“…A data user can easily access its data in the cloud at any time and everywhere. Significant efforts have been made to securely and efficiently outsource data to the cloud in recent years, ranging from protecting data security and privacy ( Chu et al, 2014;Wan et al, 2012;Wang et al, 2010a;Wei et al, 2014 ), reducing copyright risks ( Hwang et al, 2009;Hwang and Li, 2010 ), controlling data access ( Ruj et al, 2014;Wang et al, 2010b;Yan et al, 2017a;Yang and Jia, 2014;Zhou et al, 2013 ), to encrypted data deduplication ( Harnik et al, 2010;Li et al, 2014;Liu et al, 2015;Xu et al, 2009;Yan et al, 2016a;2016b;2017b ).…”