3703806","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:30:00Z","timestamp":1744115400000},"page":"137-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Certificateless Data Auditing Scheme for Fog-CPSs with Audit Verification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6466-1380","authenticated-orcid":false,"given":"Rajdeep","family":"Mistri","sequence":"first","affiliation":[{"name":"Indian Institute of Information Technology Allahabad, Prayagraj, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0388-7068","authenticated-orcid":false,"given":"Shahnaz","family":"Warsi","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad, Prayagraj, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0522-5503","authenticated-orcid":false,"given":"Junaid","family":"Alam","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad, Prayagraj, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1462-7608","authenticated-orcid":false,"given":"Soumyadev","family":"Maity","sequence":"additional","affiliation":[{"name":"Indian Institute of Information Technology Allahabad, Prayagraj, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_3_1_6_2","unstructured":"Manohar\u00a0Sai Burra and Soumyadev Maity. 2023. A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks. IEEE Access (2023)."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Manohar\u00a0Sai Burra Soumyadev Maity et\u00a0al. 2022. Certificateless reliable and privacy-preserving auditing of group shared data for fog-cpss. Security and Communication Networks 2022 (2022).","DOI":"10.1155\/2022\/6705948"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Guangming Cui Qiang He Bo Li Xiaoyu Xia Feifei Chen Hai Jin Yang Xiang and Yun Yang. 2021. Efficient verification of edge data integrity in edge computing environment. IEEE Transactions on Services Computing 15 6 (2021) 3233\u20133244.","DOI":"10.1109\/TSC.2021.3090173"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.5555\/648186.750067"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Ke Gu WenBin Zhang XingQiang Wang Xiong Li and WeiJia Jia. 2023. Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage with Distributed Collaborative Verification. IEEE Transactions on Network and Service Management (2023).","DOI":"10.1109\/TNSM.2023.3267235"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Jaya\u00a0Rao Gudeme Syamkumar Pasupuleti and Ramesh Kandukuri. 2021. Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage. J. Parallel and Distrib. Comput. (2021).","DOI":"10.1016\/j.jpdc.2021.06.001"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Antoine Joux and Kim Nguyen. 2003. Separating decision Diffie\u2013Hellman from computational Diffie\u2013Hellman in cryptographic groups. Journal of cryptology 16 (2003) 239\u2013247.","DOI":"10.1007\/s00145-003-0052-4"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Bo Li Qiang He Feifei Chen Haipeng Dai Hai Jin Yang Xiang and Yun Yang. 2021. Cooperative assurance of cache data integrity for mobile edge computing. IEEE Transactions on Information Forensics and Security 16 (2021) 4648\u20134662.","DOI":"10.1109\/TIFS.2021.3111747"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Bo Li Qiang He Feifei Chen Hai Jin Yang Xiang and Yun Yang. 2020. Auditing cache data integrity in the edge computing environment. IEEE Transactions on Parallel and Distributed Systems 32 5 (2020) 1210\u20131223.","DOI":"10.1109\/TPDS.2020.3043755"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Bo Li Qiang He Feifei Chen Hai Jin Yang Xiang and Yun Yang. 2021. Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment. IEEE Transactions on Cloud Computing 10 4 (2021) 2691\u20132703.","DOI":"10.1109\/TCC.2021.3059448"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Jiguo Li Hao Yan and Yichen Zhang. 2018. Certificateless public integrity checking of group shared data on cloud storage. IEEE Transactions on Services Computing 14 1 (2018) 71\u201381.","DOI":"10.1109\/TSC.2018.2789893"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Yanping Li Zirui Li Bo Yang and Yong Ding. 2023. Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT. IEEE Transactions on Cloud Computing 11 3 (2023) 3184\u20133196. 10.1109\/TCC.2023.3266593","DOI":"10.1109\/TCC.2023.3266593"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22301-3_12"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Dengzhi Liu Zhimin Li and Dongbao Jia. 2023. Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing. Cyber Security and Applications (2023). 10.1016\/j.csa.2022.100004","DOI":"10.1016\/j.csa.2022.100004"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"M\u00a0Carmen Lucas-Estan Baldomero Coll-Perales and Javier Gozalvez. 2020. Redundancy and diversity in wireless networks to support mobile industrial applications in industry 4.0. IEEE Transactions on Industrial Informatics (2020).","DOI":"10.1109\/TII.2020.2979759"},{"key":"e_1_3_3_1_21_2","volume-title":"PhD Thesis","author":"Lynn B.","year":"2007","unstructured":"B. Lynn. 2007. On the Implementation of Pairing-Based Cryptography. In PhD Thesis. https:\/\/crypto.stanford.edu\/pbc\/thesis.pdf"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"Tongtong Sang Peng Zeng and Kim-Kwang\u00a0Raymond Choo. 2023. Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT. IEEE Systems Journal 17 1 (2023) 224\u2013233. 10.1109\/JSYST.2022.3198098","DOI":"10.1109\/JSYST.2022.3198098"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Wenting Shen Jing Qin Jia Yu Rong Hao and Jiankun Hu. 2018. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security 14 2 (2018) 331\u2013346.","DOI":"10.1109\/TIFS.2018.2850312"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Jun-Feng Tian and Hao-Ning Wang. 2020. An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios. International Journal of Distributed Sensor Networks 16 5 (2020) 1550147720916623.","DOI":"10.1177\/1550147720916623"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00104"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Yong Yu Man\u00a0Ho Au Giuseppe Ateniese Xinyi Huang Willy Susilo Yuanshun Dai and Geyong Min. 2016. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security 12 4 (2016) 767\u2013778.","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Xingjun Zhang and Wei Si. 2020. Efficient auditing scheme for secure data storage in fog-to-cloud computing. IEEE Access 9 (2020) 37951\u201337960.","DOI":"10.1109\/ACCESS.2020.2971630"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Yue Zhang Jia Yu Rong Hao Cong Wang and Kui Ren. 2018. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Transactions on Dependable and Secure computing 17 3 (2018) 608\u2013619.","DOI":"10.1109\/TDSC.2018.2829880"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Yue Zhang Jia Yu Rong Hao Cong Wang and Kui Ren. 2018. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Transactions on Dependable and Secure computing 17 3 (2018) 608\u2013619.","DOI":"10.1109\/TDSC.2018.2829880"}],"event":{"name":"IoT 2024: 14th International Conference on the Internet of Things","location":"Oulu Finland","acronym":"IoT 2024"},"container-title":["Proceedings of the 14th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703790.3703806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:42Z","timestamp":1750295382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":28,"alternative-id":["10.1145\/3703790.3703806","10.1145\/3703790"],"URL":"https:\/\/doi.org\/10.1145\/3703790.3703806","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2025-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}