{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T05:20:37Z","timestamp":1778390437374,"version":"3.51.4"},"reference-count":164,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"DOI":"10.1007\/s10462-024-10908-x","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T05:02:29Z","timestamp":1724734949000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard"],"prefix":"10.1007","volume":"57","author":[{"given":"Mayank","family":"Pathak","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kamta Nath","family":"Mishra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Satya Prakash","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"10908_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170084","volume":"271","author":"ZA Abdulkader","year":"2022","unstructured":"Abdulkader ZA (2022) Cloud data security mechanism using the lightweight cryptography. Optik 271:170084","journal-title":"Optik"},{"key":"10908_CR2","doi-asserted-by":"crossref","unstructured":"Abdulsalam YS, Hedabou M (2021) Decentralized data integrity scheme for preserving privacy in cloud computing. In 2021 International conference on security, pattern analysis, and cybernetics (SPAC), Chengdu, China, pp 607\u2013612","DOI":"10.1109\/SPAC53836.2021.9539946"},{"key":"10908_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.285","author":"AK Abed","year":"2022","unstructured":"Abed AK, Anupam A (2022) Review of security issues in the Internet of Things and artificial intelligence-driven solutions. Internet Technol Lett. https:\/\/doi.org\/10.1002\/spy2.285","journal-title":"Internet Technol Lett"},{"key":"10908_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018) Big healthcare data: preserving security and privacy. J Big Data 5:1","journal-title":"J Big Data"},{"key":"10908_CR5","doi-asserted-by":"publisher","first-page":"115932","DOI":"10.1109\/ACCESS.2021.3105450","volume":"9","author":"W Ahmed","year":"2021","unstructured":"Ahmed W et al (2021) Security in next generation mobile payment systems: a comprehensive survey. IEEE Access 9:115932\u2013115950","journal-title":"IEEE Access"},{"key":"10908_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/electronics11010016","volume":"11","author":"W Ahmad","year":"2022","unstructured":"Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z (2022) Cyber security in IoT-based cloud computing: a comprehensive survey. Electronics 11:16","journal-title":"Electronics"},{"key":"10908_CR7","doi-asserted-by":"crossref","unstructured":"Akmal M, Syangtan B, Alchouemi A (2021) Enhancing the security of data in cloud computing environments using Remote Data Auditing. In: 2021 IEEE 6th International conference on innovative technology in intelligent system and industrial applications (CITISIA), Sydney, Australia, pp 1\u201310","DOI":"10.1109\/CITISIA53721.2021.9719899"},{"key":"10908_CR8","doi-asserted-by":"publisher","first-page":"2646","DOI":"10.3390\/electronics12122646","volume":"12","author":"A Alabdulatif","year":"2023","unstructured":"Alabdulatif A, Thilakarathne NN, Kalinaki K (2023) A novel cloud enabled access control model for preserving the security and privacy of medical Big Data. Electronics 12:2646","journal-title":"Electronics"},{"key":"10908_CR9","doi-asserted-by":"crossref","unstructured":"Albugmi A, Alassafi MO, Walters R, Wills G (2016) Data security in cloud computing. 2016 Fifth International conference on future generation communication technologies (FGCT), London, UK, pp. 55\u201359","DOI":"10.1109\/FGCT.2016.7605062"},{"key":"10908_CR10","doi-asserted-by":"publisher","first-page":"152476","DOI":"10.1109\/ACCESS.2021.3124262","volume":"9","author":"A Al-Dhaqm","year":"2021","unstructured":"Al-Dhaqm A et al (2021) Digital forensics subdomains: the state of the art and future directions. IEEE Access 9:152476\u2013152502","journal-title":"IEEE Access"},{"key":"10908_CR11","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1109\/ACCESS.2017.2757844","volume":"5","author":"HA Al Hamid","year":"2017","unstructured":"Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical Big Data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313\u201322328","journal-title":"IEEE Access"},{"key":"10908_CR12","doi-asserted-by":"crossref","unstructured":"Ali J, Roh BH, Lee B, Oh J, Adil M (2020) A machine learning framework for prevention of software-defined networking controller from DDoS attacks and dimensionality reduction of Big Data. In: 2020 International conference on information and communication technology convergence (ICTC), Jeju, Korea (South), pp 515\u2013519","DOI":"10.1109\/ICTC49870.2020.9289504"},{"key":"10908_CR13","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3390\/computers12080157","volume":"12","author":"W Almutairi","year":"2023","unstructured":"Almutairi W, Moulahi T (2023) Joining federated learning to blockchain for digital forensics in IoT. Computers 12:157","journal-title":"Computers"},{"key":"10908_CR14","first-page":"1027","volume":"12","author":"AK Alnaim","year":"2023","unstructured":"Alnaim AK, Alwakeel AM (2023) Machine-learning-based IoT\u2013edge computing healthcare solutions. Electron MDPI 12:1027","journal-title":"Electron MDPI"},{"key":"10908_CR15","doi-asserted-by":"publisher","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","volume":"9","author":"B Alouffi","year":"2021","unstructured":"Alouffi B, Hasnain M, Alharbi A, Alosaimi W, Alyami H, Ayaz M (2021) A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9:57792\u201357807","journal-title":"IEEE Access"},{"key":"10908_CR16","doi-asserted-by":"crossref","unstructured":"Alrasheed SH, Aiedalhariri M, Adubaykhi SA, El Khediri S (2022) Cloud computing security and challenges: issues, threats, and solutions. In: 2022 5th Conference on cloud and Internet of Things (CIoT), Marrakech, Morocco, pp 166\u2013172","DOI":"10.1109\/CIoT53061.2022.9766571"},{"issue":"6","key":"10908_CR17","doi-asserted-by":"publisher","first-page":"5081","DOI":"10.11591\/ijece.v11i6.pp5081-5088","volume":"11","author":"YI Alzoubi","year":"2021","unstructured":"Alzoubi YI, Ahmad AAA, Jaradat A (2021) Fog computing security and privacy issues, open challenges, and blockchain solution: an overview. Int J Electr Comput Eng (IJECE) 11(6):5081\u20135088","journal-title":"Int J Electr Comput Eng (IJECE)"},{"issue":"6","key":"10908_CR18","doi-asserted-by":"publisher","first-page":"3229","DOI":"10.35940\/ijeat.F8830.088619","volume":"8","author":"J Andrew","year":"2019","unstructured":"Andrew J, Karthikeyan J (2019) Privacy-preserving Internet of Things: techniques and applications. Int J Eng Adv Technol (IJEAT) 8(6):3229","journal-title":"Int J Eng Adv Technol (IJEAT)"},{"key":"10908_CR19","doi-asserted-by":"crossref","unstructured":"Arora A, Khanna A, Rastogi A, Agarwal A (2017) Cloud security ecosystem