{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:23:59Z","timestamp":1761719039912,"version":"3.37.3"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"],"award-info":[{"award-number":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Science and Technology Coordination and Innovation Project","award":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"],"award-info":[{"award-number":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"],"award-info":[{"award-number":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"],"award-info":[{"award-number":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"],"award-info":[{"award-number":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005320","name":"Xidian University","doi-asserted-by":"publisher","award":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"],"award-info":[{"award-number":["U1405255","61702404","61702105","2016TZC-G-6-3","2017M613080","JB171504","JB191506","2019JQ-005","20109194858"]}],"id":[{"id":"10.13039\/501100005320","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,5,8]]},"abstract":"<jats:p>With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.<\/jats:p>","DOI":"10.1155\/2021\/6662135","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T18:35:05Z","timestamp":1620498905000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Audit Outsourced Data in Internet of Things"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6043-4167","authenticated-orcid":true,"given":"Gaopan","family":"Hou","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1679-5800","authenticated-orcid":true,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1934-2129","authenticated-orcid":true,"given":"Jiayi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0938-2880","authenticated-orcid":true,"given":"Chen","family":"Liang","sequence":"additional","affiliation":[{"name":"PLA 94860 Troops, Nanjing 210000, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.018"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2897675"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2935044"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2940573"},{"key":"7"},{"key":"8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3911"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/bf01185212"},{"first-page":"584","article-title":"PORs: proofs of retrievability for large files","author":"A. Juels","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"first-page":"598","article-title":"Provable data possession at untrusted stores","author":"G. Ateniese","key":"14"},{"first-page":"1","article-title":"Scalable and efficient provable data possession","author":"G. Ateniese","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2699909"},{"first-page":"1","article-title":"Ensuring data storage security in Cloud Computing","author":"C. Wang","key":"17"},{"first-page":"1","article-title":"Privacy-preserving public auditing for data storage security in cloud computing","author":"C. Wang","key":"18"},{"issue":"5","key":"19","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","article-title":"Enabling public auditability and data dynamics for storage security in cloud computing","volume":"22","author":"Q. Wang","year":"2010","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.66"},{"issue":"9","key":"21","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","article-title":"An efficient and secure dynamic auditing protocol for data storage in cloud computing","volume":"24","author":"K. Yang","year":"2012","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"first-page":"831","article-title":"Outsourced proofs of retrievability","author":"F. Armknecht","key":"22"},{"issue":"9","key":"23","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1109\/TC.2014.2375190","article-title":"MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud","volume":"64","author":"C. Liu","year":"2014","journal-title":"IEEE Transactions on Computers"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_11"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2520886"},{"issue":"5","key":"26","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1109\/TPDS.2017.2784423","article-title":"Auditing big data storage in cloud computing using divide and conquer tables","volume":"29","author":"M. Sookhak","year":"2017","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700379"},{"issue":"2","key":"28","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","article-title":"Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage","volume":"14","author":"W. Shen","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"29","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TSC.2017.2708116","article-title":"Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated Merkle hash tree","volume":"13","author":"L. Rao","year":"2017","journal-title":"IEEE Transactions on Services Computing"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1976.1055638"},{"first-page":"224","article-title":"Discrete logarithms in finite fields and their cryptographic significance","author":"A. M. Odlyzko","key":"32"},{"first-page":"122","article-title":"Protocols for public key cryptosystems","author":"R. C. Merkle","key":"33"},{"key":"34","unstructured":"NakamotoS.Bitcoin: a peer-to-peer electronic cash system, Manubot2019Technical Report"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2019040104"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6662135.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6662135.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6662135.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T18:35:24Z","timestamp":1620498924000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6662135\/"}},"subtitle":[],"editor":[{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":35,"alternative-id":["6662135","6662135"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6662135","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,5,8]]}}}