{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:05Z","timestamp":1776926345923,"version":"3.51.2"},"reference-count":17,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064247","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T03:54:28Z","timestamp":1751601268000},"page":"5509-5525","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["C-BIVM: A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities"],"prefix":"10.32604","volume":"84","author":[{"given":"Radhika","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Kiranbir","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Almogren","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Altameem","sequence":"additional","affiliation":[]},{"given":"Salil","family":"Bharany","sequence":"additional","affiliation":[]},{"given":"Yazeed Yasin","family":"Ghadi","sequence":"additional","affiliation":[]},{"given":"Ateeq Ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"145485","DOI":"10.1109\/ACCESS.2023.3343841","article-title":"ZSS signature-based audit message verification process for cloud data integrity","volume":"11","author":"Goswami","year":"2023","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","article-title":"A new lightweight cryptographic algorithm for enhancing data security in cloud computing","volume":"2","author":"Thabit","year":"2021","journal-title":"Glob Transit Proc"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"5372","DOI":"10.1109\/TNET.2024.3462539","article-title":"Symbiotic blockchain consensus: cognitive backscatter communications-enabled wireless blockchain consensus","volume":"32","author":"Luo","year":"2024","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref4","first-page":"67","volume":"463","author":"Ibrahim","year":"2023","journal-title":"Emerging technologies in computing. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"58502","DOI":"10.1109\/ACCESS.2024.3389076","article-title":"Stub signature-based efficient public data auditing system using dynamic procedures in cloud computing","volume":"12","author":"Goswami","year":"2024","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"19929","DOI":"10.1109\/JIOT.2025.3542428","article-title":"Cloud-edge collaboration for industrial Internet of Things: scalable neurocomputing and rolling-horizon optimization","volume":"12","author":"Li","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/TNSE.2021.3068261","article-title":"Efficient continuous big data integrity checking for decentralized storage","volume":"8","author":"Yu","year":"2021","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref8","first-page":"10","article-title":"Remote data integrity verification system for cloud computing based on efficient signature","volume":"6","author":"Hameed","year":"2023","journal-title":"Int J Tech Sci Res Eng"},{"key":"ref9","first-page":"382","article-title":"Provable data possession scheme based on algebraic signature and linked list for outsourced dynamic data on cloud storage","volume":"10","author":"Panhwer","year":"2021","journal-title":"Int J Sci Technol Res"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1109\/TCC.2023.3266593","article-title":"Algebraic signature-based public data integrity batch verification for cloud-IoT","volume":"11","author":"Li","year":"2023","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref11","first-page":"104011","article-title":"One multi-receiver certificateless searchable public key encryption scheme for IoMT assisted by LLM","volume":"90","author":"Liu","year":"2025","journal-title":"J Inf Secur Appl"},{"key":"ref12","first-page":"180","article-title":"A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves","volume":"18","author":"Kavin","year":"2021","journal-title":"Int Arab J Inf Technol"},{"key":"ref13","series-title":"2020 11th International Conference on Prognostics and System Health Management (PHM-2020 Jinan)","first-page":"11","article-title":"Algebraic signature based data possession checking method with cloud storage","author":"Wang","year":"2020 Oct\n\n23\u201325"},{"key":"ref14","first-page":"8533995","article-title":"Public auditing scheme for integrity verification in distributed cloud storage system","volume":"2021","author":"Mahalakshmi","year":"2021","journal-title":"Sci Program"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.1109\/TCC.2021.3059448","article-title":"Inspecting edge data integrity with aggregate signature in distributed edge computing environment","volume":"10","author":"Li","year":"2022","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3295","DOI":"10.1109\/TIFS.2020.2986879","article-title":"An adaptive authenticated data structure with privacy-preserving for big data stream in cloud","volume":"15","author":"Sun","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"e0241236","DOI":"10.1371\/journal.pone.0241236","article-title":"An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage","volume":"15","author":"ALmarwani","year":"2020","journal-title":"PLoS One"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64247\/TSP_CMC_64247.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:32Z","timestamp":1776923132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":17,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064247","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}