{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:09:11Z","timestamp":1763341751128,"version":"3.45.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059949","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:56:20Z","timestamp":1742964980000},"page":"2719-2734","source":"Crossref","is-referenced-by-count":0,"title":["Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce"],"prefix":"10.32604","volume":"83","author":[{"given":"Yi","family":"Li","sequence":"first","affiliation":[]},{"given":"Wenying","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yu-Sheng","family":"Su","sequence":"additional","affiliation":[]},{"given":"Meiqin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"1313","article-title":"Applying cloud computing and Internet of Things technologies to develop a hydrological and subsidence monitoring platform","volume":"34","author":"Su","year":"2022","journal-title":"Sens Mater"},{"key":"ref2","first-page":"28","article-title":"Evaluating the impact of pumping on groundwater level prediction in the Chuoshui River alluvial fan using artificial intelligence techniques","volume":"8","author":"Su","year":"2024","journal-title":"Int J Interact Multimed Artif Intell"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1080\/14765284.2023.2245279","article-title":"From fiction to fact: the growing role of generative AI in business and finance","volume":"21","author":"Chen","year":"2023","journal-title":"J Chin Econ Bus Stud"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"119456","DOI":"10.1016\/j.eswa.2022.119456","article-title":"Artificial intelligence for industry 4.0: systematic review of applications, challenges, and opportunities","volume":"216","author":"Jan","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2244","DOI":"10.1109\/TCE.2024.3368206","article-title":"Next-generation consumer electronics data auditing scheme toward cloud-edge distributed and resilient machine learning","volume":"70","author":"Li","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.47672\/ajce.1487","article-title":"Artificial intelligence in transportation systems A critical review","volume":"6","author":"Bharadiya","year":"2023","journal-title":"Am J Comput Eng"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/09537325.2021.1971188","article-title":"Artificial intelligence (AI) healthcare technology innovations: the current state and challenges from a life science industry perspective","volume":"35","author":"Apell","year":"2023","journal-title":"Technol Anal Strateg Manag"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"5531","DOI":"10.3390\/app13095531","article-title":"AI-driven recommendations: a systematic review of the state of the art in E-commerce","volume":"13","author":"Necula","year":"2023","journal-title":"Appl Sci"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"66","DOI":"10.30574\/gscarr.2024.18.3.0090","article-title":"E-commerce and consumer behavior: a review of AI-powered personalization and market trends","volume":"18","author":"Raji","year":"2024","journal-title":"GSC Adv Res Rev"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1007\/s00778-022-00775-9","article-title":"Data collection and quality challenges in deep learning: a data-centric AI perspective","volume":"32","author":"Whang","year":"2023","journal-title":"VLDB J"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"12556","DOI":"10.1109\/TEM.2023.3262678","article-title":"Blockchain-based data integrity verification scheme in AIoT cloud-edge computing environment","volume":"71","author":"Li","year":"2023","journal-title":"IEEE Trans Eng Manag"},{"key":"ref12","series-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"Ateniese","year":"2007 Oct 29\u2013Nov 2"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2699909","article-title":"Dynamic provable data possession","volume":"17","author":"Erway","year":"2015","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref14","series-title":"2023 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","first-page":"254","article-title":"Parallel and batch multiple replica auditing protocol for edge computing","author":"Li","year":"2023 Dec 21\u201324"},{"key":"ref15","series-title":"Algorithms-ESA 2006: 14th Annual European Symposium","first-page":"684","article-title":"An improved construction for counting bloom filters","author":"Bonomi","year":"2006 Sep 11\u201313"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2028195","DOI":"10.1080\/17517575.2022.2028195","article-title":"A data analytic-based logistics modelling framework for E-commerce enterprise","volume":"17","author":"Verma","year":"2023","journal-title":"Enterp Inf Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"6903","DOI":"10.1109\/TEM.2023.3269601","article-title":"Determinants of E-commerce, artificial intelligence, and agile methods in small- and medium-sized enterprises","volume":"71","author":"Barata","year":"2023","journal-title":"IEEE Trans Eng Manag"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2200767","DOI":"10.1080\/17517575.2023.2200767","article-title":"A human factor approach to distribution network design for e-commerce in supply chain system: a case study","volume":"17","author":"Ogbeyemi","year":"2023","journal-title":"Enterp Inf Syst"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1989495","DOI":"10.1080\/17517575.2021.1989495","article-title":"A semantic model for enterprise application integration in the era of data explosion and globalisation","volume":"17","author":"Yu","year":"2023","journal-title":"Enterp Inf Syst"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"e18349","DOI":"10.1016\/j.heliyon.2023.e18349","article-title":"An empirical evaluation of technology acceptance model for Artificial Intelligence in E-commerce","volume":"9","author":"Wang","year":"2023","journal-title":"Heliyon"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2356770","DOI":"10.1080\/17517575.2024.2356770","article-title":"A systematic data-driven approach for targeted marketing in enterprise information system","volume":"18","author":"Upadhyay","year":"2024","journal-title":"Enterp Inf Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2311807","DOI":"10.1080\/17517575.2024.2311807","article-title":"Blockchain sharding for e-commerce supply chain performance analytics towards Industry 5.0","volume":"18","author":"Tsang","year":"2024","journal-title":"Enterp Inf Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1109\/TIFS.2023.3236451","article-title":"A certificateless provable data possession scheme for cloud-based EHRs","volume":"18","author":"Shen","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1109\/TIFS.2022.3159152","article-title":"An efficient identity-based provable data possession protocol with compressed cloud storage","volume":"17","author":"Yang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"4572","DOI":"10.1109\/TIFS.2024.3383772","article-title":"SStore: an efficient and secure provable data auditing platform for cloud","volume":"19","author":"Wang","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/TIFS.2022.3144869","article-title":"Synchronized provable data possession based on blockchain for digital twin","volume":"17","author":"Li","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3986","DOI":"10.1109\/TSC.2023.3303185","article-title":"Certificateless provable data possession scheme with provable security in the standard model suitable for cloud storage","volume":"16","author":"Deng","year":"2023","journal-title":"IEEE Trans Serv Comput"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TSC.2023.3324023","article-title":"Synchronous blockchain-based distributed provable data possession with forward-security","volume":"17","author":"Wang","year":"2024","journal-title":"IEEE Trans Serv Comput"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"6658","DOI":"10.1109\/JSYST.2022.3159847","article-title":"EPPDP: an efficient privacy-preserving data possession with provable security in cloud storage","volume":"16","author":"Dhakad","year":"2022","journal-title":"IEEE Syst J"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1912","DOI":"10.1109\/COMST.2018.2889329","article-title":"Optimizing bloom filter: challenges, solutions, and comparisons","volume":"21","author":"Luo","year":"2018","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/SURV.2011.031611.00024","article-title":"Theory and practice of bloom filters for distributed systems","volume":"14","author":"Tarkoma","year":"2012","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref32","series-title":"2019 IEEE 12th International Conference on Cloud Computing (CLOUD)","first-page":"272","article-title":"Towards latency sensitive cloud native applications: a performance study on AWS","author":"Pelle","year":"2019 Jul 8\u201313"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_59949\/TSP_CMC_59949.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:03:56Z","timestamp":1763341436000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059949","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}