for data security and privacy. In: 2017 7th International conference on cloud computing, data science & engineering - confluence, Noida, India, IEEE, pp 288\u2013292","DOI":"10.1109\/CONFLUENCE.2017.7943164"},{"key":"10908_CR20","doi-asserted-by":"publisher","first-page":"113498","DOI":"10.1109\/ACCESS.2020.3002815","volume":"8","author":"S Atiewi","year":"2020","unstructured":"Atiewi S, Al-Rahayfeh AA, Almiani M, Yussof S, Alfandi O, Abugabah A, Jararweh Y (2020) Scalable and secure Big Data IoT system based on multifactor authentication and lightweight cryptography. IEEE Access 8:113498\u2013113511","journal-title":"IEEE Access"},{"issue":"6","key":"10908_CR21","doi-asserted-by":"publisher","first-page":"3676","DOI":"10.1109\/TEM.2020.3045661","volume":"69","author":"FM Awaysheh","year":"2022","unstructured":"Awaysheh FM, Aladwan MN, Alazab M, Alawadi S, Cabaleiro JC, Pena TF (2022) Security by design for Big Data frameworks over cloud computing. IEEE Trans Eng Manage 69(6):3676\u20133693","journal-title":"IEEE Trans Eng Manage"},{"issue":"2","key":"10908_CR22","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.eij.2018.12.001","volume":"20","author":"NA Ayofe Azeez","year":"2019","unstructured":"Ayofe Azeez NA, Vyver CVD (2019) Security and privacy issues in e-health cloud-based system: a comprehensive content analysis. Egyptian Inform J 20(2):97\u2013108","journal-title":"Egyptian Inform J"},{"key":"10908_CR23","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"A Basit","year":"2021","unstructured":"Basit A, Zafar M, Liu X et al (2021) A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst 76:139\u2013154","journal-title":"Telecommun Syst"},{"key":"10908_CR24","first-page":"1","volume":"43","author":"RK Bedi","year":"2021","unstructured":"Bedi RK, Singh J, Gupta SK (2021) An efficient and secure privacy-preserving multi-cloud storage framework for mobile devices. Int J Comput Appl 43:1\u201311","journal-title":"Int J Comput Appl"},{"key":"10908_CR25","doi-asserted-by":"crossref","unstructured":"Bertino E (2016) Big Data security and privacy. In: 2016 IEEE International conference on Big Data (Big Data), Washington, DC, USA, pp 3\u20133","DOI":"10.1109\/BigData.2016.7840581"},{"key":"10908_CR26","doi-asserted-by":"publisher","first-page":"20067","DOI":"10.1109\/ACCESS.2019.2962368","volume":"8","author":"M Binjubeir","year":"2020","unstructured":"Binjubeir M, Ahmed AA, Ismail MAB, Sadiq AS, Khurram Khan M (2020) Comprehensive survey on Big Data privacy protection. IEEE Access 8:20067\u201320079","journal-title":"IEEE Access"},{"key":"10908_CR27","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.3390\/sym12071191","volume":"12","author":"C Butpheng","year":"2020","unstructured":"Butpheng C, Yeh K-H, Xiong H (2020) Security and privacy in IoT-cloud-based e-health systems\u2014a comprehensive review. Symmetry MDPI 12:1191","journal-title":"Symmetry MDPI"},{"key":"10908_CR28","doi-asserted-by":"publisher","first-page":"108661","DOI":"10.1016\/j.comnet.2021.108661","volume":"203","author":"EM Campos","year":"2022","unstructured":"Campos EM, Saura PF, Gonz\u00e1lez-Vidal A, Hern\u00e1ndez-Ramos JL, Bernab\u00e9 JB, Baldini G, Skarmeta A (2022) Evaluating federated learning for intrusion detection in Internet of Things: review and challenges. Comput Netw 203:108661","journal-title":"Comput Netw"},{"issue":"2","key":"10908_CR29","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1109\/JIOT.2018.2878658","volume":"6","author":"SC Cha","year":"2019","unstructured":"Cha SC, Hsu TY, Xiang Y, Yeh K-H (2019) Privacy enhancing technologies in the Internet of Things: perspectives and challenges. IEEE Internet Things J 6(2):2159\u20132187","journal-title":"IEEE Internet Things J"},{"key":"10908_CR30","doi-asserted-by":"publisher","DOI":"10.1080\/17538947.2016.1239771","author":"Y Chaowei","year":"2017","unstructured":"Chaowei Y, Qunying H, Zhenlong L, Kai L, Fei H (2017) Big Data and cloud computing: innovation opportunities and challenges. Int J Digit Earth. https:\/\/doi.org\/10.1080\/17538947.2016.1239771","journal-title":"Int J Digit Earth"},{"key":"10908_CR31","doi-asserted-by":"publisher","first-page":"103722","DOI":"10.1016\/j.micpro.2020.103722","volume":"81","author":"J Chen","year":"2021","unstructured":"Chen J, Ramanathan L, Alazab M (2021) Holistic Big Data integrated artificial intelligent modelling to improve privacy and security in data management of smart cities. Microprocess Microsyst 81:103722","journal-title":"Microprocess Microsyst"},{"key":"10908_CR32","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s13677-022-00295-5","volume":"11","author":"Q Chen","year":"2022","unstructured":"Chen Q, Wu L, Jiang C (2022) ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture. J Cloud Comp 11:20","journal-title":"J Cloud Comp"},{"key":"10908_CR33","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361\u201374382","journal-title":"IEEE Access"},{"key":"10908_CR34","doi-asserted-by":"crossref","unstructured":"Choudhury T, Gupta A, Pradhan S, Kumar P, Rathore YS (2017) Privacy and security of Cloud-Based Internet of Things (IoT). In: 2017 3rd International conference on computational intelligence and networks (CINE), Odisha, India, pp 40\u201345","DOI":"10.1109\/CINE.2017.28"},{"issue":"2","key":"10908_CR35","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1109\/JIOT.2018.2872461","volume":"6","author":"H Duan","year":"2019","unstructured":"Duan H, Zheng Y, Wang C, Yuan X (2019) Treasure collection on foggy islands: building secure network archives for Internet of Things. IEEE Internet Things J 6(2):2637\u20132650","journal-title":"IEEE Internet Things J"},{"key":"10908_CR36","volume-title":"Data spaces","author":"L Dutkiewicz","year":"2022","unstructured":"Dutkiewicz L et al (2022) Privacy-preserving techniques for trustworthy data sharing: opportunities and challenges for future research. In: Curry E, Scerri S, Tuikka T (eds) Data spaces. Springer, Cham"},{"issue":"4","key":"10908_CR37","first-page":"678","volume":"7","author":"K Gai","year":"2021","unstructured":"Gai K, Qiu M, Zhao H (2021) Privacy-preserving data encryption strategy for Big Data in mobile cloud computing. IEEE Transact Big Data 7(4):678\u2013688","journal-title":"IEEE Transact Big Data"},{"key":"10908_CR38","doi-asserted-by":"publisher","first-page":"47144","DOI":"10.1109\/ACCESS.2020.2977264","volume":"8","author":"Z Ghaffar","year":"2020","unstructured":"Ghaffar Z, Ahmed S, Mahmood K, Islam SH, Hassan MM, Fortino G (2020) An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems. IEEE Access 8:47144\u201347160","journal-title":"IEEE Access"},{"key":"10908_CR39","doi-asserted-by":"publisher","DOI":"10.1080\/23307706.2022.2078436","author":"S Gnana Sophia","year":"2023","unstructured":"Gnana Sophia S, Thanammal KK, Sujatha SS (2023) Secure storage and accessing the data in the cloud using optimized homomorphic encryption. J Control Decision. https:\/\/doi.org\/10.1080\/23307706.2022.2078436","journal-title":"J Control Decision"},{"key":"10908_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3188110","author":"I Gupta","year":"2022","unstructured":"Gupta I, Singh AK, Lee C-N, Buyya R (2022) Cloud computing research center, secure data storage and sharing techniques for data protection in cloud environments: a systematic review, analysis, and future directions. