Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

An efficient \(\mathcal{iO}\)-based data integrity verification scheme for cloud storage

This is a preview of subscription content, log in to check access.


  1. 1

    Li H W, Liu D X, Dai Y S, et al. Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput, 2015, 3: 127–138

  2. 2

    Zhang Y, Xu C X, Yu S, et al. SCLPV: secure certificateless public verification for cloud-based cyberphysical-social systems against malicious auditors. IEEE Trans Comput Soc Syst, 2015, 2: 159–170

  3. 3

    Li H W, Yang Y, Dai Y S, et al. Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput, 2017. doi: 10.1109/TCC.2017.2769645

  4. 4

    Sun L X, Xu C X, Zhang Y. A dynamic and noninteractive boolean searchable symmetric encryption in multi-client setting. J Inf Secur Appl, 2018, 40: 145–155

  5. 5

    Garg S, Gentry C, Halevi S, et al. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings of the 54th Annual Symposium on Foundations of Computer Science, Berkeley, 2013. 40–49

  6. 6

    Zhang Y, Xu C X, Liang X H, et al. Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Forensic Secur, 2017, 12: 676–688

  7. 7

    Sun L X, Xu C X, Zhang MW, et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61: 038106

  8. 8

    Guan C W, Ren K, Zhang F G, et al. Symmetrickey based proofs of retrievability supporting public verification. In: Proceedings of European Symposium on Research in Computer Security, Vienna, 2015. 203–223

  9. 9

    Shi E, Stefanov E, Papamanthou C. Practical dynamic proofs of retrievability. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Berlin, 2013. 325–336

Download references


This work was supported by National Key R&D Program of China (Grant No. 2017YFB0802000) and National Natural Science Foundation of China (Grant No. 61370203).

Author information

Correspondence to Lixue Sun or Chunxiang Xu.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Sun, L., Xu, C., Zhang, Y. et al. An efficient \(\mathcal{iO}\)-based data integrity verification scheme for cloud storage. Sci. China Inf. Sci. 62, 59101 (2019).

Download citation