{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:47:29Z","timestamp":1740149249144,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T00:00:00Z","timestamp":1718323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T00:00:00Z","timestamp":1718323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["New Gener. Comput."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00354-024-00263-4","type":"journal-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:02:13Z","timestamp":1718380933000},"page":"911-946","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9650-3643","authenticated-orcid":false,"given":"S. P.","family":"Rathinaeswari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V.","family":"Santhi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"key":"263_CR1","volume":"236","author":"B Balashunmugaraja","year":"2022","unstructured":"Balashunmugaraja, B., Ganeshbabu, T.: Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm. Knowl.-Based Syst. 236, 107748 (2022)","journal-title":"Knowl.-Based Syst."},{"key":"263_CR2","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2021.102740","volume":"125","author":"BD Deebak","year":"2022","unstructured":"Deebak, B.D., Memon, F.H., Dev, K., Khowaja, S.A., Qureshi, N.M.F.: AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT. Ad Hoc Netw. 125, 102740 (2022)","journal-title":"Ad Hoc Netw."},{"key":"263_CR3","doi-asserted-by":"crossref","first-page":"4009","DOI":"10.1007\/s11276-021-02652-9","volume":"27","author":"M Nasr Esfahani","year":"2021","unstructured":"Nasr Esfahani, M., Shahgholi Ghahfarokhi, B., Etemadi Borujeni, S.: End-to-end privacy preserving scheme for IoT-based healthcare systems. Wirel. Netw. 27, 4009\u20134037 (2021)","journal-title":"Wirel. Netw."},{"key":"263_CR4","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s10586-020-03106-1","volume":"24","author":"T Kanwal","year":"2021","unstructured":"Kanwal, T., Anjum, A., Khan, A.: Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust. Comput. 24, 293\u2013317 (2021)","journal-title":"Clust. Comput."},{"key":"263_CR5","doi-asserted-by":"crossref","first-page":"5537","DOI":"10.1109\/JIOT.2021.3111739","volume":"9","author":"C Xu","year":"2021","unstructured":"Xu, C., Wang, N., Zhu, L., Zhang, C., Sharif, K., Wu, H.: Reliable and privacy-preserving top-k disease matching schemes for e-healthcare systems. IEEE Internet Things J. 9, 5537\u20135547 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"263_CR6","doi-asserted-by":"publisher","first-page":"4212","DOI":"10.1109\/tmc.2022.3145745","volume":"22","author":"J Liu","year":"2023","unstructured":"Liu, J., Zhang, C., Xue, K., Fang, Y.: Privacy preservation in multi-cloud secure data fusion for infectious-disease analysis. IEEE Trans. Mobile Comput. 22(7), 4212\u20134222 (2023). https:\/\/doi.org\/10.1109\/tmc.2022.3145745","journal-title":"IEEE Trans. Mobile Comput."},{"key":"263_CR7","doi-asserted-by":"crossref","first-page":"4788","DOI":"10.1109\/TII.2021.3113708","volume":"18","author":"X Xu","year":"2021","unstructured":"Xu, X., Peng, H., Bhuiyan, M.Z.A., Hao, Z., Liu, L., Sun, L., et al.: Privacy-preserving federated depression detection from multisource mobile health data. IEEE Trans. Ind. Inf. 18, 4788\u20134797 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"263_CR8","first-page":"1","volume":"55","author":"K Sarwar","year":"2021","unstructured":"Sarwar, K., Yongchareon, S., Yu, J., Ur Rehman, S.: A survey on privacy preservation in fog-enabled internet of things. ACM Comput. Surv. (CSUR) 55, 1\u201339 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"263_CR9","first-page":"343","volume":"20","author":"S Madan","year":"2021","unstructured":"Madan, S., Goswami, P.: Hybrid privacy preservation model for big data publishing on cloud. Int. J. Adv. Intell. Paradigms 20, 343\u2013355 (2021)","journal-title":"Int. J. Adv. Intell. Paradigms"},{"key":"263_CR10","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.jpdc.2022.01.005","volume":"163","author":"SM Rubai","year":"2022","unstructured":"Rubai, S.M.: Hybrid heuristic-based key generation protocol for intelligent privacy preservation in cloud sector. J. Parallel Distrib. Comput. 