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2022.3188110","journal-title":"IEEE Access"},{"issue":"6s","key":"10908_CR41","first-page":"246","volume":"11","author":"GM Hamzah Amlak","year":"2023","unstructured":"Hamzah Amlak GM, Kraidi Al-Saedi KH (2023) Data mining techniques for cloud privacy preservation. Int J Intell Syst Appl Eng 11(6s):246\u2013256","journal-title":"Int J Intell Syst Appl Eng"},{"key":"10908_CR42","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721\u201382743","journal-title":"IEEE Access"},{"key":"10908_CR43","doi-asserted-by":"crossref","unstructured":"Henze M, Wolters B, Matzutt R, Zimmermann T, Wehrle K (2017) Distributed configuration, authorization and management in the cloud-based Internet of Things. 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, NSW, Australia, pp 185\u2013192","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.236"},{"key":"10908_CR44","doi-asserted-by":"publisher","first-page":"102746","DOI":"10.1016\/j.cose.2022.102746","volume":"118","author":"Y Himeur","year":"2022","unstructured":"Himeur Y, Sohail SS, Bensaali F, Amira A, Alazab M (2022) Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Comput Secur 118:102746","journal-title":"Comput Secur"},{"key":"10908_CR45","doi-asserted-by":"crossref","unstructured":"Hiremath S, Kunte S (2017) A novel data auditing approach to achieve data privacy and data integrity in cloud computing. In: 2017 International conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT), Mysuru, India, pp 306\u2013310","DOI":"10.1109\/ICEECCOT.2017.8284517"},{"key":"10908_CR46","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.jpdc.2019.08.007","volume":"134","author":"T Hong-Yen","year":"2019","unstructured":"Hong-Yen T, Jiankun H (2019) Privacy-preserving Big Data analytics a comprehensive survey. J Parallel Distribut Comput 134:207\u2013218","journal-title":"J Parallel Distribut Comput"},{"key":"10908_CR47","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"MS Hossain","year":"2018","unstructured":"Hossain MS, Muhammad G, Abdul W, Song B, Gupta BB (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596\u2013606","journal-title":"Futur Gener Comput Syst"},{"key":"10908_CR48","doi-asserted-by":"publisher","first-page":"136119","DOI":"10.1109\/ACCESS.2020.3011477","volume":"8","author":"Y Hou","year":"2020","unstructured":"Hou Y, Garg S, Hui L, Jayakody DNK, Jin R, Hossain MS (2020) A data security enhanced access control mechanism in mobile edge computing. IEEE Access 8:136119\u2013136130","journal-title":"IEEE Access"},{"key":"10908_CR49","doi-asserted-by":"publisher","first-page":"101989","DOI":"10.1016\/j.adhoc.2019.101989","volume":"95","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Sheikh JA, Al-Turjman F, Muhammad K (2019) Secure data transmission framework for confidentiality in IoTs. Ad Hoc Netw 95:101989","journal-title":"Ad Hoc Netw"},{"key":"10908_CR50","doi-asserted-by":"crossref","unstructured":"Ishaq A, Qadeer B, Shah MA, Bari N (2021) A comparative study on securing electronic health records (EHR) in cloud computing. In: 2021 26th International conference on automation and computing (ICAC), Portsmouth, United Kingdom, pp 1\u20137","DOI":"10.23919\/ICAC50006.2021.9594178"},{"issue":"17","key":"10908_CR51","doi-asserted-by":"publisher","first-page":"13712","DOI":"10.1109\/JIOT.2021.3067667","volume":"8","author":"AN Jahromi","year":"2021","unstructured":"Jahromi AN, Karimipour H, Dehghantanha A, Choo K-KR (2021) Toward detection and attribution of cyber-attacks in iot-enabled cyber-physical systems. IEEE Internet Things J 8(17):13712\u201313722","journal-title":"IEEE Internet Things J"},{"key":"10908_CR52","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s40747-021-00489-5","volume":"9","author":"SK Jain","year":"2023","unstructured":"Jain SK, Kesswani N (2023) A noise-based privacy-preserving model for the Internet of Things. Complex Intell Syst 9:3655\u20133679","journal-title":"Complex Intell Syst"},{"key":"10908_CR53","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/s40537-016-0059-y","volume":"3","author":"P Jain","year":"2016","unstructured":"Jain P, Gyanchandani M, Khare N (2016) Big Data privacy: a technological perspective and review. J Big Data 3:25","journal-title":"J Big Data"},{"key":"10908_CR54","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1186\/s40537-019-0193-4","volume":"6","author":"P Jain","year":"2019","unstructured":"Jain P, Gyanchandani M, Khare N (2019) Enhanced secured map reduce layer for Big Data privacy and security. J Big Data 6:30","journal-title":"J Big Data"},{"issue":"21","key":"10908_CR55","doi-asserted-by":"publisher","first-page":"18599","DOI":"10.1109\/JIOT.2023.3288563","volume":"10","author":"D Javeed","year":"2023","unstructured":"Javeed D, Gao T, Saeed MS, Khan MT (2023) FOG-Empowered augmented-intelligence-based proactive defensive mechanism for IoT-enabled smart industries. IEEE Internet Things J 10(21):18599\u201318608. https:\/\/doi.org\/10.1109\/JIOT.2023.3288563","journal-title":"IEEE Internet Things J"},{"key":"10908_CR56","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.future.2024.06.023","volume":"160","author":"D Javeed","year":"2024","unstructured":"Javeed D, Saeed MS, Ahmad I, Adil M, Kumar P, Najmul Islam AKM (2024a) Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions. Futur Gener Comput Syst 160:577\u2013597. https:\/\/doi.org\/10.1016\/j.future.2024.06.023","journal-title":"Futur Gener Comput Syst"},{"key":"10908_CR57","doi-asserted-by":"publisher","first-page":"103540","DOI":"10.1016\/j.adhoc.2024.103540","volume":"162","author":"D Javeed","year":"2024","unstructured":"Javeed D, Saeed MS, Adil M, Kumar P, Jolfaei A (2024b) A federated learning-based zero trust intrusion detection system for Internet of Things. Ad Hoc Netw 162:103540. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103540","journal-title":"Ad Hoc Netw"},{"key":"10908_CR58","doi-asserted-by":"crossref","unstructured":"Javid T, Faris M, Beenish H, Fahad M (2020) Cybersecurity and data privacy in the cloudlet for preliminary healthcare Big Data analytics. In: 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, pp 1\u20134","DOI":"10.1109\/ICCIT-144147971.2020.9213712"},{"key":"10908_CR59","doi-asserted-by":"publisher","first-page":"60897","DOI":"10.1109\/ACCESS.2019.2915576","volume":"7","author":"J Jeong","year":"2019","unstructured":"Jeong J, Joo JWJ, Lee Y, Son Y (2019) Secure cloud storage service using bloom filters for the Internet of Things. IEEE Access 7:60897\u201360907","journal-title":"IEEE Access"},{"key":"10908_CR60","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1937","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Kumar N, Ma J, Shen J, He D, Chilamkurti N (2016) A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int J Network Mgmt. https:\/\/doi.org\/10.1002\/nem.1937","journal-title":"Int J Network Mgmt"},{"key":"10908_CR61","doi-asserted-by":"publisher","first-page":"1082","DOI":"10.1109\/ACCESS.2021.3138135","volume":"10","author":"J Jusak","year":"2022","unstructured":"Jusak J, Mahmoud SS, Laurens R, Alsulami M, Fang Q (2022) A new approach for secure cloud-based electronic health record and its experimental testbed. IEEE Access 10:1082\u20131095","journal-title":"IEEE Access"},{"key":"10908_CR62","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.comcom.2017.07.006","volume":"111","author":"N Kaaniche","year":"2017","unstructured":"Kaaniche N, Laurent M (2017) Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput Commun 111:120\u2013141","journal-title":"Comput Commun"},{"key":"10908_CR63","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2023.2228053","author":"AA Kabir","year":"2023","unstructured":"Kabir AA, Elmedany M, Sharif W, Saeed M (2023) Securing IoT devices against emerging security threats: challenges and mitigation techniques. J Cyber Secur Technol. https:\/\/doi.org\/10.1080\/23742917.2023.2228053","journal-title":"J Cyber Secur Technol"},{"key":"10908_CR64","doi-asserted-by":"publisher","first-page":"121975","DOI":"10.1109\/ACCESS.2021.3109886","volume":"9","author":"NM Karie","year":"2021","unstructured":"Karie NM, Sahri NM, Yang W, Valli C, Kebande VR (2021) A review of security standards and frameworks for IoT-based smart environments. IEEE Access 9:121975\u2013121995","journal-title":"IEEE Access"},{"key":"10908_CR65","doi-asserted-by":"crossref","unstructured":"Kaur K, Syed A, Mohammad A, Halgamuge MN (2017) Review: an evaluation of major threats in cloud computing associated with Big Data. In: 2017 IEEE 2nd International conference on Big Data analysis (ICBDA), Beijing, China, pp 368\u2013372","DOI":"10.1109\/ICBDA.2017.8078842"},{"key":"10908_CR66","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13677-017-0090-3","volume":"6","author":"S Khan","year":"2017","unstructured":"Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comp 6:19","journal-title":"J Cloud Comp"},{"key":"10908_CR67","doi-asserted-by":"crossref","unstructured":"Khan HK, Pradhan R, Chandavarkar BR (2021) Hybrid cryptography for cloud computing. In: 2021 2nd International conference for emerging technology (INCET), Belagavi, India, pp 1\u20135","DOI":"10.1109\/INCET51464.2021.9456210"},{"issue":"3","key":"10908_CR68","doi-asserted-by":"crossref","first-page":"54","DOI":"10.14445\/22315381\/IJETT-V70I3P207","volume":"70","author":"N Krishnaraj","year":"2022","unstructured":"Krishnaraj N, Sangeetha S (2022) A study of data privacy in Internet of Things using privacy preserving techniques with its management. Int J Eng Trends Technol 70(3):54\u201365","journal-title":"Int J Eng Trends Technol"},{"key":"10908_CR69","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1186\/s40537-019-0268-2","volume":"6","author":"S Kumar","year":"2019","unstructured":"Kumar S, Tiwari P, Zymbler M (2019) Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data 6:111","journal-title":"J Big Data"},{"key":"10908_CR70","doi-asserted-by":"crossref","unstructured":"Kumar A (2021) Framework for data security using DNA cryptography and HMAC technique in cloud computing. In: 2021 Second International conference on electronics and sustainable communication systems (ICESC), Coimbatore, India, pp 898-903","DOI":"10.1109\/ICESC51422.2021.9532950"},{"key":"10908_CR71","doi-asserted-by":"publisher","first-page":"84776","DOI":"10.1109\/ACCESS.2022.3195807","volume":"10","author":"V Kumar","year":"2022","unstructured":"Kumar V, Alameemi AMA, Kumari A, Ahmad M, Falah MW, Abd El-Latif AA (2022) PSEBVC: provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment. IEEE Access 10:84776\u201384789","journal-title":"IEEE Access"},{"key":"10908_CR72","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1186\/s13677-023-00469-9","volume":"12","author":"A Kumar","year":"2023","unstructured":"Kumar A, Khan SB, Pandey SK et al (2023) Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities. J Cloud Comp 12:92","journal-title":"J Cloud Comp"},{"issue":"13","key":"10908_CR73","doi-asserted-by":"publisher","first-page":"11513","DOI":"10.1109\/JIOT.2021.3130291","volume":"9","author":"Y Li","year":"2022","unstructured":"Li Y, Zhang F (2022) An efficient certificate-based data integrity auditing protocol for cloud-assisted WBANs. IEEE Internet Things J 9(13):11513\u201311523","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"10908_CR74","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125\u20131142","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"10908_CR75","first-page":"810","volume":"33","author":"AT Loai","year":"2021","unstructured":"Loai AT, Gokay S (2021) Reconsidering Big Data security and privacy in cloud and mobile cloud systems. J King Saud Univ Comput Inform Sci 33(7):810\u2013819","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"10908_CR76","doi-asserted-by":"publisher","first-page":"e318","DOI":"10.1002\/spy2.318","volume":"6","author":"AN Lone","year":"2023","unstructured":"Lone AN, Mustajab S, Alam M (2023) A comprehensive study on cybersecurity challenges and opportunities in the IoT world. Secur Privacy 6:e318","journal-title":"Secur Privacy"},{"key":"10908_CR77","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1186\/s13677-020-00207-5","volume":"9","author":"X Lu","year":"2020","unstructured":"Lu X, Pan Z, Xian H (2020) An efficient and secure data sharing scheme for mobile devices in cloud computing. J Cloud Comp 9:60","journal-title":"J Cloud Comp"},{"key":"10908_CR78","doi-asserted-by":"crossref","unstructured":"Mahfoudhi S, Frehat M, Moulahi T (2019) Enhancing cloud of things performance by avoiding unnecessary data through artificial intelligence tools. In: 2019 15th International wireless communications & mobile computing conference (IWCMC), Tangier, Morocco, pp 1463\u20131467","DOI":"10.1109\/IWCMC.2019.8766790"},{"key":"10908_CR79","doi-asserted-by":"publisher","first-page":"151327","DOI":"10.1109\/ACCESS.2021.3126715","volume":"9","author":"WA Mahrous","year":"2021","unstructured":"Mahrous WA, Farouk M, Darwish SM (2021) An enhanced blockchain-based IoT digital forensics architecture using fuzzy hash. IEEE Access 9:151327\u2013151336","journal-title":"IEEE Access"},{"key":"10908_CR80","doi-asserted-by":"publisher","first-page":"53066","DOI":"10.1109\/ACCESS.2022.3175219","volume":"10","author":"A Majeed","year":"2022","unstructured":"Majeed A, Khan S, Hwang SO (2022) Toward privacy preservation using clustering based anonymization: recent advances and future research outlook. IEEE Access 10:53066\u201353097","journal-title":"IEEE Access"},{"key":"10908_CR81","doi-asserted-by":"crossref","unstructured":"Mei R, Yan HB, He Y, Wang Q, Zhu S, Wen W (2022). Considerations on evaluation of practical cloud data protection. CONCERT 2022. In: Communications in computer and information science, vol 1699. Springer, Singapore","DOI":"10.1007\/978-981-19-8285-9_4"},{"key":"10908_CR82","doi-asserted-by":"crossref","unstructured":"Mihailescu MI, Nita SL, Asalomia BL, Rogobete MG, Racuciu C (2022) Customized authorization process for cloud computing and IoT using attribute-based encryption. In: 2022 14th International conference on electronics, computers and artificial intelligence (ECAI), IEEE Ploiesti, Romania, pp 1\u20134","DOI":"10.1109\/ECAI54874.2022.9847501"},{"key":"10908_CR83","doi-asserted-by":"publisher","first-page":"2100521","DOI":"10.1002\/masy.202100521","volume":"407","author":"JK Mishra","year":"2023","unstructured":"Mishra JK, Janarthanan MC (2023) Cloud computing security: machine and deep learning models analysis. Macromol Symp 407:2100521","journal-title":"Macromol Symp"},{"key":"10908_CR84","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1007\/s11277-022-09781-0","volume":"126","author":"K Mishra","year":"2022","unstructured":"Mishra K, Bhattacharjee V, Saket S et al (2022) Cloud and Big Data security system\u2019s review principles: a decisive investigation. Wireless Pers Commun 126:1013\u20131050","journal-title":"Wireless Pers Commun"},{"key":"10908_CR85","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7831","author":"A Mishra","year":"2023","unstructured":"Mishra A, Jabar TS, Alzoubi YI, Mishra KN (2023) Enhancing privacy-preserving mechanisms in cloud storage: a novel conceptual framework. Concurr Computat Pract Exper. https:\/\/doi.org\/10.1002\/cpe.7831","journal-title":"Concurr Computat Pract Exper"},{"key":"10908_CR86","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.1007\/s11277-021-09323-0","volume":"126","author":"SA Moqurrab","year":"2022","unstructured":"Moqurrab SA, Tariq N, Anjum A et al (2022) A Deep learning-based privacy-preserving model for smart healthcare in Internet of medical things using fog computing. Wireless Pers Commun 126:2379\u20132401","journal-title":"Wireless Pers Commun"},{"key":"10908_CR87","doi-asserted-by":"crossref","unstructured":"Morioka E, Sharbaf MS (2016) Digital forensics research on cloud computing: An investigation of cloud forensics solutions. In: 2016 IEEE symposium on technologies for homeland security (HST), Waltham, MA, USA, pp 1\u20136","DOI":"10.1109\/THS.2016.7568909"},{"issue":"9","key":"10908_CR88","doi-asserted-by":"publisher","first-page":"e4812","DOI":"10.1002\/dac.4812","volume":"34","author":"T Moulahi","year":"2021","unstructured":"Moulahi T, El Khediri S, Ullah Khan R, Zidi S (2021) A fog computing data reduction level to enhance the cloud of things performance. Int J Commun Syst 34(9):e4812","journal-title":"Int J Commun Syst"},{"key":"10908_CR89","doi-asserted-by":"publisher","first-page":"20722","DOI":"10.1109\/ACCESS.2018.2826225","volume":"6","author":"SM Muzammal","year":"2018","unstructured":"Muzammal SM et al (2018) Counter measuring conceivable security threats on smart healthcare devices. IEEE Access 6:20722\u201320733","journal-title":"IEEE Access"},{"key":"10908_CR90","doi-asserted-by":"publisher","first-page":"31357","DOI":"10.1007\/s11042-021-10563-2","volume":"80","author":"A Nadian-Ghomsheh","year":"2021","unstructured":"Nadian-Ghomsheh A, Farahani B, Kavian M (2021) A hierarchical privacy-preserving IoT architecture for vision-based hand rehabilitation assessment. Multimed Tools Appl 80:31357\u201331380","journal-title":"Multimed Tools Appl"},{"key":"10908_CR91","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3377550","author":"D Namakshenas","year":"2024","unstructured":"Namakshenas D, Yazdinejad A, Dehghantanha A, Srivastava G (2024) Federated quantum-based privacy-preserving threat detection model for consumer Internet of Things. IEEE Trans Consum Electron. https:\/\/doi.org\/10.1109\/TCE.2024.3377550","journal-title":"IEEE Trans Consum Electron"},{"key":"10908_CR92","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.future.2020.02.010","volume":"109","author":"P Nanda","year":"2020","unstructured":"Nanda P, He X, Yang LT (2020) Security, trust and privacy in cyber (STPCyber): future trends and challenges. Futur Gener Comput Syst 109:446\u2013449","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"10908_CR93","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1109\/TDSC.2021.3060337","volume":"19","author":"H Nasiraee","year":"2022","unstructured":"Nasiraee H, Ashouri-Talouki M (2022) Privacy-preserving distributed data access control for CloudIoT. IEEE Trans Dependable Secure Comput 19(4):2476\u20132487","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10908_CR94","doi-asserted-by":"publisher","first-page":"100813","DOI":"10.1016\/j.measen.2023.100813","volume":"28","author":"S Navin Prasad","year":"2023","unstructured":"Navin Prasad S, Rekha C (2023) Blockchain-based IAS protocol to enhance security and privacy in cloud computing. Measur Sens 28:100813","journal-title":"Measur Sens"},{"key":"10908_CR95","doi-asserted-by":"crossref","unstructured":"Niu L, Wang F, Li J, Han T, Liu D (2019) Development of agricultural Internet of Things monitoring system combining cloud computing and WeChat technology. In: 2019 IEEE 8th Joint international information technology and artificial intelligence conference (ITAIC), Chongqing, China, pp 1457\u20131460","DOI":"10.1109\/ITAIC.2019.8785884"},{"key":"10908_CR96","first-page":"163","volume":"76","author":"G Ogunniye","year":"2023","unstructured":"Ogunniye G, Kokciyan N (2023) A survey on understanding and representing privacy requirements in the Internet-of-Things. J Art Intell Res 76:163\u2013192","journal-title":"J Art Intell Res"},{"key":"10908_CR97","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-023-05285-7","author":"NK Pandey","year":"2023","unstructured":"Pandey NK, Kumar K, Saini G et al (2023) Security issues and challenges in a cloud of things-based applications for industrial automation. Ann Oper Res. https:\/\/doi.org\/10.1007\/s10479-023-05285-7","journal-title":"Ann Oper Res"},{"key":"10908_CR98","doi-asserted-by":"crossref","unstructured":"Pathak