{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T18:30:02Z","timestamp":1777746602780,"version":"3.51.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00500-024-10322-z","type":"journal-article","created":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T08:04:25Z","timestamp":1733558665000},"page":"13371-13387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A novel hybrid dwarf-based Archimedes optimization (HDAO) algorithm for preserving secure data in a cloud computing environment"],"prefix":"10.1007","volume":"28","author":[{"given":"Gasim","family":"Alandjani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,7]]},"reference":[{"key":"10322_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2022.114570","volume":"391","author":"JO Agushaka","year":"2022","unstructured":"Agushaka JO, Ezugwu AE, Abualigah L (2022) Dwarf mongoose optimization algorithm. Comput Methods Appl Mech Eng 391:114570","journal-title":"Comput Methods Appl Mech Eng"},{"key":"10322_CR2","unstructured":"Ahamad D, Hameed SA, Akhtar M (2020) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization.\u00a0J King Saud Univ Comput Inf Sci"},{"key":"10322_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.comcom.2021.11.005","volume":"182","author":"YI Alzoubi","year":"2022","unstructured":"Alzoubi YI, Al-Ahmad A, Kahtan H (2022) Blockchain technology as a Fog computing security and privacy solution: an overview. Comput Commun 182:129\u2013152","journal-title":"Comput Commun"},{"issue":"4","key":"10322_CR4","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1007\/s12083-022-01322-7","volume":"15","author":"K Anand","year":"2022","unstructured":"Anand K, Vijayaraj A, Vijay Anand M (2022) An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud. Peer-to-Peer Netw Appl 15(4):2007\u20132020","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"10322_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12065-018-0162-4","volume":"11","author":"MM Annie Alphonsa","year":"2018","unstructured":"Annie Alphonsa MM, Amudhavalli P (2018) Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evol Intell 11(1):101\u2013116","journal-title":"Evol Intell"},{"key":"10322_CR6","doi-asserted-by":"crossref","unstructured":"Arora AS, Raja L, Bahl B (2018) Data centric security approach: a way to achieve security & privacy in cloud computing. In: Proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT), pp 26\u201327","DOI":"10.2139\/ssrn.3168615"},{"key":"10322_CR7","doi-asserted-by":"crossref","unstructured":"Awaysheh FM, Aladwan MN, Alazab M, Alawadi S, Cabaleiro JC, Pena TF (2021) Security by design for big data frameworks over cloud computing.\u00a0IEEE Trans Eng Manag","DOI":"10.1109\/TEM.2020.3045661"},{"issue":"2","key":"10322_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.eij.2018.12.001","volume":"20","author":"NA Azeez","year":"2019","unstructured":"Azeez NA, Van der Vyver C (2019) Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egypt Inform J 20(2):97\u2013108","journal-title":"Egypt Inform J"},{"issue":"04","key":"10322_CR9","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1142\/S0219622020500200","volume":"19","author":"B Balashunmugaraja","year":"2020","unstructured":"Balashunmugaraja B, Ganeshbabu TR (2020) Optimal key generation for data sanitization and restoration of cloud data: future of financial cyber security. Int J Inf Technol Decis Mak 19(04):987\u20131013","journal-title":"Int J Inf Technol Decis Mak"},{"key":"10322_CR10","doi-asserted-by":"crossref","unstructured":"Chen CM, Chaudhry SA, Yeh KH, Aman MN (2022) Security, trust and privacy for cloud, fog and internet of things.\u00a0Secur Commun Netw","DOI":"10.1155\/2022\/9841709"},{"key":"10322_CR11","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361\u201374382","journal-title":"IEEE Access"},{"key":"10322_CR12","doi-asserted-by":"crossref","unstructured":"Deepika J, Rajan C, Senthil T (2021) Security and privacy of cloud-and IoT-based medical image diagnosis using fuzzy convolutional neural network.\u00a0Comput Intell Neurosci","DOI":"10.1155\/2021\/6615411"},{"key":"10322_CR13","unstructured":"Gupta R, Saxena D, Singh AK (2021) Data security and privacy in cloud computing: concepts and emerging trends. arXiv:2108.09508."},{"issue":"3","key":"10322_CR14","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s10489-020-01893-z","volume":"51","author":"FA Hashim","year":"2021","unstructured":"Hashim FA, Hussain K, Houssein EH, Mabrouk MS, Al-Atabany W (2021) Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl Intell 51(3):1531\u20131551","journal-title":"Appl Intell"},{"key":"10322_CR15","doi-asserted-by":"crossref","unstructured":"Karthiban K, Smys S (2018) Privacy-preserving approaches in cloud computing. In: 2018 2nd international conference on inventive systems and control (ICISC). IEEE, pp 462\u2013467","DOI":"10.1109\/ICISC.2018.8399115"},{"issue":"3","key":"10322_CR16","first-page":"215","volume":"16","author":"W Kong","year":"2018","unstructured":"Kong W, Lei Y, Ma J (2018) Data security and privacy information challenges in cloud computing. Int J Comput Sci Eng 16(3):215\u2013218","journal-title":"Int J Comput Sci Eng"},{"key":"10322_CR17","doi-asserted-by":"crossref","unstructured":"Kumar A (2022) A cloud-based buyer-seller watermarking protocol (CB-BSWP) using a semi-trusted third party for copy deterrence and privacy-preserving.