{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:14:15Z","timestamp":1768918455469,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T00:00:00Z","timestamp":1541116800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s00521-018-3774-9","type":"journal-article","created":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T20:45:36Z","timestamp":1541191536000},"page":"293-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT)"],"prefix":"10.1007","volume":"31","author":[{"given":"M. P.","family":"Gopinath","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. S.","family":"Tamizharasi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Kavisankar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Sathyaraj","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Karthi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. L.","family":"Aarthy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Balamurugan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,11,2]]},"reference":[{"issue":"1","key":"3774_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22\u201332","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"3774_CR2","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1016\/j.jnca.2012.07.012","volume":"35","author":"MC Domingo","year":"2012","unstructured":"Domingo MC (2012) An overview of the internet of underwater things. J Netw Comput Appl 35(6):1879\u20131890","journal-title":"J Netw Comput Appl"},{"issue":"7","key":"3774_CR3","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.3390\/s17071477","volume":"17","author":"C-C Kao","year":"2017","unstructured":"Kao C-C, Lin Y-S, Geng-De W, Huang C-J (2017) A comprehensive study on the internet of underwater things: applications, challenges, and channel models. Sensors 17(7):1477","journal-title":"Sensors"},{"issue":"2\u20135","key":"3774_CR4","first-page":"97","volume":"9","author":"AF Abdillah","year":"2017","unstructured":"Abdillah AF, Berlian MH, Panduman YYF, Akbar MAW, Afifah MA, Tjahjono A, Sukaridhoto S, Sasaki S (2017) Design and development of low cost coral monitoring system for shallow water based on internet of underwater things. J Telecommun Electron Comput Eng 9(2\u20135):97\u2013101","journal-title":"J Telecommun Electron Comput Eng"},{"issue":"11","key":"3774_CR5","doi-asserted-by":"publisher","first-page":"4072","DOI":"10.1109\/JSEN.2015.2437904","volume":"16","author":"Z Zhou","year":"2015","unstructured":"Zhou Z, Yao B, Xing R, Shu L, Shengrong B (2015) E-carp: an energy efficient routing protocol for uwsns in the internet of underwater things. IEEE Sens J 16(11):4072\u20134082","journal-title":"IEEE Sens J"},{"key":"3774_CR6","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"3774_CR7","unstructured":"Kao C-C, Lin Y-S, Wu G-D, Huang C-J (2017) A study of applications, challenges, and channel models on the internet of underwater things. In: 2017 international conference on applied system innovation (ICASI). IEEE, pp 1375\u20131378"},{"issue":"5","key":"3774_CR8","first-page":"330","volume":"5","author":"K Urunov","year":"2015","unstructured":"Urunov K, Namgung J-I, Park S-H (2015) Security challenges of DTN mechanism for IoUT. Int J Inf Electron Eng 5(5):330","journal-title":"Int J Inf Electron Eng"},{"issue":"1","key":"3774_CR9","first-page":"45","volume":"19","author":"YA Younis","year":"2014","unstructured":"Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45\u201360","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"3774_CR10","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TDSC.2015.2406705","volume":"13","author":"Y Cheng","year":"2016","unstructured":"Cheng Y, Park J, Sandhu R (2016) An access control model for online social networks using user-to-user relationships. IEEE Trans Dependable Secure Comput 13(4):424\u2013436","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"3774_CR11","unstructured":"Dittrich KR, H\u00e4rtig M, Pfefferle H (1988) Discretionary access control in structurally object-oriented database systems. In: DBSec, pp 105\u2013121"},{"key":"3774_CR12","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1007\/978-0-387-39940-9_135","volume-title":"Encyclopedia of database systems","author":"G-J Ahn","year":"2009","unstructured":"Ahn G-J (2009) Discretionary access control. In: Liu L, \u00d6zsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 864\u2013866"},{"key":"3774_CR13","first-page":"353","volume-title":"Encyclopedia of cryptography and security","author":"Li Ninghui","year":"2011","unstructured":"Ninghui Li (2011) Discretionary access control. In: Van Tilborg HC, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 353\u2013356"},{"key":"3774_CR14","doi-asserted-by":"crossref","unstructured":"Downs DD, Rub JR, Kung KC, Jordan CS (1985) Issues in discretionary access control. In: IEEE symposium on security and privacy, 1985. IEEE, pp 208\u2013208","DOI":"10.1109\/SP.1985.10014"},{"issue":"9","key":"3774_CR15","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40\u201348","journal-title":"IEEE Commun Mag"},{"key":"3774_CR16","unstructured":"Lindqvist H (2006) Mandatory access control. Master\u2019s thesis in computing science, Umea University, Department of Computing Science, SE-901, p 