{"id":"https://openalex.org/W2908825189","doi":"https://doi.org/10.1109/tsc.2019.2892095","title":"Provable Data Possession with Outsourced Data Transfer","display_name":"Provable Data Possession with Outsourced Data Transfer","publication_year":2019,"publication_date":"2019-01-10","ids":{"openalex":"https://openalex.org/W2908825189","doi":"https://doi.org/10.1109/tsc.2019.2892095","mag":"2908825189"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2019.2892095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2019.2892095","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-7254-6465","affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-2446-7436","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-1632-5737","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035868158","display_name":"Qi Li","orcid":"https://orcid.org/0000-0002-7280-7378"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-7280-7378","affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100603435","display_name":"Qihua Wang","orcid":"https://orcid.org/0000-0001-9548-8683"},"institutions":[{"id":"https://openalex.org/I51185872","display_name":"Jining Medical University","ror":"https://ror.org/03zn9gq54","country_code":"CN","type":"education","lineage":["https://openalex.org/I51185872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qihua Wang","raw_affiliation_strings":["School of Medical Information Engineering, Jining Medical University, Rizhao, China"],"raw_orcid":"https://orcid.org/0000-0001-9548-8683","affiliations":[{"raw_affiliation_string":"School of Medical Information Engineering, Jining Medical University, Rizhao, China","institution_ids":["https://openalex.org/I51185872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082859576"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":11.988,"has_fulltext":false,"cited_by_count":76,"citation_normalized_percentile":{"value":0.9847119,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"14","issue":"6","first_page":"1929","last_page":"1939"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7969634532928467},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.41383129358291626},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3544963598251343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3309757113456726}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7969634532928467},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.41383129358291626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3544963598251343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3309757113456726},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2019.2892095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2019.2892095","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1159062807","display_name":null,"funder_award_id":"BK20181394","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G3807962687","display_name":null,"funder_award_id":"61572255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4236343159","display_name":null,"funder_award_id":"61872192","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4553734180","display_name":null,"funder_award_id":"AGK2018004","funder_id":"https://openalex.org/F4320330184","funder_display_name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security"},{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320330184","display_name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W142078693","https://openalex.org/W1480620864","https://openalex.org/W1921672120","https://openalex.org/W1980461171","https://openalex.org/W2010287286","https://openalex.org/W2027703952","https://openalex.org/W2040193872","https://openalex.org/W2058231031","https://openalex.org/W2079493184","https://openalex.org/W2080488820","https://openalex.org/W2081232727","https://openalex.org/W2102881299","https://openalex.org/W2123069643","https://openalex.org/W2152924492","https://openalex.org/W2154460143","https://openalex.org/W2310212673","https://openalex.org/W2323162780","https://openalex.org/W2557530247","https://openalex.org/W2603893109","https://openalex.org/W2606779297","https://openalex.org/W2762453390","https://openalex.org/W2801274750","https://openalex.org/W2907742243","https://openalex.org/W6605846825","https://openalex.org/W6640233077"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W931969443","https://openalex.org/W2381781572","https://openalex.org/W2350339206","https://openalex.org/W4210480003","https://openalex.org/W2310251353","https://openalex.org/W2392139924","https://openalex.org/W2093968286"],"abstract_inverted_index":{"With":[0],"the":[1,20,24,27,37,44,48,54,61,66,89,94,103,112,124,134,142,147,170,177,183],"rapid":[2],"development":[3],"of":[4,26,29,57,101,117,150,182],"cloud":[5,144],"computing,":[6],"more":[7,9],"and":[8,15,128,158,180,195],"enterprises":[10],"would":[11],"like":[12],"to":[13,43,52,60,64,75,141],"upload":[14],"store":[16],"their":[17],"data":[18,39,58,69,78,82,115,126,135],"in":[19],"public":[21,143],"cloud.":[22],"When":[23],"parts":[25],"business":[28],"an":[30],"enterprise":[31,119],"are":[32],"purchased":[33,68,125],"by":[34],"another":[35],"enterprise,":[36],"corresponding":[38],"will":[40],"be":[41,109,121,131,139],"transferred":[42],"acquiring":[45],"enterprise.":[46],"For":[47,146],"usual":[49],"case,":[50],"how":[51],"outsource":[53],"computation":[55,137],"cost":[56],"transfer":[59,83],"cloud?":[62],"How":[63],"ensure":[65],"remote":[67],"integrity?":[70],"Thus,":[71],"it":[72],"is":[73,192],"important":[74],"study":[76],"provable":[77],"possession":[79],"with":[80],"outsourced":[81,140],"(DT-PDP).":[84],"In":[85],"this":[86],"paper,":[87],"for":[88],"first":[90],"time,":[91],"we":[92,152,162,175],"propose":[93],"novel":[95],"concept:":[96],"DT-PDP.":[97],"By":[98],"taking":[99],"use":[100],"DT-PDP,":[102,151],"following":[104],"three":[105],"security":[106,116,148,159],"requirements":[107],"can":[108,120,130,138],"satisfied:":[110],"(1)":[111],"other":[113],"un-purchased":[114],"acquired":[118],"ensured;":[122,132],"(2)":[123],"integrity":[127],"privacy":[129],"(3)":[133],"transferability&#x2019;s":[136],"servers.":[145],"concept":[149],"give":[153],"its":[154],"motivation,":[155],"system":[156],"model":[157],"model.":[160],"Then,":[161],"design":[163],"a":[164],"concrete":[165,184],"DT-PDP":[166,185],"scheme":[167,191],"based":[168],"on":[169],"bilinear":[171],"pairings.":[172],"At":[173],"last,":[174],"analyze":[176],"security,":[178],"efficiency":[179],"flexibility":[181],"scheme.":[186],"It":[187],"shows":[188],"that":[189],"our":[190],"provably":[193],"secure":[194],"efficient.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":5}],"updated_date":"2026-05-16T08:24:45.110214","created_date":"2025-10-10T00:00:00"}