M, Mishra KN, Singh SP, Mishra A (2023) An automated smart centralised vehicle security system for controlling the vehicle thefts\/hacking using IOT and facial recognition. In: 2023 International conference on computational intelligence and knowledge economy (ICCIKE), Dubai, United Arab Emirates, pp 516\u2013521","DOI":"10.1109\/ICCIKE58312.2023.10131765"},{"key":"10908_CR99","doi-asserted-by":"publisher","first-page":"126533","DOI":"10.1016\/j.neucom.2023.126533","volume":"551","author":"M Pawlicki","year":"2023","unstructured":"Pawlicki M, Pawlicka A, Kozik R, Chora\u015b M (2023) The survey and meta-analysis of the attacks, transgressions, countermeasures, and security aspects common to the Cloud Edge and IoT. Neurocomputing 551:126533","journal-title":"Neurocomputing"},{"key":"10908_CR100","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s00607-022-01073-6","volume":"104","author":"L Pioli","year":"2022","unstructured":"Pioli L, Dorneles CF, de Macedo DDJ et al (2022) An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature. Computing 104:1867\u20131889","journal-title":"Computing"},{"key":"10908_CR101","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s11747-022-00845-y","volume":"50","author":"S Quach","year":"2022","unstructured":"Quach S, Thaichon P, Martin KD et al (2022) Digital technologies: tensions in privacy and data. J of the Acad Mark Sci 50:1299\u20131323","journal-title":"J of the Acad Mark Sci"},{"key":"10908_CR102","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s42452-021-04156-9","volume":"3","author":"BS Rachit","year":"2021","unstructured":"Rachit BS, Ragiri PR (2021) Security trends in Internet of Things: a survey. SN Appl Sci 3:121","journal-title":"SN Appl Sci"},{"key":"10908_CR103","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","volume":"5","author":"PI Radoglou Grammatikis","year":"2019","unstructured":"Radoglou Grammatikis PI, Sarigiannidis PG, Moscholios ID (2019) Securing the Internet of Things: challenges, threats and solutions. Internet of Things 5:41\u201370","journal-title":"Internet of Things"},{"key":"10908_CR104","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.future.2014.10.019","volume":"55","author":"SMM Rahman","year":"2016","unstructured":"Rahman SMM, Hossain MA, Hassan MM, Alamri A, Alghamdi A, Pathan M (2016) Secure privacy vault design for distributed multimedia surveillance system. Futur Gener Comput Syst 55:344\u2013352","journal-title":"Futur Gener Comput Syst"},{"key":"10908_CR105","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s40537-018-0141-8","volume":"5","author":"P Ram Mohan","year":"2018","unstructured":"Ram Mohan P, Murali Krishna S, Siva Kumar AP (2018) Privacy preservation techniques in Big Data analytics: a survey. J Big Data 5:33","journal-title":"J Big Data"},{"key":"10908_CR106","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.procs.2017.12.089","volume":"125","author":"P Ravi Kumar","year":"2018","unstructured":"Ravi Kumar P, Herbert Raj P, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Procedia Comput Sci 125:691\u2013697","journal-title":"Procedia Comput Sci"},{"key":"10908_CR107","doi-asserted-by":"publisher","DOI":"10.2174\/2666255813666200224092717","author":"SM Ray","year":"2020","unstructured":"Ray SM, Dutta S (2020) Big Data security issues from the perspective of IoT and cloud computing: a review. Recent Adv Comput Sci Commun. https:\/\/doi.org\/10.2174\/2666255813666200224092717","journal-title":"Recent Adv Comput Sci Commun"},{"key":"10908_CR108","doi-asserted-by":"crossref","unstructured":"Reddy Y (2018) Big Data security in cloud environment. In: 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International conference on high performance and smart computing, (HPSC) and IEEE international conference on intelligent data and security (IDS), Omaha, NE, USA, pp 100\u2013106","DOI":"10.1109\/BDS\/HPSC\/IDS18.2018.00033"},{"key":"10908_CR109","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2019.1654694","author":"PR Rejin","year":"2019","unstructured":"Rejin PR, Paul RD, Alavi AH (2019) Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing. Cogent Eng. https:\/\/doi.org\/10.1080\/23311916.2019.1654694","journal-title":"Cogent Eng"},{"key":"10908_CR110","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/s23031252","volume":"23","author":"E Rodr\u00edguez","year":"2023","unstructured":"Rodr\u00edguez E, Otero B, Canal R (2023) A survey of machine and deep learning methods for privacy protection in the Internet of Things. Sensors 23:1252","journal-title":"Sensors"},{"issue":"4","key":"10908_CR111","first-page":"751","volume":"64","author":"K Roslin Dayana","year":"2023","unstructured":"Roslin Dayana K, Shobha Rani P (2023) Secure cloud data storage solution with better data accessibility and time efficiency. Automatika J Control Measur Electron Comput Commun 64(4):751\u2013758","journal-title":"Automatika J Control Measur Electron Comput Commun"},{"key":"10908_CR112","doi-asserted-by":"publisher","first-page":"7433","DOI":"10.3390\/s22197433","volume":"22","author":"PK Sadhu","year":"2022","unstructured":"Sadhu PK, Yanambaka VP, Abdelgawad A (2022) Internet of Things: security and solutions survey. MDPI Sens 22:7433","journal-title":"MDPI Sens"},{"issue":"2","key":"10908_CR113","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1049\/cds2.12138","volume":"17","author":"M Safaei Yaraziz","year":"2023","unstructured":"Safaei Yaraziz M et al (2023) Recent trends towards privacy-preservation in the Internet of Things, its challenges and future directions. IET Circuits Devices Syst 17(2):53\u201361","journal-title":"IET Circuits Devices Syst"},{"issue":"4","key":"10908_CR114","first-page":"5152","volume":"17","author":"J Sakhnini","year":"2023","unstructured":"Sakhnini J et al (2023) A generalizable deep neural network method for detecting attacks in industrial cyber-physical systems. IEEE Syst J 17(4):5152\u20135160","journal-title":"IEEE Syst J"},{"issue":"1","key":"10908_CR115","first-page":"2","volume":"55","author":"K Sarwar","year":"2021","unstructured":"Sarwar K, Yongchareon S, Jian Yu, Rehman SU (2021) A survey on privacy preservation in fog-enabled Internet of Things. ACM Comput Surv 55(1):2","journal-title":"ACM Comput Surv"},{"key":"10908_CR116","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100467","volume":"44","author":"E Schiller","year":"2022","unstructured":"Schiller E, Andy A, Jara F, Jonathan S, Michael Z, Burkhard S (2022a) Landscape of IoT security. Comput Sci Rev 44:100467","journal-title":"Comput Sci Rev"},{"key":"10908_CR117","volume":"44","author":"E Schiller","year":"2022","unstructured":"Schiller E, Aidoo A, Fuhrer J, Stahl J, Zi\u00f6rjen M, Stiller B (2022b) Landscape of IoT security. Comput Sci Rev Internet Things 44:100467","journal-title":"Comput Sci Rev Internet Things"},{"key":"10908_CR118","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1186\/s13677-023-00412-y","volume":"12","author":"S Selvarajan","year":"2023","unstructured":"Selvarajan S, Srivastava G, Khadidos AO et al (2023) An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J Cloud Comp 12:38","journal-title":"J Cloud Comp"},{"key":"10908_CR119","doi-asserted-by":"crossref","unstructured":"Sharma Y, Gupta H and Khatri S. K. (2019) A Security Model for the Enhancement of Data Privacy in Cloud Computing. 