163, 166\u2013180 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"key":"263_CR11","doi-asserted-by":"crossref","first-page":"7539","DOI":"10.3934\/mbe.2021373","volume":"18","author":"FA Al-Zumia","year":"2021","unstructured":"Al-Zumia, F.A., Tian, Y., Al-Rodhaan, M.: A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data. Math. Biosci. Eng. 18, 7539\u20137560 (2021)","journal-title":"Math. Biosci. Eng."},{"key":"263_CR12","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1007\/s11280-021-00941-z","volume":"25","author":"L Kong","year":"2021","unstructured":"Kong, L., Wang, L., Gong, W., Yan, C., Duan, Y., Qi, L.: LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web. 25, 1793\u20131808 (2021)","journal-title":"World Wide Web."},{"key":"263_CR13","first-page":"1","volume":"2021","author":"Q Xie","year":"2021","unstructured":"Xie, Q., Ding, Z., Hu, B.: A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in internet of things. Secur. Commun. Netw. 2021, 1\u201312 (2021)","journal-title":"2021"},{"key":"263_CR14","unstructured":"Aslan, A., Greve, M., Diesterh\u00f6ft, T., Kolbe, L.: Can our health data stay private? A review and future directions for is research on privacy-preserving AI in healthcare. In: 17th International Conference on Wirtschaftsinformatik, February 2022, N\u00fcrnberg, Germany, Proceedings. vol. 8. https:\/\/aisel.aisnet.org\/wi2022\/digital_health\/digital_health\/8 (2022)"},{"key":"263_CR15","first-page":"1","volume":"2021","author":"X Sun","year":"2021","unstructured":"Sun, X., Sun, Z., Wang, T., Feng, J., Wei, J., Hu, G.: A privacy-preserving reinforcement learning approach for dynamic treatment regimes on health data. Wirel. Commun. Mobile Comput. 2021,\u00a0 1\u201316 (2021)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"263_CR16","doi-asserted-by":"crossref","first-page":"9668","DOI":"10.3390\/ijerph18189668","volume":"18","author":"S-R Oh","year":"2021","unstructured":"Oh, S.-R., Seo, Y.-D., Lee, E., Kim, Y.-G.: A comprehensive survey on security and privacy for electronic health data. Int. J. Environ. Res. Public Health 18, 9668 (2021)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"263_CR17","doi-asserted-by":"crossref","unstructured":"Garg, N., Obaidat, M.S., Wazid, M., Das, A.K., Singh, D. P.: SPCS-IoTEH: secure privacy-preserving communication scheme for IoT-enabled e-health applications. In: ICC 2021-IEEE International Conference on Communications, pp. 1\u20136 (2021)","DOI":"10.1109\/ICC42927.2021.9500388"},{"key":"263_CR18","doi-asserted-by":"crossref","first-page":"2041","DOI":"10.1109\/JBHI.2021.3100871","volume":"26","author":"Y Bao","year":"2021","unstructured":"Bao, Y., Qiu, W., Tang, P., Cheng, X.: Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system. IEEE J. Biomed. Health Inform. 26, 2041\u20132051 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"263_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/5594159","volume":"2021","author":"FA Almalki","year":"2021","unstructured":"Almalki, F.A., Soufiene, B.O.: EPPDA: an efficient and privacy-preserving data aggregation scheme with authentication and authorization for IoT-based healthcare applications. Wirel. Commun. Mobile Comput. 2021, 1\u201318 (2021)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"263_CR20","doi-asserted-by":"crossref","unstructured":"Louassef, B.R., Chikouche, N.: Privacy preservation in healthcare systems. In: 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), pp. 1\u20136 (2021)","DOI":"10.1109\/AI-CSP52968.2021.9671083"},{"key":"263_CR21","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2020.104130","volume":"129","author":"C Thapa","year":"2021","unstructured":"Thapa, C., Camtepe, S.: Precision health data: requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 129, 104130 (2021)","journal-title":"Comput. Biol. Med."},{"key":"263_CR22","first-page":"1","volume":"2021","author":"Z Zhao","year":"2021","unstructured":"Zhao, Z., Hsu, C., Harn, L., Yang, Q., Ke, L.: Lightweight privacy-preserving data sharing scheme for internet of medical things. Wirel. Commun. Mobile Comput. 