87"},{"key":"3774_CR17","doi-asserted-by":"crossref","unstructured":"La Padula LJ (1990) Formal modeling in a generalized framework for access control. In: Computer security foundations workshop III, 1990. Proceedings. IEEE, pp 100\u2013109","DOI":"10.1109\/CSFW.1990.128190"},{"key":"3774_CR18","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1007\/978-1-4419-5906-5_784","volume-title":"Encyclopedia of cryptography and security","author":"S Upadhyaya","year":"2011","unstructured":"Upadhyaya S (2011) Mandatory access control. In: Encyclopedia of cryptography and security. Springer, Boston, pp 756\u2013758"},{"key":"3774_CR19","doi-asserted-by":"crossref","first-page":"1684","DOI":"10.1007\/978-0-387-39940-9_214","volume-title":"Encyclopedia of database systems","author":"B Thuraisingham","year":"2009","unstructured":"Thuraisingham B (2009) Mandatory access control. In: Liu L, \u00d6zsu MT (eds) Encyclopedia of database systems. Springer, New York, pp 1684\u20131685"},{"key":"3774_CR20","unstructured":"Thompson TJ, James HH\u00a0II, Durant WR (2013) Hierarchy-aware role-based access control, March\u00a019. US Patent 8,402,514"},{"issue":"12","key":"3774_CR21","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TIFS.2013.2286456","volume":"8","author":"L Zhou","year":"2013","unstructured":"Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947\u20131960","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"3774_CR22","doi-asserted-by":"publisher","first-page":"961","DOI":"10.3233\/JCS-140510","volume":"22","author":"E Uzun","year":"2014","unstructured":"Uzun E, Atluri V, Vaidya J, Sural S, Ferrara AL, Parlato G, Madhusudan P (2014) Security analysis for temporal role based access control. J Comput Secur 22(6):961\u2013996","journal-title":"J Comput Secur"},{"key":"3774_CR23","doi-asserted-by":"crossref","unstructured":"Ranise S, Truong A, Armando A (2014) Scalable and precise automated analysis of administrative temporal role-based access control. In: Proceedings of the 19th ACM symposium on access control models and technologies. ACM, pp 103\u2013114","DOI":"10.1145\/2613087.2613102"},{"key":"3774_CR24","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"3774_CR25","doi-asserted-by":"crossref","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 195\u2013203","DOI":"10.1145\/1315245.1315270"},{"key":"3774_CR26","unstructured":"Melissa C (2007) Multi-authority attribute based encryption. In: Theory of cryptography conference. Springer, pp 515\u2013534"},{"issue":"2","key":"3774_CR27","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743\u2013754","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"3774_CR28","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"W Guojun","year":"2011","unstructured":"Guojun W, Qin L, Jie W, Minyi G (2011) Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30(5):320\u2013331","journal-title":"Comput Secur"},{"key":"3774_CR29","doi-asserted-by":"crossref","unstructured":"Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on Computer and communications security. ACM, pp 21\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"3774_CR30","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.comnet.2017.06.013","volume":"129","author":"E Ahmed","year":"2017","unstructured":"Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in internet of things. Comput Netw 129:459\u2013471","journal-title":"Comput Netw"},{"issue":"13","key":"3774_CR31","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1016\/j.ins.2010.03.004","volume":"180","author":"H Lin","year":"2010","unstructured":"Lin H, Cao Z, Liang X, Shao J (2010) Secure threshold multi authority attribute based encryption without a central authority. Inf Sci 180(13):2618\u20132632","journal-title":"Inf Sci"},{"key":"3774_CR32","doi-asserted-by":"crossref","unstructured":"Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM, pp 386\u2013390","DOI":"10.1145\/1966913.1966964"},{"issue":"1","key":"3774_CR33","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li M, Shucheng Y, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3774_CR34","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International conference on financial cryptography and data security. Springer, pp 315\u2013332","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"3774_CR35","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-1-4614-7873-7_4","volume-title":"Security for cloud storage systems","author":"K Yang","year":"2014","unstructured":"Yang K, Jia X (2014) DAC-MACS: effective data access control for multi-authority cloud storage systems. In: Yang K, Jia X (eds) Security for cloud storage systems. Springer, Berlin, pp 59\u201383"},{"key":"3774_CR36","doi-asserted-by":"publisher","unstructured":"Wang C, Luo J (2013) An efficient key-policy attribute-based encryption scheme with constant ciphertext length. Math Probl Eng 2013. https:\/\/doi.org\/10.1155\/2013\/810969","DOI":"10.1155\/2013\/810969"},{"key":"3774_CR37","first-page":"90","volume-title":"International workshop on public key cryptography","author":"N Attrapadung","year":"2011","unstructured":"Attrapadung N, Libert B, De Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International workshop on public key cryptography. Springer, Berlin, Heidelberg, pp 