{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T13:37:49Z","timestamp":1770730669511,"version":"3.49.0"},"reference-count":44,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T00:00:00Z","timestamp":1768867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62261023"],"award-info":[{"award-number":["62261023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["72262014"],"award-info":[{"award-number":["72262014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangxi Natural Science Foundation of China","award":["20232BAB2"],"award-info":[{"award-number":["20232BAB2"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an alliance chain-driven multi-cloud storage and verifiable deletion method for smart grid data is proposed. By leveraging the synergy between alliance blockchain and multi-cloud architecture, the encrypted power data originating from edge nodes is dispersed across a decentralized multi-cloud infrastructure, which effectively mitigates the danger of data loss resulting from single-point failures or malicious intrusions. The removal of expired and user-defined data is guaranteed through a transaction deletion algorithm integrated into the indexed storage deletion chain and strengthens the flexibility and security of the storage architecture. Based on the Practical Byzantine Fault-Tolerant Consensus Protocol with Ultra-Low Storage Overhead (ULS-PBFT), by the hierarchical grouping of nodes, the system communication overhead and storage overhead are reduced. Security analysis proves that the scheme can resist tampering attacks, impersonation attacks, collusion attacks, double spend attacks, and replay attacks. Performance evaluation shows that the scheme improves compared to similar methods.<\/jats:p>","DOI":"10.3390\/fi18010056","type":"journal-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T11:27:58Z","timestamp":1768908478000},"page":"56","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MCS-VD: Alliance Chain-Driven Multi-Cloud Storage and Verifiable Deletion Scheme for Smart Grid Data"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5353-6875","authenticated-orcid":false,"given":"Lihua","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"}]},{"given":"Jiali","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"}]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"}]},{"given":"Wenbiao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China"}]}],"member":"1968","published-online":{"date-parts":[[2026,1,20]]},"reference":[{"key":"ref_1","first-page":"012004","article-title":"Latest advancements in smart grid technologies and their transformative role in shaping the power systems of tomorrow: An overview","volume":"7","author":"Hannan","year":"2024","journal-title":"Prog. Energy"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1186\/s42400-023-00200-w","article-title":"Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges","volume":"7","author":"Achaal","year":"2024","journal-title":"Cybersecurity"},{"key":"ref_3","first-page":"1","article-title":"Cost optimization for cloud storage from user perspectives: Recent advances, taxonomy, and survey","volume":"55","author":"Liu","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Khan, M.R., Haider, Z.M., Malik, F.H., Almasoudi, F.M., Alatawi, K.S.S., and Bhutta, M.S. (2024). A comprehensive review of microgrid energy management strategies considering electric vehicles, energy storage systems, and AI techniques. Processes, 12.","DOI":"10.3390\/pr12020270"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"19181","DOI":"10.1109\/ACCESS.2024.3361752","article-title":"Securing smart grid data with blockchain and wireless sensor networks: A collaborative approach","volume":"12","author":"Almasabi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3700641","article-title":"A review on blockchain technology, current challenges, and ai-driven solutions","volume":"57","author":"Abdelhamid","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1109\/TSC.2023.3238690","article-title":"A lightweight model-based evolutionary consensus protocol in blockchain as a service for IoT","volume":"16","author":"Zhao","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Chen, J., Luo, X., and Yu, Y. (2026). UB-MCSVD: Smart Grid Multi-cloud Storage and Verifiable Deletion Scheme Based on ULS-PBFT Consensus. Blockchain and Trustworthy Systems, Springer. Communications in Computer and Information Science.","DOI":"10.1007\/978-981-95-3483-8"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"100155","DOI":"10.1016\/j.bcra.2023.100155","article-title":"ULS-PBFT: An ultra-low storage overhead PBFT consensus for blockchain","volume":"4","author":"Luo","year":"2023","journal-title":"Blockchain Res. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3645104","article-title":"Blockchain data storage optimisations: A comprehensive survey","volume":"56","author":"Heo","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_11","first-page":"4933","article-title":"Data security storage mechanism based on blockchain network","volume":"74","author":"Wang","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"69383","DOI":"10.1109\/ACCESS.2024.3401591","article-title":"Secure remote sensing data with blockchain distributed ledger technology: A solution for smart cities","volume":"12","author":"Khan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2200","DOI":"10.1080\/00207543.2019.1680899","article-title":"Blockchain-based ubiquitous manufacturing: A secure and reliable cyber-physical system","volume":"58","author":"Barenji","year":"2019","journal-title":"Int. J. Prod. Res."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"116560","DOI":"10.1016\/j.apenergy.2021.116560","article-title":"A multi-time-scale autonomous energy trading framework within distribution networks based on blockchain","volume":"287","author":"Wu","year":"2021","journal-title":"Appl. Energy"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","article-title":"Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks","volume":"6","author":"Gai","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Chenthara, S., Ahmed, K., Wang, H., Whittaker, F., and Chen, Z. (2020). Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology. PLoS ONE, 15.","DOI":"10.1371\/journal.pone.0243043"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ma, Y., Su, H., Zhou, X., and Tu, F. (2022, January 7\u201310). Research on data security and privacy protection of smart grid based on alliance chain. Proceedings of the 2022 IEEE International Conference on Mechatronics and Automation (ICMA), Guilin, China.","DOI":"10.1109\/ICMA54519.2022.9856311"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"107720","DOI":"10.1016\/j.ijepes.2021.107720","article-title":"A specialized review on outlook of future Cyber-Physical Power System (CPPS) testbeds for securing electric power grid","volume":"136","author":"Yohanandhan","year":"2022","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"30847","DOI":"10.1109\/JIOT.2024.3415676","article-title":"Private Blockchain-Assisted Certificateless Public Key Encryption with Multi-Keyword Search for Fog-Based IIoT Environments","volume":"11","author":"Ghosh","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_20","first-page":"29","article-title":"Blockchain and IPFS based Secure System for Managing e-FIR","volume":"15","author":"Uddin","year":"2023","journal-title":"Int. J. Inf. Eng. Electron. Bus."