\u00a0Multim Tools Appl 1\u201332","DOI":"10.1007\/s11042-022-12550-7"},{"key":"10322_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101954","volume":"115","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) TP2SF: a trustworthy privacy-preserving secure framework for sustainable smart cities by leveraging blockchain and machine learning. J Syst Archit 115:101954","journal-title":"J Syst Archit"},{"key":"10322_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110540","volume":"271","author":"C Liu","year":"2023","unstructured":"Liu C, Wu L, Xiao W, Li G, Xu D, Guo J, Li W (2023) An improved heuristic mechanism ant colony optimization algorithm for solving path planning. Knowl Based Syst 271:110540","journal-title":"Knowl Based Syst"},{"issue":"7","key":"10322_CR20","first-page":"810","volume":"33","author":"AT Lo'ai","year":"2021","unstructured":"Lo\u2019ai AT, Saldamli G (2021) Reconsidering big data security and privacy in cloud and mobile cloud systems. J King Saud Univ Comput Inf Sci 33(7):810\u2013819","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"4","key":"10322_CR21","doi-asserted-by":"publisher","first-page":"2725","DOI":"10.1109\/COMST.2020.3012961","volume":"22","author":"A Masood","year":"2020","unstructured":"Masood A, Lakew DS, Cho S (2020) Security and privacy challenges in connected vehicular cloud computing. IEEE Commun Surv Tutor 22(4):2725\u20132764","journal-title":"IEEE Commun Surv Tutor"},{"key":"10322_CR22","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.procs.2019.11.018","volume":"160","author":"S Parikh","year":"2019","unstructured":"Parikh S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in the cloud, fog, and edge computing. Procedia Comput Sci 160:734\u2013739","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"10322_CR23","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s11277-018-5284-6","volume":"103","author":"BS Rawal","year":"2018","unstructured":"Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N (2018) Secure disintegration protocol for privacy-preserving cloud storage. Wirel Pers Commun 103(2):1161\u20131177","journal-title":"Wirel Pers Commun"},{"issue":"7","key":"10322_CR24","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.3390\/math10071050","volume":"10","author":"AM Sadoun","year":"2022","unstructured":"Sadoun AM, Najjar IR, Alsoruji GS, Wagih A, Abd Elaziz M (2022) Utilizing a long short-term memory algorithm modified by dwarf mongoose optimization to predict thermal expansion of Cu-Al2O3 nanocomposites. Mathematics 10(7):1050","journal-title":"Mathematics"},{"issue":"5","key":"10322_CR25","doi-asserted-by":"publisher","first-page":"742","DOI":"10.3390\/sym13050742","volume":"13","author":"R Sivan","year":"2021","unstructured":"Sivan R, Zukarnain ZA (2021) Security and privacy in cloud-based e-health system. Symmetry 13(5):742","journal-title":"Symmetry"},{"key":"10322_CR26","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.compeleceng.2018.06.006","volume":"71","author":"N Subramanian","year":"2018","unstructured":"Subramanian N, Jeyaraj A (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28\u201342","journal-title":"Comput Electr Eng"},{"key":"10322_CR27","doi-asserted-by":"publisher","first-page":"147420","DOI":"10.1109\/ACCESS.2019.2946185","volume":"7","author":"PJ Sun","year":"2019","unstructured":"Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7:147420\u2013147452","journal-title":"IEEE Access"},{"issue":"2","key":"10322_CR28","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s10586-020-03157-4","volume":"24","author":"M Tahir","year":"2021","unstructured":"Tahir M, Sardaraz M, Mehmood Z, Muhammad S (2021) CryptoGA: a cryptosystem based on a genetic algorithm for cloud data security. Clust Comput 24(2):739\u2013752","journal-title":"Clust Comput"},{"key":"10322_CR29","doi-asserted-by":"crossref","unstructured":"Wani AR, Rana QP, Pandey N (2019) Analysis and countermeasures for security and privacy issues in cloud computing. In: System performance and management analytics. Springer, Singapore, pp 47\u201354","DOI":"10.1007\/978-981-10-7323-6_4"},{"key":"10322_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119410","volume":"215","author":"L Wu","year":"2023","unstructured":"Wu L, Huang X, Cui J, Liu C, Xiao W (2023) Modified adaptive ant colony optimization algorithm and its application for solving path planning of mobile robot. Expert Syst Appl 215:119410","journal-title":"Expert Syst Appl"},{"key":"10322_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2021.117449","volume":"301","author":"L Zhang","year":"2021","unstructured":"Zhang L, Wang J, Niu X, Liu Z (2021) Ensemble wind speed forecasting with multi-objective Archimedes optimization algorithm and sub-model selection. Appl Energy 301:117449","journal-title":"Appl Energy"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10322-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-024-10322-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10322-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T13:17:01Z","timestamp":1734959821000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-024-10322-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":31,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10322"],"URL":"https:\/\/doi.org\/10.1007\/s00500-024-10322-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"26 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}