{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:27:02Z","timestamp":1774949222483,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s00500-021-05928-6","type":"journal-article","created":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T12:04:29Z","timestamp":1623326669000},"page":"12343-12356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Securing data in transit using data-in-transit defender architecture for cloud communication"],"prefix":"10.1007","volume":"25","author":[{"given":"Keerthana","family":"Nandakumar","sequence":"first","affiliation":[]},{"given":"Viji","family":"Vinod","sequence":"additional","affiliation":[]},{"given":"Syed Musthafa","family":"Akbar Batcha","sequence":"additional","affiliation":[]},{"given":"Dilip Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Mohanraj","family":"Elangovan","sequence":"additional","affiliation":[]},{"given":"Anjana","family":"Poonia","sequence":"additional","affiliation":[]},{"given":"Suresh","family":"Mudlappa Basavaraju","sequence":"additional","affiliation":[]},{"given":"Sanwta Ram","family":"Dogiwal","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Dadheech","sequence":"additional","affiliation":[]},{"given":"Sudhakar","family":"Sengan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,10]]},"reference":[{"key":"5928_CR1","doi-asserted-by":"publisher","unstructured":"Adrian, D., Bhargavan, K., Durumeric, Z., et al. (2015) Imperfect forward secrecy: How Diffie-Hellman fails in practice. In: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security. pp 5\u201317. CCS'15, ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/2810103.2813707.","DOI":"10.1145\/2810103.2813707"},{"issue":"1","key":"5928_CR2","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1007\/s10586-017-1591-z","volume":"22","author":"A Almogren","year":"2019","unstructured":"Almogren A (2019) An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology. Clust Comput 22(1):2309\u20132316","journal-title":"Clust Comput"},{"key":"5928_CR3","unstructured":"Aviram, N., Schinzel, S., Somorovsky, J., et al. (2016) Drown: Breaking TLS using SSLv2. In: USENIX Security Symposium. pp 689\u2013706"},{"key":"5928_CR4","unstructured":"Bittau A, Hamburg M, Handley M et al. (2010)The case for ubiquitous transport-level encryption. In USENIX Security Symposium, pp 403\u2013418,"},{"key":"5928_CR5","doi-asserted-by":"crossref","unstructured":"Cangialosi F, Chung T, Choffnes D et al. (2016) Measurement and analysis of private key sharing in the HTTPS ecosystem. In Proceedings of the 2016 ACMSIGSAC Conference on Computer and Communications Security, pp 628\u2013640, New York, NY, USA. ACM.","DOI":"10.1145\/2976749.2978301"},{"issue":"1","key":"5928_CR6","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2004","unstructured":"Cramer R, Shoup V (2004) Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput 33(1):167\u2013226","journal-title":"SIAM J Comput"},{"key":"5928_CR7","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jnca.2018.10.021","volume":"128","author":"H Elazhary","year":"2019","unstructured":"Elazhary H (2019) Internet of Things (IoT) mobile cloud cloudlet mobile IoT  cloud fog mobile edge and edge emerging computing paradigms: Disambiguation and research directions. J Netw Comput Appl 128:105\u2013140","journal-title":"J Netw Comput Appl"},{"key":"5928_CR8","unstructured":"Flavel A, Mani P, Maltz D et al. (2015) Fast route: A scalable load-aware anycast routing architecture for modern cdns. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), pp 381\u2013394, Oakland, CA. USENIX Association."