{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:01:35Z","timestamp":1775044895524,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T00:00:00Z","timestamp":1704326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T00:00:00Z","timestamp":1704326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s00500-023-09514-w","type":"journal-article","created":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T15:02:18Z","timestamp":1704380538000},"page":"1313-1328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Development of trust-based authorization and authentication framework for secure electronic health payment in cloud environment"],"prefix":"10.1007","volume":"30","author":[{"given":"A.","family":"Saranya","sequence":"first","affiliation":[]},{"given":"R.","family":"Naresh","sequence":"additional","affiliation":[]},{"given":"Santhi","family":"Karuppiah","sequence":"additional","affiliation":[]},{"given":"M.","family":"Jenifer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,4]]},"reference":[{"key":"9514_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121257","volume":"235","author":"AN Akkilic","year":"2024","unstructured":"Akkilic AN, Sabir Z, Bhat SA, Bulut H (2024) A radial basis deep neural network process using the Bayesian regularization optimization for the monkeypox transmission model. Expert Syst Appl 235:121257","journal-title":"Expert Syst Appl"},{"key":"9514_CR2","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1007\/s00500-019-04220-y","volume":"24","author":"A Al-Qerem","year":"2020","unstructured":"Al-Qerem A, Alauthman M, Almomani A, Gupta B (2020) IoT transaction processing through cooperative concurrency control on fog\u2013cloud computing environment. Soft Comput 24:5695\u20135711. https:\/\/doi.org\/10.1007\/s00500-019-04220-y","journal-title":"Soft Comput"},{"key":"9514_CR3","doi-asserted-by":"publisher","unstructured":"Banyal R, Jain V, Jain P (2014) Dynamic trust-based access control framework for securing multi-cloud environment. In: Proceedings of the 2014 international conference on information and communication technology for competitive strategies, pp 1\u20138. https:\/\/doi.org\/10.1145\/2677855.2677884","DOI":"10.1145\/2677855.2677884"},{"key":"9514_CR4","doi-asserted-by":"publisher","unstructured":"Ezhilarasi T, Kumar NS, Latchoumi T, Balayesu N (2019) A secure data sharing using IDSS CP-ABE in cloud storage. In: Advances in industrial automation and smart manufacturing. Springer, pp 1073\u20131085. https:\/\/doi.org\/10.1007\/978-981-15-4739-3_92","DOI":"10.1007\/978-981-15-4739-3_92"},{"key":"9514_CR22","doi-asserted-by":"crossref","unstructured":"Hajira Be A, Balasubramanian R (2018) Developing an enhanced high-speed key transmission (EHSKT) technique to avoid fraud activity in E-commerce 12:1187\u20131194","DOI":"10.11591\/ijeecs.v12.i3.pp1187-1194"},{"key":"9514_CR5","doi-asserted-by":"publisher","first-page":"216","DOI":"10.25255\/jbm.2019.7.3.216.233","volume":"7","author":"RK Kanaan","year":"2019","unstructured":"Kanaan RK, Abumatar G, Hussein AMA, Al-Lozi M (2019) Management information system using blockchain technology in an E-commerce enterprise: a systematic review. J Bus Manag (COES&RJ-JBM) 7:216\u2013233. https:\/\/doi.org\/10.25255\/jbm.2019.7.3.216.233","journal-title":"J Bus Manag (COES&RJ-JBM)"},{"key":"9514_CR6","doi-asserted-by":"publisher","first-page":"4720","DOI":"10.3390\/s20174720","volume":"20","author":"H Li","year":"2020","unstructured":"Li H, Lan C, Fu X, Wang C, Li F, Guo H (2020) A secure and lightweight fine-grained data sharing scheme for mobile cloud computing. Sensors 20:4720. https:\/\/doi.org\/10.3390\/s20174720","journal-title":"Sensors"},{"key":"9514_CR20","first-page":"54","volume":"10","author":"AP Mohan","year":"2020","unstructured":"Mohan AP, Gladston A (2020) Merkle tree and Blockchain-based cloud data auditing. Int J Cloud Appl Comput (IJCAC) 10:54\u201366","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"9514_CR23","doi-asserted-by":"crossref","unstructured":"Mohit P, Amin R, Biswas G (2017) Design of secure and efficient electronic payment system for mobile users. In Int Conf Math Comput 34\u201343","DOI":"10.1007\/978-981-10-4642-1_4"},{"key":"9514_CR24","doi-asserted-by":"crossref","unstructured":"Musaev E, Yousoof M (2015) A review on Internet banking security and privacy issues in Oman. In Proceedings of the 2015 IEEE International Conference on Industrial Technology, Seville, Spain, pp. 17\u201319","DOI":"10.15849\/icit.2015.0070"},{"key":"9514_CR21","unstructured":"Narayanan U, Paul V, Joseph S (2020) A novel system architecture for secure authentication and data sharing in cloudenabled Big Data Environment. J King Saud University-Comput Inf Sci"},{"issue":"8","key":"9514_CR7","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1007\/s10586-020-03157-4","volume":"23","author":"R Naresh","year":"2019","unstructured":"Naresh R, Sayeekumar M, Karthick GM, Supraja P (2019) Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput 23(8):2561\u20132574. https:\/\/doi.org\/10.1007\/s10586-020-03157-4","journal-title":"Soft Comput"},{"key":"9514_CR25","doi-asserted-by":"crossref","unstructured":"Rajendran B, Pandey AK, Bindhumadhava B (2017) Secure and privacy-preserving digital payment. In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI). 