{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:06:42Z","timestamp":1760148402120,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62172436","62102452"],"award-info":[{"award-number":["62172436","62102452"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the rapid development of cloud storage and cloud computing technology, users tend to store data in the cloud for more convenient services. In order to ensure the integrity of cloud data, scholars have proposed cloud data integrity verification schemes to protect users\u2019 data security. The storage environment of the Internet of Things, in terms of big data and medical big data, demonstrates a stronger demand for data integrity verification schemes, but at the same time, the comprehensive function of data integrity verification schemes is required to be higher. Existing data integrity verification schemes are mostly applied in the cloud storage environment but cannot successfully be applied to the environment of the Internet of Things in the context of big data storage and medical big data storage. To solve this problem when combined with the characteristics and requirements of Internet of Things data storage and medical data storage, we designed an SM2-based offline\/online efficient data integrity verification scheme. The resulting scheme uses the SM4 block cryptography algorithm to protect the privacy of the data content and uses a dynamic hash table to realize the dynamic updating of data. Based on the SM2 signature algorithm, the scheme can also realize offline tag generation and batch audits, reducing the computational burden of users. In security proof and efficiency analysis, the scheme has proven to be safe and efficient and can be used in a variety of application scenarios.<\/jats:p>","DOI":"10.3390\/s23094307","type":"journal-article","created":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T02:18:34Z","timestamp":1682561914000},"page":"4307","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SM2-Based Offline\/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5576-9210","authenticated-orcid":false,"given":"Xiuguang","family":"Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710126, China"},{"name":"Cryptographic Engineering College, Chinese People\u2019s Armed Police Force Engineering University, Xi\u2019an 710086, China"}]},{"given":"Zhengge","family":"Yi","sequence":"additional","affiliation":[{"name":"Key Lab of the Armed Police Force for Network and Information Security, Xi\u2019an 710086, China"}]},{"given":"Ruifeng","family":"Li","sequence":"additional","affiliation":[{"name":"Cryptographic Engineering College, Chinese People\u2019s Armed Police Force Engineering University, Xi\u2019an 710086, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-4913","authenticated-orcid":false,"given":"Xu-An","family":"Wang","sequence":"additional","affiliation":[{"name":"Cryptographic Engineering College, Chinese People\u2019s Armed Police Force Engineering University, Xi\u2019an 710086, China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an 710126, China"}]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Cryptographic Engineering College, Chinese People\u2019s Armed Police Force Engineering University, Xi\u2019an 710086, China"},{"name":"Key Lab of the Armed Police Force for Network and Information Security, Xi\u2019an 710086, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10586-021-03408-y","article-title":"Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property","volume":"25","author":"Ji","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.jpdc.2021.06.001","article-title":"Certificateless Privacy Preserving Public Auditing for Dynamic Shared Data with Group User Revocation in Cloud Storage","volume":"156","author":"Gudeme","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_3","first-page":"71","article-title":"Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage","volume":"14","author":"Li","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2761","DOI":"10.1109\/JIOT.2021.3092185","article-title":"Achieving graph clustering privacy preservation based on structure entropy in social IoT","volume":"9","author":"Tian","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3437","DOI":"10.1109\/TII.2021.3109090","article-title":"TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-enabled IIoT","volume":"18","author":"Li","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"4231","DOI":"10.1109\/TII.2019.2948068","article-title":"A personalized privacy protection framework for mobile crowdsensing in IIoT","volume":"16","author":"Xiong","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"54402","DOI":"10.1109\/ACCESS.2020.2981503","article-title":"LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_8","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., and Song, D. (November, January 29). Provable Data Possession at Untrusted Stores. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS \u201807), Alexandria, VA, USA."},{"key":"ref_9","unstructured":"Juels, A., and Kaliski, B.S. (November, January 29). Pors: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.future.2019.01.009","article-title":"Outsourced Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage","volume":"95","author":"Guo","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"e3911","DOI":"10.1002\/ett.3911","article-title":"Efficient Audit Protocol Supporting Virtual Nodes in Cloud Storage","volume":"32","author":"Hou","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4917","DOI":"10.1007\/s11227-020-03456-y","article-title":"BB-tree based secure and dynamic public auditing convergence for cloud storage","volume":"77","author":"Mishra","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1049\/cje.2021.08.011","article-title":"A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service","volume":"30","author":"Fan","year":"2021","journal-title":"Chin. J. Electron."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1455","DOI":"10.1007\/s10586-019-03000-5","article-title":"An identity-based online\/offline secure cloud storage auditing scheme","volume":"23","author":"Rabaninejad","year":"2020","journal-title":"Clust. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1109\/TIFS.2022.3159152","article-title":"An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage","volume":"17","author":"Yang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","first-page":"134","article-title":"Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage","volume":"16","author":"Li","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1186\/s13677-022-00279-5","article-title":"Identity-based remote data checking with a designated verifier","volume":"11","author":"Ji","year":"2022","journal-title":"J. Cloud Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1109\/JSYST.2022.3159832","article-title":"Redactable Signature-Based Public Auditing Scheme with Sensitive Data Sharing for Cloud Storage","volume":"16","author":"Li","year":"2022","journal-title":"IEEE Syst. J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3978","DOI":"10.1109\/JIOT.2021.3102236","article-title":"Consortium Blockchain-Based Public Integrity Verification in Cloud Storage for IoT","volume":"9","author":"Lin","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"825984","DOI":"10.1155\/2014\/825984","article-title":"Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols","volume":"2014","author":"Yang","year":"2014","journal-title":"Sci. World J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1049\/el.2018.1153","article-title":"Key-leakage hardware Trojan with super concealment based on the fault injection for block cipher of SM4","volume":"54","author":"Wang","year":"2018","journal-title":"Electron. Lett."},{"key":"ref_22","first-page":"897","article-title":"A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center","volume":"10","author":"Yan","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","article-title":"Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage","volume":"10","author":"Tian","year":"2017","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4307\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:23:58Z","timestamp":1760124238000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/9\/4307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":23,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["s23094307"],"URL":"https:\/\/doi.org\/10.3390\/s23094307","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,4,26]]}}}