2019 Amity international conference on artificial intelligence (AICAI), Dubai, United Arab Emirates, IEEE, pp 898\u2013902","DOI":"10.1109\/AICAI.2019.8701398"},{"key":"10908_CR120","doi-asserted-by":"crossref","unstructured":"Shi Y (2018) Data security and privacy protection in public cloud. In 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, pp 4812\u20134819","DOI":"10.1109\/BigData.2018.8622531"},{"key":"10908_CR121","doi-asserted-by":"publisher","first-page":"67555","DOI":"10.1109\/ACCESS.2020.2985719","volume":"8","author":"S Shin","year":"2020","unstructured":"Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access 8:67555\u201367571","journal-title":"IEEE Access"},{"key":"10908_CR122","doi-asserted-by":"crossref","unstructured":"Shukla RS (2022) IoT based designing of secure data storage system in distributed cloud system with Big Data using cryptography algorithm. In: 2022 11th International conference on system modeling & advancement in research trends (SMART), Moradabad, India, pp 264-270","DOI":"10.1109\/SMART55829.2022.10047177"},{"key":"10908_CR123","doi-asserted-by":"publisher","first-page":"102822","DOI":"10.1016\/j.cose.2022.102822","volume":"120","author":"S Sicari","year":"2022","unstructured":"Sicari S, Rizzardi A, Coen-Porisini A (2022) Insights into security and privacy towards fog computing evolution. Comput Secur 120:102822","journal-title":"Comput Secur"},{"key":"10908_CR124","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13174-018-0078-3","volume":"9","author":"LV Silva","year":"2018","unstructured":"Silva LV, Barbosa P, Marinho R (2018) Security and privacy aware data aggregation on cloud computing. J Internet Serv Appl 9:6","journal-title":"J Internet Serv Appl"},{"key":"10908_CR125","doi-asserted-by":"crossref","unstructured":"Simsek I (2023) Zero-knowledge and identity-based authentication, authorization, access control, and key exchange for publish\/subscribe in Internet of Things. In: 2023 6th conference on cloud and Internet of Things (CIoT), Lisbon, Portugal, pp 47\u201354","DOI":"10.1109\/CIoT57267.2023.10084902"},{"key":"10908_CR126","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s41019-017-0046-0","volume":"3","author":"N Singh","year":"2018","unstructured":"Singh N, Singh AK (2018) Data privacy protection mechanisms in cloud. Data Sci Eng 3:24\u201339","journal-title":"Data Sci Eng"},{"issue":"5","key":"10908_CR127","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1109\/TPDS.2017.2784423","volume":"29","author":"M Sookhak","year":"2018","unstructured":"Sookhak M, Yu FR, Zomaya AY (2018) Auditing Big Data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distrib Syst 29(5):999\u20131012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10908_CR128","doi-asserted-by":"crossref","unstructured":"Stergiou C, Psannis KE, Xifilidis T, Plageras AP, Gupta BB (2018) Security and privacy of Big Data for social networking services in the cloud. IEEE INFOCOM 2018\u2014IEEE conference on computer communications workshops (INFOCOM WKSHPS), Honolulu, HI, USA, pp 438\u2013443","DOI":"10.1109\/INFCOMW.2018.8406831"},{"issue":"S2","key":"10908_CR129","doi-asserted-by":"publisher","first-page":"7613","DOI":"10.53730\/ijhs.v6nS2.6834","volume":"6","author":"R Sumithra","year":"2022","unstructured":"Sumithra R, Parameswari R (2022) Data privacy and data protection security algorithms for Big Data in the cloud. Int J Health Sci 6(S2):7613\u20137621","journal-title":"Int J Health Sci"},{"key":"10908_CR130","doi-asserted-by":"publisher","first-page":"147420","DOI":"10.1109\/ACCESS.2019.2946185","volume":"7","author":"PJ Sun","year":"2019","unstructured":"Sun PJ (2019) Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7:147420\u2013147452","journal-title":"IEEE Access"},{"key":"10908_CR131","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.3390\/electronics10151811","volume":"10","author":"AI Tahirkheli","year":"2021","unstructured":"Tahirkheli AI, Shiraz M, Hayat B, Idrees M, Sajid A, Ullah R, Ayub N, Kim K-I (2021) A survey on modern cloud computing security over smart city networks: threats, vulnerabilities, consequences, countermeasures, and challenges. Electronics 10:1811","journal-title":"Electronics"},{"key":"10908_CR132","doi-asserted-by":"crossref","unstructured":"Tang Z (2020) A preliminary study on data security technology in Big Data cloud computing environment. In: 2020 International conference on Big Data & artificial intelligence & software engineering (ICBASE) IEEE, Bangkok, Thailand, pp 27\u201330","DOI":"10.1109\/ICBASE51474.2020.00013"},{"key":"10908_CR133","first-page":"18","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit F, Alhomdy S, Jagtap S (2021) A new data security algorithm for cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Netw Sci Direct 2:18\u201333","journal-title":"Int J Intell Netw Sci Direct"},{"key":"10908_CR134","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jpdc.2018.09.005","volume":"123","author":"Y Tian","year":"2019","unstructured":"Tian Y, Kaleemullah MM, Rodhaan MA, Song B, Al-Dhelaan A, Ma T (2019) A privacy-preserving location service for cloud-of-things system. J Parallel Distrib Comput 123:215\u2013222","journal-title":"J Parallel Distrib Comput"},{"key":"10908_CR135","doi-asserted-by":"publisher","first-page":"124379","DOI":"10.1109\/ACCESS.2019.2937347","volume":"7","author":"F Ullah","year":"2019","unstructured":"Ullah F et al (2019) Cyber security threats detection in Internet of Things using deep learning approach. IEEE Access 7:124379\u2013124389","journal-title":"IEEE Access"},{"key":"10908_CR136","doi-asserted-by":"crossref","unstructured":"Unal E, Sen-Baidya S, Hewett R (2018) Towards prediction of security attacks on software defined networks: a Big Data analytic approach. In: 2018 IEEE International conference on Big Data (Big Data), Seattle, WA, USA, pp 4582\u20134588","DOI":"10.1109\/BigData.2018.8622524"},{"issue":"6","key":"10908_CR137","first-page":"122","volume":"53","author":"N Waheed","year":"2020","unstructured":"Waheed N, He X, Ikram M, Usman M, Hashmi SS, Usman M (2020) Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput Surv 53(6):122","journal-title":"ACM Comput Surv"},{"key":"10908_CR138","doi-asserted-by":"crossref","unstructured":"Wang