1\u20135","DOI":"10.1109\/UIC-ATC.2017.8397623"},{"key":"9514_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112660","volume":"164","author":"Z Sabir","year":"2022","unstructured":"Sabir Z, Said SB, Baleanu D (2022a) Swarming optimization to analyze the fractional derivatives and perturbation factors for the novel singular model. Chaos Solitons Fractals 164:112660","journal-title":"Chaos Solitons Fractals"},{"issue":"10","key":"9514_CR9","doi-asserted-by":"publisher","first-page":"2240241","DOI":"10.1142\/S0218348X22402411","volume":"30","author":"Z Sabir","year":"2022","unstructured":"Sabir Z, Raja MAZ, Javeed S, Guerrero-Sanchez Y (2022b) Numerical investigations of a fractional nonlinear dengue model using artificial neural networks. Fractals 30(10):2240241","journal-title":"Fractals"},{"issue":"7","key":"9514_CR10","doi-asserted-by":"publisher","first-page":"8913","DOI":"10.1007\/s12652-021-03638-3","volume":"14","author":"Z Sabir","year":"2023","unstructured":"Sabir Z, Ali MR, Sadat R (2023a) Gudermannian neural networks using the optimization procedures of genetic algorithm and active set approach for the three-species food chain nonlinear model. J Ambient Intell Humaniz Comput 14(7):8913\u20138922","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"9514_CR11","doi-asserted-by":"crossref","unstructured":"Sabir Z, Manuel SC, Raja MAZ, Seminario-Morales MV, Arqu\u00edmedes J, V\u00e1squez F, Nazario C, Leonardo P, Botmart T, Weera W (2023) Stochastic computational heuristic for the fractional biological model based on leptospirosis. Comput Mater Continua 74(2)","DOI":"10.32604\/cmc.2023.033352"},{"issue":"2","key":"9514_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.arabjc.2022.104493","volume":"16","author":"Z Sabir","year":"2023","unstructured":"Sabir Z, Sadat R, Ali MR, Said SB, Azhar M (2023c) A numerical performance of the novel fractional water pollution model through the Levenberg\u2013Marquardt backpropagation method. Arab J Chem 16(2):104493","journal-title":"Arab J Chem"},{"key":"9514_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10482-1","author":"A Saranya","year":"2021","unstructured":"Saranya A, Naresh R (2021) Efficient mobilesecurityfor E-healthcare application in cloud for secure payment using key distribution. Neural Process Lett. https:\/\/doi.org\/10.1007\/s11063-021-10482-1","journal-title":"Neural Process Lett"},{"issue":"1","key":"9514_CR14","doi-asserted-by":"publisher","first-page":"2155","DOI":"10.32604\/cmc.2023.034699","volume":"75","author":"S Suantai","year":"2023","unstructured":"Suantai S, Sabir Z, Raja MAZ, Cholamjiak W (2023) Numerical computation of SEIR model for the Zika virus spreading. CMC-Comput Mater Continua 75(1):2155\u20132170","journal-title":"CMC-Comput Mater Continua"},{"key":"9514_CR15","doi-asserted-by":"crossref","unstructured":"Weera W, Botmart T, Chantawat C, Sabir Z, Adel W, Raja MAZ, Kristiawan M (2023a) An intelligence computational approach for the fractional 4D chaotic financial model. Comput Mater Continua 74(2)","DOI":"10.32604\/cmc.2023.033233"},{"key":"9514_CR16","doi-asserted-by":"crossref","unstructured":"Weera W, Zamart C, Sabir Z, Zahoor Raja MA, Alwabli AS, Mahmoud SR, Wongaree S, Botmart T (2023b) Fractional order environmental and economic model investigations using artificial neural network. Comput Mater Continua 74(1)","DOI":"10.32604\/cmc.2023.032950"},{"key":"9514_CR17","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757\u201314767. https:\/\/doi.org\/10.1109\/ACCESS.2017.2730843","journal-title":"IEEE Access"},{"key":"9514_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MNET.2018.1700341","volume":"32","author":"K Xue","year":"2018","unstructured":"Xue K, Hong J, Ma Y, Wei DS, Hong P, Yu N (2018) Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Netw 32:7\u201313","journal-title":"IEEE Netw"},{"key":"9514_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03373-6","author":"M Zhang","year":"2021","unstructured":"Zhang M, Lin L, Chen Z (2021) Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-021-03373-6","journal-title":"Cluster Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09514-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09514-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09514-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T07:29:55Z","timestamp":1772090995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09514-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,4]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["9514"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09514-w","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,4]]},"assertion":[{"value":"23 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Conflict of Interest is not applicable in this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No participation of humans takes place in this implementation process.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"No violation of human and animal rights is involved.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}]}}