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Naz, M., Al-Zahrani, F.A., Khalid, R., Javaid, N., Qamar, A.M., Afzal, M.K., and Shafiq, M. (2019). A secure data sharing platform using blockchain and interplanetary file system. Sustainability, 11.","DOI":"10.3390\/su11247054"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1007\/s10586-023-04038-2","article-title":"Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS","volume":"27","author":"Kaur","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ins.2019.02.038","article-title":"Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain","volume":"485","author":"Cao","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"37687","DOI":"10.1007\/s11042-023-17060-8","article-title":"Improved encryption and obfuscation process of lightweight secured auditable cloud storage with data dynamics","volume":"83","author":"Singh","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.tcs.2022.04.018","article-title":"Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques","volume":"922","author":"Ahire","year":"2022","journal-title":"Theor. Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7700","DOI":"10.1007\/s11227-021-04179-4","article-title":"Blockchain-based cloud storage system with CP-ABE-based access control and revocation process","volume":"78","author":"Sharma","year":"2022","journal-title":"J. Supercomput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.ins.2020.08.031","article-title":"Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system","volume":"545","author":"Zhou","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Rahman, A., Islam, J., Khan, S.I., Kabir, S., Pritom, A.I., and Karim, R. (2020, January 19\u201320). Block-Sdot cloud: Enhancing security of cloud storage through blockchain-based sdn in iot network. Proceedings of the 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh.","DOI":"10.1109\/STI50764.2020.9350419"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"94780","DOI":"10.1109\/ACCESS.2020.2993606","article-title":"A collaborative auditing blockchain for trustworthy data integrity in cloud storage system","volume":"8","author":"Huang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"e4108","DOI":"10.1002\/ett.4108","article-title":"Integrating encryption techniques for secure data storage in the cloud","volume":"33","author":"Seth","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Pise, R., and Patil, S. (2021, January 4\u20136). Enhancing security of data in cloud storage using decentralized blockchain. Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India.","DOI":"10.1109\/ICICV50876.2021.9388521"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5422","DOI":"10.1109\/TII.2021.3112601","article-title":"Blockchain-based secure data storage protocol for sensors in the industrial internet of things","volume":"18","author":"Lu","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"469","DOI":"10.28991\/ESJ-2023-07-02-012","article-title":"Secure distributed cloud storage based on the blockchain technology and smart contracts","volume":"7","author":"Gousteris","year":"2023","journal-title":"Emerg. Sci. J."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Alsulbi, K.A., Khemakhem, M.A., Basuhail, A.A., Eassa, F.E., Jambi, K.M., and Almarhabi, K.A. (2021). A proposed framework for secure data storage in a big data environment based on blockchain and mobile agent. Symmetry, 13.","DOI":"10.3390\/sym13111990"},{"key":"ref_35","unstructured":"Qamar, N., Ana, S., and Eran, E. (2018, January 18\u201321). Securing DICOM images based on adaptive pixel thresholding approach. Proceedings of the 2018 IEEE 31st International Symposium on Computer-Based Medical Systems, Karlstad, Sweden."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3578555","article-title":"Enabling efficient deduplication and secure decentralized public auditing for cloud storage: A redactable blockchain approach","volume":"14","author":"Mishra","year":"2023","journal-title":"ACM Trans. Manag. Inf. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/TSC.2024.3350086","article-title":"Blockchain-assisted secure deduplication for large-scale cloud storage service","volume":"17","author":"Hua","year":"2024","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"3680359","DOI":"10.1155\/2021\/3680359","article-title":"Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal","volume":"2021","author":"Hou","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3397521","article-title":"Panda: Partitioned data security on outsourced sensitive and non-sensitive data","volume":"11","author":"Mehrotra","year":"2020","journal-title":"ACM Trans. Manag. Inf. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2102","DOI":"10.1109\/JIOT.2019.2959599","article-title":"Blockchain of finite-lifetime blocks with applications to edge-based IoT","volume":"7","author":"Pyoung","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2870","DOI":"10.1007\/s12083-024-01734-7","article-title":"A blockchain-based auditable deduplication scheme for multi-cloud storage","volume":"17","author":"Jin","year":"2024","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_42","unstructured":"Castro, M., and Liskov, B. (1999, January 22\u201325). Practical byzantine fault tolerance. Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OsDI), New Orleans, LA, USA."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"9752","DOI":"10.1109\/JIOT.2023.3323492","article-title":"Performance analysis and comparison of nonideal wireless PBFT and RAFT consensus networks in 6G communications","volume":"11","author":"Luo","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.iotcps.2023.02.003","article-title":"PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles charging scenarios for V2G networks","volume":"3","author":"Luo","year":"2023","journal-title":"Internet Things Cyber-Phys. Syst."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/56\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:13:38Z","timestamp":1769058818000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,20]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["fi18010056"],"URL":"https:\/\/doi.org\/10.3390\/fi18010056","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,20]]}}}