2021, 1\u201313, (2021)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"263_CR23","first-page":"1","volume":"2019","author":"Y Song","year":"2021","unstructured":"Song, Y., Wang, H., Wei, X., Wu, L.: Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secur. Commun. Netw. 2019, 1\u20139 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"263_CR24","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/JSYST.2020.2978146","volume":"15","author":"J Li","year":"2020","unstructured":"Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15, 577\u2013585 (2020)","journal-title":"IEEE Syst. J."},{"key":"263_CR25","doi-asserted-by":"crossref","first-page":"11460","DOI":"10.1109\/JIOT.2020.3012480","volume":"7","author":"Y Li","year":"2020","unstructured":"Li, Y., Li, H., Xu, G., Xiang, T., Huang, X., Lu, R.: Toward secure and privacy-preserving distributed deep learning in fog-cloud computing. IEEE Internet Things J. 7, 11460\u201311472 (2020)","journal-title":"IEEE Internet Things J."},{"key":"263_CR26","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.ins.2018.05.005","volume":"459","author":"X Ma","year":"2018","unstructured":"Ma, X., Zhang, F., Chen, X., Shen, J.: Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf. Sci. 459, 103\u2013116 (2018)","journal-title":"Inf. Sci."},{"key":"263_CR27","doi-asserted-by":"crossref","first-page":"2721","DOI":"10.3390\/electronics10212721","volume":"10","author":"A Razaque","year":"2021","unstructured":"Razaque, A., Frej, M.B.H., Alotaibi, B., Alotaibi, M.: Privacy preservation models for third-party auditor over cloud computing: a survey. Electronics 10, 2721 (2021)","journal-title":"Electronics"},{"key":"263_CR28","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.ins.2019.12.007","volume":"514","author":"X Shen","year":"2020","unstructured":"Shen, X., Zhu, L., Xu, C., Sharif, K., Lu, R.: A privacy-preserving data aggregation scheme for dynamic groups in fog computing. Inf. Sci. 514, 118\u2013130 (2020)","journal-title":"Inf. Sci."},{"key":"263_CR29","doi-asserted-by":"crossref","first-page":"29344","DOI":"10.1109\/ACCESS.2019.2901219","volume":"7","author":"O-A Kwabena","year":"2019","unstructured":"Kwabena, O.-A., Qin, Z., Zhuang, T., Qin, Z.: Mscryptonet: multi-scheme privacy-preserving deep learning in cloud computing. IEEE Access 7, 29344\u201329354 (2019)","journal-title":"IEEE Access"},{"key":"263_CR30","doi-asserted-by":"crossref","first-page":"4755","DOI":"10.1109\/JIOT.2018.2874473","volume":"6","author":"X Li","year":"2018","unstructured":"Li, X., Liu, S., Wu, F., Kumari, S., Rodrigues, J.J.: Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications. IEEE Internet Things J. 6, 4755\u20134763 (2018)","journal-title":"IEEE Internet Things J."},{"key":"263_CR31","doi-asserted-by":"crossref","first-page":"5060","DOI":"10.1109\/TITS.2020.3011931","volume":"22","author":"Q Kong","year":"2020","unstructured":"Kong, Q., Lu, R., Yin, F., Cui, S.: Privacy-preserving continuous data collection for predictive maintenance in vehicular fog-cloud. IEEE Trans. Intell. Transp. Syst. 22, 5060\u20135070 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"263_CR32","doi-asserted-by":"crossref","first-page":"5892","DOI":"10.1109\/JIOT.2019.2954380","volume":"7","author":"Q Xu","year":"2019","unstructured":"Xu, Q., Su, Z., Dai, M., Yu, S.: APIS: Privacy-preserving incentive for sensing task allocation in cloud and edge-cooperation mobile Internet of Things with SDN. IEEE Internet Things J. 7, 5892\u20135905 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"263_CR33","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/TCC.2020.3010235","volume":"10","author":"L Lyu","year":"2020","unstructured":"Lyu, L., Chau, S.C.-K., Wang, N., Zheng, Y.: Cloud-based privacy-preserving collaborative consumption for sharing economy. IEEE Trans. Cloud Comput. 