{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:50:06Z","timestamp":1765547406341,"version":"3.45.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062910","type":"journal-article","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T04:20:52Z","timestamp":1742790052000},"page":"1533-1553","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing"],"prefix":"10.32604","volume":"83","author":[{"given":"Yuanhang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Mingyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaoxuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"16592","DOI":"10.1109\/TVT.2023.3295953","article-title":"A practical data audit scheme with retrievability and indistinguishable privacy-preserving for vehicular cloud computing","volume":"72","author":"Zhou","year":"2023","journal-title":"IEEE Transact Vehic Technol"},{"key":"ref2","series-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","first-page":"598","article-title":"Provable data possession at untrusted stores","author":"Ateniese","year":"2007"},{"key":"ref3","first-page":"584","author":"Juels","year":"2007","journal-title":"CCS \u201907"},{"key":"ref4","first-page":"355","volume":"5789","author":"Wang","year":"2009","journal-title":"Computer security\u2013ESORICS 2009. Lecture notes in computer science"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"15815","DOI":"10.1109\/TVT.2020.3036631","article-title":"ARFV: an efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks","volume":"69","author":"Cui","year":"2020","journal-title":"IEEE Transact Vehic Technol"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","article-title":"Privacy-preserving public auditing for secure cloud storage","volume":"62","author":"Wang","year":"2013","journal-title":"IEEE Transact Comput"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1049\/cje.2020.05.007","article-title":"Certificateless public verification for data storage and sharing in the cloud","volume":"29","author":"Huang","year":"2020","journal-title":"Chinese J Elect"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"8079","DOI":"10.1016\/j.jksuci.2022.07.020","article-title":"Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit","volume":"34","author":"Li","year":"2022","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2699909","article-title":"Dynamic provable data possession","volume":"17","author":"Erway","year":"2015 Apr","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","article-title":"Dynamic-hash-table based public auditing for secure cloud storage","volume":"10","author":"Tian","year":"2017","journal-title":"IEEE Transact Serv Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"120778","DOI":"10.1109\/ACCESS.2020.3006278","article-title":"Dynamic multiple-replica provable data possession in cloud storage system","volume":"8","author":"Yuan","year":"2020","journal-title":"IEEE Access"},{"key":"ref12","series-title":"2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/IOP\/SCI)","first-page":"357","article-title":"A cloud data integrity verification scheme based on blockchain","author":"Bai","year":"2021"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"7830508","DOI":"10.1155\/2022\/7830508","article-title":"A scalable blockchain-based integrity verification scheme","volume":"2022","author":"Zhou","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"104096","DOI":"10.1016\/j.cose.2024.104096","article-title":"Certificate-based multi-copy cloud storage auditing supporting data dynamics","volume":"148","author":"Zhou","year":"2025","journal-title":"Comput Secur"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","article-title":"Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage","volume":"12","author":"Yu","year":"2017","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref16","unstructured":"Shah MA, Swaminathan R, Baker M. Privacy-preserving audit and extraction of digital contents. Cryptology ePrint Archive. 2008; [cited 2025 Jan 20]. Available from: https:\/\/eprint.iacr.org\/2008\/186."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","article-title":"Compact proofs of retrievability","volume":"26","author":"Shacham","year":"2013","journal-title":"J Cryptol"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1788","DOI":"10.1109\/JSYST.2019.2918022","article-title":"Remote data checking with a designated verifier in cloud storage","volume":"14","author":"Yan","year":"2020","journal-title":"IEEE Syst J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TIFS.2015.2400425","article-title":"Enabling cloud storage auditing with key-exposure resistance","volume":"10","author":"Yu","year":"2015","journal-title":"IEEE Transact Inform Foren Secur"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","article-title":"An efficient and secure dynamic auditing protocol for data storage in cloud computing","volume":"24","author":"Yang","year":"2013","journal-title":"IEEE Transact Paral Distrib Syst"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","article-title":"An efficient public auditing protocol with novel dynamic structure for cloud data","volume":"12","author":"Shen","year":"2017","journal-title":"IEEE Transact Inform Forens Secur"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1049\/iet-ifs.2012.0271","article-title":"Identity-based remote data possession checking in public clouds","volume":"8","author":"Wang","year":"2014","journal-title":"IET Information Security"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1109\/TIFS.2016.2520886","article-title":"Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Transact Inform Forens Secur"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2258","DOI":"10.1109\/ACCESS.2019.2960853","article-title":"Lightweight certificate-based public\/private auditing scheme based on bilinear pairing for cloud storage","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1109\/TIFS.2023.3236451","article-title":"A certificateless provable data possession scheme for cloud-based EHRs","volume":"18","author":"Shen","year":"2023","journal-title":"IEEE Transact Inform Forens Secur"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_62910\/TSP_CMC_62910.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:41:38Z","timestamp":1763102498000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062910","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}