},{"issue":"1","key":"5928_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.2174\/2215081104666150828234320","volume":"4","author":"M Gawannavar","year":"2015","unstructured":"Gawannavar M, Mandulkar P, Thandeeswaran R, Jeyanthi N (2015) Office in cloud: approach to authentication and authorization. Recent Adv Commun Netw Technol Bentham Sci 4(1):49\u201355","journal-title":"Recent Adv Commun Netw Technol Bentham Sci"},{"key":"5928_CR10","doi-asserted-by":"crossref","unstructured":"Hamad SA, Sheng QZ, Zhang WE et al. (2020) Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies, In\u00a0IEEE Communications Surveys and Tutorials, vol. 22, no. 2, pp. 1372\u20131391, Second quarter.","DOI":"10.1109\/COMST.2020.2976075"},{"key":"5928_CR11","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s42979-020-00201-3","volume":"1","author":"A Jurcut","year":"2020","unstructured":"Jurcut A, Niculcea T, Ranaweera P et al. (2020) Security considerations for internet of things: a survey. SN Comput SCI 1:193","journal-title":"SN Comput SCI"},{"key":"5928_CR12","doi-asserted-by":"crossref","unstructured":"Kodali, R., Sarma, N., (2013) Energy-efficient ECC encryption using ECDH. In: Emerging Research in Electronics, Computer Science and Technology, Lecture Notes in Electrical Engineering, Vol. 248. Springer, pp 471\u2013478.","DOI":"10.1007\/978-81-322-1157-0_48"},{"key":"5928_CR13","doi-asserted-by":"crossref","unstructured":"Liu Y, Tome W, Zhang L et al. (2015) An end-to-end measurement of certificate revocation in the web\u2019s PKI. In Proceedings of the 2015 Internet Measurement Conference, pp:183\u2013196, New York, NY, USA. ACM.","DOI":"10.1145\/2815675.2815685"},{"key":"5928_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s13673-020-00224-y","volume":"10","author":"L Megouache","year":"2020","unstructured":"Megouache L, Zitouni A, Djoudi M (2020) Ensuring user authentication and data integrity in multi-cloud environment. Hum Cent Comput Inf Sci 10:15","journal-title":"Hum Cent Comput Inf Sci"},{"key":"5928_CR15","doi-asserted-by":"crossref","unstructured":"Mohiuddin I and Almogren A (2020) Security Challenges and Strategies for the IoT in Cloud Computing,\u00a02020 11th International Conference on Information and Communication Systems (ICICS), pp 367\u2013372.","DOI":"10.1109\/ICICS49469.2020.239563"},{"key":"5928_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jocs.2017.12.010","volume":"26","author":"R Shailendra","year":"2018","unstructured":"Shailendra R, Arun KS, Park JH (2018) A novel framework for internet of knowledge protection in social networking services. J Comput Sci 26:55\u201365","journal-title":"J Comput Sci"},{"key":"5928_CR17","unstructured":"Singh HJS  and  Khanna MS (2020) Cloud's Transformative Involvement in Managing Big-Data Analytics for Securing Data in Transit, Storage And Use: A Study,\u00a02020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp 297\u2013302."},{"key":"5928_CR18","doi-asserted-by":"crossref","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J., 2005. Accelerating AES using instruction set extensions for Elliptic Curve cryptography. In: Computational Science and its Applications\u2013ICCSA, vol. 3481., pp 665\u2013675.","DOI":"10.1007\/11424826_70"},{"key":"5928_CR19","doi-asserted-by":"publisher","first-page":"18893","DOI":"10.1007\/s00500-020-05119-9","volume":"24","author":"VK Veerabathiran","year":"2020","unstructured":"Veerabathiran VK, Mani D, Kuppusamy S et al (2020) Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption. Soft Comput 24:18893\u201318908","journal-title":"Soft Comput"},{"key":"5928_CR20","doi-asserted-by":"publisher","first-page":"103216","DOI":"10.1016\/j.micpro.2020.103216","volume":"78","author":"V Vijaya Kumar","year":"2020","unstructured":"Vijaya Kumar V, Devi M, Vishnu Raja P, Kanmani P, Priya V (2020) Sengan Sudhakar, Krishnamoorthy Sujatha, Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture. Microprocess Microsyst 78:103216","journal-title":"Microprocess Microsyst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05928-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-05928-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05928-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T11:13:03Z","timestamp":1629198783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-05928-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,10]]},"references-count":20,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["5928"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-05928-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,10]]},"assertion":[{"value":"31 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}