{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:49:21Z","timestamp":1743122961237,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031276217"},{"type":"electronic","value":"9783031276224"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27622-4_16","type":"book-chapter","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:15:28Z","timestamp":1679879728000},"page":"202-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Industrial Machine Learning Cloud Applications: Integrity and Confidentiality of Machine Sensitive Data"],"prefix":"10.1007","author":[{"given":"Munisamy Eswara","family":"Narayanan","sequence":"first","affiliation":[]},{"given":"Balasundaram","family":"Muthukumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"unstructured":"Tseng, M., Edmunds, T., Canaran, L., et al.: Introduction to Edge Computing in IIoT. Industrial Internet Consortium, Need-ham (2018)","key":"16_CR1"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.23919\/JCC.2020.01.006","volume":"17","author":"H Hui","year":"2020","unstructured":"Hui, H., Zhou, C., Xu, S., Lin, F.: A novel secure data transmission scheme in industrial internet of things. China Commun. 17(1), 73\u201388 (2020)","journal-title":"China Commun."},{"unstructured":"Hazela, B., Gupta, S.K., Soni, N., Saranya, C.N.: Securing the confidentiality and integrity of cloud computing data (2021). https:\/\/spast.org\/techrep\/article\/view\/2449","key":"16_CR3"},{"doi-asserted-by":"crossref","unstructured":"Shaw, S., Singh, A.K.: A survey on cloud computing. In: Proceedings of 2014 International Conference on Green Computing Communication and Electrical Engineering, Coimbatore, India (2014)","key":"16_CR4","DOI":"10.1109\/ICGCCEE.2014.6921423"},{"issue":"7","key":"16_CR5","first-page":"1146","volume":"48","author":"Q Hou","year":"2011","unstructured":"Hou, Q., Wu, Y., Zheng, W., Yang, G.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146\u20131154 (2011)","journal-title":"J. Comput. Res. Dev."},{"issue":"12","key":"16_CR6","first-page":"174","volume":"14","author":"G Feng","year":"2015","unstructured":"Feng, G.: A data privacy protection scheme of cloud storage. Softw. Guide 14(12), 174\u2013176 (2015)","journal-title":"Softw. Guide"},{"issue":"12","key":"16_CR7","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"16_CR8","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546\u20132559 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"unstructured":"Singhal, P., Singh, P., Hazela, B., Singh, V., Singh, V.: Machine learning algorithm: wine quality prediction. SPAST Abstracts 1(01) (2021). Smart Green Connected Societies","key":"16_CR9"},{"issue":"5","key":"16_CR10","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TSC.2016.2622697","volume":"12","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Huang, F., Sun, X., Vasilakos, A., Yang, C.-N.: Enabling semantic search based on conceptual graphs over encrypted out-sourced data. IEEE Trans. Serv. Comput. 12(5), 813\u2013823 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"16_CR11","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Kulkarni, G., Waghmare, R., Palwe, R., et al.: Cloud storage architecture. In: Proceedings of the 2012 7th International Conference on Telecommunication Systems, Services, and Applications, Bali, Indonesia, pp. 76\u201381 (2012)","key":"16_CR12","DOI":"10.1109\/TSSA.2012.6366026"},{"issue":"2","key":"16_CR13","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"issue":"10","key":"16_CR14","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","volume":"12","author":"J Shen","year":"2017","unstructured":"Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402\u20132415 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"publisher","unstructured":"Khorshed, M.T., Shawkat Ali, A.B.M., Wasimi, S.A.: Trust issues that create threats for cyber-attacks in cloud computing. In: Proceedings of the International Conference on Parallel and Distributed Systems \u2013 ICPADS (2011). https:\/\/doi.org\/10.1109\/ICPADS.2011.156","key":"16_CR15","DOI":"10.1109\/ICPADS.2011.156"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","volume":"63","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63, 561\u2013592 (2013). https:\/\/doi.org\/10.1007\/s11227-012-0831-5","journal-title":"J. Supercomput."},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.future.2016.09.021","volume":"72","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Yang, Y., Shen, M.: Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Futur. Gener. Comput. Syst. 72, 239\u2013249 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.cose.2015.01.003","volume":"50","author":"X Dong","year":"2015","unstructured":"Dong, X., Yu, J., Zhu, Y., Chen, Y., Luo, Y., Li, M.: SECO: secure and scalable data collaboration services in cloud computing. Comput. Secur. 50, 91\u2013105 (2015)","journal-title":"Comput. Secur."},{"issue":"1","key":"16_CR19","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"B Wang","year":"2015","unstructured":"Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 82\u2013106 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"doi-asserted-by":"crossref","unstructured":"Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. Paper presented at: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK (2012)","key":"16_CR20","DOI":"10.1109\/TrustCom.2012.136"},{"issue":"4","key":"16_CR21","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TCC.2014.2372758","volume":"2","author":"J Xiong","year":"2014","unstructured":"Xiong, J., Liu, X., Yao, Z., et al.: A secure data self-destructing scheme in cloud computing. IEEE Trans. Cloud Comput. 2(4), 448\u2013458 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.future.2016.09.003","volume":"78","author":"Y Li","year":"2018","unstructured":"Li, Y., Yu, Y., Yang, B., Min, G., Wu, H.: Privacy preserving cloud data auditing with efficient key update. Futur. Gener. Comput. Syst. 78, 789\u2013798 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Gupta, S.K., Tiwari, S., Jamil, A.A., Singh, P.: Faster as well as early measurements from big data predictive analytics model. SPAST Abstracts 1(01) (2021). Smart Green Connected Societies","key":"16_CR23","DOI":"10.1149\/10701.2927ecst"}],"container-title":["Communications in Computer and Information Science","Deep Sciences for Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27622-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:31:12Z","timestamp":1679880672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27622-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031276217","9783031276224"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27622-4_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IconDeepCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Sciences for Computing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icondeepcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.srmist.edu.in\/icondeepcom-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}