10(3), 1647\u20131660 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"263_CR34","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.jnca.2018.09.019","volume":"125","author":"Z Guan","year":"2019","unstructured":"Guan, Z., Zhang, Y., Wu, L., Wu, J., Li, J., Ma, Y., et al.: APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J. Netw. Comput. Appl. 125, 82\u201392 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"263_CR35","doi-asserted-by":"crossref","first-page":"138245","DOI":"10.1109\/ACCESS.2021.3115238","volume":"9","author":"B Sowmiya","year":"2021","unstructured":"Sowmiya, B., Poovammal, E., Ramana, K., Singh, S., Yoon, B.: Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server. IEEE Access 9, 138245\u2013138253 (2021)","journal-title":"IEEE Access"},{"key":"263_CR36","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.ins.2020.08.032","volume":"546","author":"C Li","year":"2021","unstructured":"Li, C., Tian, Y., Chen, X., Li, J.: An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems. Inf. Sci. 546, 253\u2013264 (2021)","journal-title":"Inf. Sci."},{"key":"263_CR37","doi-asserted-by":"crossref","first-page":"77058","DOI":"10.1109\/ACCESS.2021.3082704","volume":"9","author":"S-G Liu","year":"2021","unstructured":"Liu, S.-G., Chen, W.-Q., Liu, J.-L.: An efficient double parameter elliptic curve digital signature algorithm for blockchain. IEEE Access 9, 77058\u201377066 (2021)","journal-title":"IEEE Access"},{"key":"263_CR38","doi-asserted-by":"crossref","first-page":"2813","DOI":"10.1007\/s12083-021-01117-2","volume":"14","author":"S Banupriya","year":"2021","unstructured":"Banupriya, S., Kottursamy, K., Bashir, A.K.: Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain. Peer-to-Peer Netw. Appl. 14, 2813\u20132825 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"263_CR39","doi-asserted-by":"crossref","first-page":"665","DOI":"10.3390\/s21020665","volume":"21","author":"SAA Hakeem","year":"2021","unstructured":"Hakeem, S.A.A., Kim, H.: Multi-zone authentication and privacy-preserving protocol (MAPP) based on the bilinear pairing cryptography for 5G\u2013V2X. Sensors 21, 665 (2021)","journal-title":"Sensors"},{"key":"263_CR40","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101938","volume":"114","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan, D., Ray, S., Obaidat, M.S., Dasgupta, M.: A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Architect. 114, 101938 (2021)","journal-title":"J. Syst. Architect."},{"key":"263_CR41","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.comcom.2020.04.057","volume":"158","author":"KM Prabha","year":"2020","unstructured":"Prabha, K.M., Saraswathi, P.V.: Suppressed K-anonymity multi-factor authentication based Schmidt\u2013Samoa cryptography for privacy preserved data access in cloud computing. Comput. Commun. 158, 85\u201394 (2020)","journal-title":"Comput. Commun."},{"issue":"2","key":"263_CR42","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1007\/s12652-021-02942-2","volume":"13","author":"P Chinnasamy","year":"2022","unstructured":"Chinnasamy, P., Deepalakshmi, P.: HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. J. Ambient. Intell. Humaniz. Comput. 13(2), 1001\u20131019 (2022)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"2","key":"263_CR43","doi-asserted-by":"crossref","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Gupta, I., Singh, A.K., Saxena, D., Lee, C.N.: An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst. J. 17(2), 2445\u20132454 (2022)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"263_CR44","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Saxena, D., Gupta, I., Singh, A.K.: Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw. Lett. 4(4), 217\u2013221 (2022)","journal-title":"IEEE Netw. Lett."},{"issue":"4","key":"263_CR45","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/LNET.2022.3200724","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Saxena, D., Gupta, I., Makkar, A., Singh, A.K.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Netw. Lett. 4(4), 174\u2013178 (2022)","journal-title":"IEEE Netw. Lett."},{"issue":"3","key":"263_CR46","doi-asserted-by":"crossref","first-page":"4248","DOI":"10.1109\/JSYST.2020.3035666","volume":"15","author":"I Gupta","year":"2020","unstructured":"Gupta, I., Gupta, R., Singh, A.K., Buyya, R.: MLPAM: A machine learning and probabilistic analysis based model for preserving security and privacy in cloud environment. IEEE Syst. J. 15(3), 4248\u20134259 (2020)","journal-title":"IEEE Syst. J."