90\u2013108"},{"key":"3774_CR38","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP\u201907. IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"3774_CR39","doi-asserted-by":"crossref","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International workshop on public key cryptography. Springer, pp 53\u201370","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"3774_CR40","doi-asserted-by":"crossref","unstructured":"Liang KFL, Susilo W, Wong DS (2013) A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In: 5th international conference on intelligent networking and collaborative systems (INCoS), 2013. IEEE, pp 552\u2013559","DOI":"10.1109\/INCoS.2013.103"},{"issue":"1","key":"3774_CR41","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2013.200","volume":"64","author":"Z Zhou","year":"2015","unstructured":"Zhou Z, Huang D, Wang Z (2015) Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans Comput 64(1):126\u2013138","journal-title":"IEEE Trans Comput"},{"key":"3774_CR42","doi-asserted-by":"publisher","first-page":"4897","DOI":"10.1002\/sec.1663","volume":"9","author":"L Liu","year":"2016","unstructured":"Liu L, Lai J, Deng RH, Li Y (2016) Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur Commun Netw 9:4897\u20134913","journal-title":"Secur Commun Netw"},{"key":"3774_CR43","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1016\/j.future.2017.01.026","volume":"78","author":"Y Jiang","year":"2017","unstructured":"Jiang Y, Susilo W, Mu Y, Guo F (2017) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720\u2013729","journal-title":"Future Gener Comput Syst"},{"key":"3774_CR44","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/ACCESS.2017.2651904","volume":"5","author":"L Li","year":"2017","unstructured":"Li L, Tianlong G, Chang L, Zhoubo X, Liu Y, Qian J (2017) A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram. IEEE Access 5:1137\u20131145","journal-title":"IEEE Access"},{"key":"3774_CR45","unstructured":"Roy S, Chuah M (2009) Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical report, Citeseer"},{"issue":"18","key":"3774_CR46","doi-asserted-by":"publisher","first-page":"5265","DOI":"10.1007\/s00500-016-2244-5","volume":"21","author":"J Xu","year":"2017","unstructured":"Xu J, Wen Q, Li W, Shen J, He D (2017) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265\u20135279","journal-title":"Soft Comput"},{"key":"3774_CR47","doi-asserted-by":"crossref","unstructured":"Chow SSM (2016) A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on symposium on access control models and technologies. ACM, pp 215\u2013226","DOI":"10.1145\/2914642.2914659"},{"issue":"1","key":"3774_CR48","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","volume":"22","author":"H Zhong","year":"2018","unstructured":"Zhong H, Zhu W, Xu Y, Cui J (2018) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243\u2013251","journal-title":"Soft Comput"},{"issue":"3","key":"3774_CR49","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1080\/10798587.2015.1132586","volume":"22","author":"H Yan","year":"2016","unstructured":"Yan H, Li J, Li X, Zhao G, Lee S-Y, Shen J (2016) Secure access control of e-health system with attribute-based encryption. Intell Autom Soft Comput 22(3):345\u2013352","journal-title":"Intell Autom Soft Comput"},{"key":"3774_CR50","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/j.future.2016.12.027","volume":"78","author":"Y Liu","year":"2017","unstructured":"Liu Y, Zhang Y, Ling J, Liu Z (2017) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener Comput Syst 78:1020\u20131026","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"3774_CR51","first-page":"83","volume":"3","author":"D Prathyusha","year":"2016","unstructured":"Prathyusha D, Murty MS (2016) Access control mechanism on e-health care cloud data storage. Int J Res 3(4):83\u201389","journal-title":"Int J Res"},{"key":"3774_CR52","doi-asserted-by":"crossref","unstructured":"Pescosolido L, Berta R, Scalise L, Revel GM, De\u00a0Gloria A, Orlandi G (2016) An IOT-inspired cloud-based web service architecture for e-health applications. In: 2016 IEEE international smart cities conference (ISC2). IEEE, pp 1\u20134","DOI":"10.1109\/ISC2.2016.7580759"},{"key":"3774_CR53","unstructured":"Liou E-C, Kao C-C, Chang C-H, Lin Y-S, Huang C-J (2018) Internet of underwater things: challenges and routing protocols. In: 2018 IEEE international conference on applied system invention (ICASI). IEEE, pp 1171\u20131174"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3774-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3774-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3774-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,14]],"date-time":"2020-11-14T15:41:08Z","timestamp":1605368468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3774-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,2]]},"references-count":53,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["3774"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3774-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,2]]},"assertion":[{"value":"28 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"There is no conflict of interest between the authors to publish this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}