},{"issue":"6","key":"263_CR47","first-page":"53","volume":"9","author":"OP Akomolafe","year":"2017","unstructured":"Akomolafe, O.P., Abodunrin, M.O.: A hybrid cryptographic model for data storage in mobile cloud computing. Int. J. Comput. Netw. Inf. Secur. 9(6), 53 (2017)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"issue":"5","key":"263_CR48","doi-asserted-by":"crossref","first-page":"5933","DOI":"10.3233\/JIFS-179680","volume":"38","author":"MI Tariq","year":"2020","unstructured":"Tariq, M.I., Tayyaba, S., Ali Mian, N., Sarfraz, M.S., Hussain, A., Imran, M., Paraschiv, N.: An analysis of the application of fuzzy logic in cloud computing. J. Intell. Fuzzy Syst. 38(5), 5933\u20135947 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"263_CR49","doi-asserted-by":"crossref","unstructured":"Timothy, D.P., Santra, A.K.: A hybrid cryptography algorithm for cloud computing security. In: 2017 International Conference on Microelectronic Devices, Circuits and Systems (ICMDCS), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ICMDCS.2017.8211728"},{"issue":"6","key":"263_CR50","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MNET.003.2100325","volume":"36","author":"MM Fouda","year":"2022","unstructured":"Fouda, M.M., Sakib, S., Fadlullah, Z.M., Nasser, N., Guizani, M.: A lightweight hierarchical AI model for UAV-enabled edge computing with forest-fire detection use-case. IEEE Netw. 36(6), 38\u201345 (2022)","journal-title":"IEEE Netw."},{"key":"263_CR51","doi-asserted-by":"crossref","unstructured":"Mahmood, Z.H., Ibrahem, M.K.: New fully homomorphic encryption scheme based on multistage partial homomorphic encryption applied in cloud computing. In: 2018 1st Annual International Conference on Information and Sciences (AiCIS), pp. 182\u2013186. IEEE ((2018))","DOI":"10.1109\/AiCIS.2018.00043"},{"key":"263_CR52","doi-asserted-by":"crossref","unstructured":"Bates, A., Mood, B., Valafar, M., Butler, K.: Towards secure provenance-based access control in cloud environments. In: Proceedings of the third ACM Conference on Data and Application Security and Privacy, pp. 277\u2013284 (2013)","DOI":"10.1145\/2435349.2435389"},{"issue":"6","key":"263_CR53","doi-asserted-by":"crossref","first-page":"2720","DOI":"10.1021\/acs.jcim.0c01329","volume":"61","author":"Z Lin","year":"2021","unstructured":"Lin, Z., Zou, J., Liu, S., Peng, C., Li, Z., Wan, X., Yang, M.: A cloud computing platform for scalable relative and absolute binding free energy predictions: new opportunities and challenges for drug discovery. J. Chem. Inf. Model. 61(6), 2720\u20132732 (2021)","journal-title":"J. Chem. Inf. Model."},{"key":"263_CR54","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology (CRYPTO \u201801), vol. 2139, pp. 213\u2013229. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"2","key":"263_CR55","first-page":"115","volume":"9","author":"M Bayat","year":"2018","unstructured":"Bayat, M., Doostari, M., Rezaei, S.: A lightweight and efficient data sharing scheme for cloud computing. Int. J. Electron. Inf. Eng. 9(2), 115\u2013131 (2018)","journal-title":"Int. J. Electron. Inf. Eng."},{"issue":"4","key":"263_CR56","first-page":"162","volume":"12","author":"MS Malhi","year":"2020","unstructured":"Malhi, M.S., Iqbal, U., Nabi, M.M., Malhi, M.A.I.: E-learning based on cloud computing for educational institution: Security issues and solutions. Int. J. Electron. Inf. Eng. 12(4), 162\u2013169 (2020)","journal-title":"Int. J. Electron. Inf. Eng."}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-024-00263-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00354-024-00263-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-024-00263-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T09:42:07Z","timestamp":1730713327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00354-024-00263-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,14]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["263"],"URL":"https:\/\/doi.org\/10.1007\/s00354-024-00263-4","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"type":"print","value":"0288-3635"},{"type":"electronic","value":"1882-7055"}],"subject":[],"published":{"date-parts":[[2024,6,14]]},"assertion":[{"value":"26 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}