H (2021) Research on risk and supervision of financial Big Data application based on cloud computing. In: 2021 IEEE International conference on advances in electrical engineering and computer applications (AEECA), Dalian, China, pp 507\u2013510","DOI":"10.1109\/AEECA52519.2021.9574292"},{"key":"10908_CR139","doi-asserted-by":"crossref","unstructured":"Wang F, Wang H, Xue L (2021) Research on data security in Big Data cloud computing environment. In: 2021 IEEE 5th advanced information technology, electronic and automation control conference (IAEAC), Chongqing, China, pp 1446\u20131450","DOI":"10.1109\/IAEAC50856.2021.9391025"},{"key":"10908_CR140","doi-asserted-by":"crossref","unstructured":"Wang Y, Ni K, Wang X, Zhu J (2022) Design of automatic weather monitoring and forecasting system based on Internet of Things and Big Data. In: 2022 International conference on sustainable computing and data communication systems (ICSCDS), Erode, India, pp 979\u2013982","DOI":"10.1109\/ICSCDS53736.2022.9761041"},{"key":"10908_CR141","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.sysarc.2018.12.005","volume":"97","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Hussain R, Succi G, Rodrigues JJPC (2019) Authentication in cloud-driven IoT-based Big Data environment: survey and outlook. J Syst Architect 97:185\u2013196","journal-title":"J Syst Architect"},{"key":"10908_CR142","doi-asserted-by":"publisher","first-page":"100564","DOI":"10.1016\/j.iot.2022.100564","volume":"19","author":"P Williams","year":"2022","unstructured":"Williams P, Dutta IK, Daoud H, Bayoumi M (2022) A survey on security in the Internet of Things with a focus on the impact of emerging technologies. Internet Things 19:100564","journal-title":"Internet Things"},{"key":"10908_CR143","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s42979-022-01020-4","volume":"3","author":"V Wylde","year":"2022","unstructured":"Wylde V, Rawindaran N, Lawrence J et al (2022a) Cybersecurity, data privacy, and blockchain: a review. SN Comput Sci 3:127","journal-title":"SN Comput Sci"},{"key":"10908_CR144","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s42979-022-01020-4","volume":"3","author":"V Wylde","year":"2022","unstructured":"Wylde V, Rawindaran N, Lawrence J, Balasubramanian R, Prakash E, Jayal A, Khan I, Hewage C, Platts J (2022b) Cybersecurity, data privacy, and blockchain: a review. SN Comput Sci 3:127","journal-title":"SN Comput Sci"},{"issue":"8","key":"10908_CR145","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W (2019) Edge computing security: state of the art and challenges. Proc IEEE 107(8):1608\u20131631","journal-title":"Proc IEEE"},{"issue":"03","key":"10908_CR146","first-page":"2191","volume":"16","author":"Q Xie","year":"2023","unstructured":"Xie Q, Zhang C, Jia X (2023) Security-aware and efficient data deduplication for edge-assisted cloud storage systems. IEEE Trans Serv Comput 16(03):2191\u20132202","journal-title":"IEEE Trans Serv Comput"},{"key":"10908_CR147","doi-asserted-by":"publisher","first-page":"76541","DOI":"10.1109\/ACCESS.2020.2989456","volume":"8","author":"M Yahuza","year":"2020","unstructured":"Yahuza M et al (2020) Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities. IEEE Access 8:76541\u201376567","journal-title":"IEEE Access"},{"key":"10908_CR148","doi-asserted-by":"publisher","first-page":"45822","DOI":"10.1109\/ACCESS.2021.3066497","volume":"9","author":"H Yan","year":"2021","unstructured":"Yan H, Gui W (2021) Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving. IEEE Access 9:45822\u201345831","journal-title":"IEEE Access"},{"key":"10908_CR149","doi-asserted-by":"crossref","unstructured":"Yao H (2022) Data storage security system based on cloud computing. In: 2022 IEEE 2nd International conference on electronic technology, communication and information (ICETCI), Changchun, China, pp 1220\u20131223","DOI":"10.1109\/ICETCI55101.2022.9832390"},{"issue":"11","key":"10908_CR150","doi-asserted-by":"publisher","first-page":"8356","DOI":"10.1109\/TII.2022.3168011","volume":"18","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Hammoudeh M, Karimipour H, Srivastava G (2022) Block hunter: federated learning for cyber threat hunting in blockchain-based IIoT networks. IEEE Trans Industr Inf 18(11):8356\u20138366","journal-title":"IEEE Trans Industr Inf"},{"key":"10908_CR151","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1016\/j.compind.2022.103801","volume":"144","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad A, Dehghantanha A, Parizi RM, Srivastava G, Karimipour H (2023) Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks. Comput Ind 144:2023","journal-title":"Comput Ind"},{"issue":"1","key":"10908_CR152","doi-asserted-by":"publisher","first-page":"2527","DOI":"10.1109\/TCE.2023.3318509","volume":"70","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G (2024a) AP2FL: auditable privacy-preserving federated learning framework for electronics in healthcare. IEEE Trans Consum Electron 70(1):2527\u20132535","journal-title":"IEEE Trans Consum Electron"},{"key":"10908_CR153","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103088","volume":"148","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024b) Hybrid privacy-preserving federated learning against irregular users in next-generation Internet of Things. J Syst Architect 148:103088","journal-title":"J Syst Architect"},{"key":"10908_CR154","doi-asserted-by":"publisher","first-page":"e4177","DOI":"10.1002\/ett.4177","volume":"32","author":"C Ye","year":"2021","unstructured":"Ye C, Cao W, Chen S (2021) Security challenges of blockchain in Internet of Things: systematic literature review. Trans Emerging Tel Tech 32:e4177","journal-title":"Trans Emerging Tel Tech"},{"issue":"13","key":"10908_CR155","doi-asserted-by":"publisher","first-page":"10625","DOI":"10.1109\/JIOT.2021.3124016","volume":"9","author":"H Yin","year":"2022","unstructured":"Yin H, Chen E, Zhu Y, Zhao C, Feng R, Yau SS (2022) Attribute-based private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain Internet of Things. IEEE Internet Things J 9(13):10625\u201310639","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10908_CR156","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2017","unstructured":"Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767\u2013778","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"10908_CR157","doi-asserted-by":"publisher","first-page":"8154","DOI":"10.1109\/JIOT.2021.3125190","volume":"9","author":"K Yu","year":"2022","unstructured":"Yu K et al (2022) A blockchain-based shamir\u2019s threshold cryptography scheme for data protection in industrial Internet of Things settings. IEEE Internet Things J 9(11):8154\u20138167","journal-title":"IEEE Internet Things J"},{"key":"10908_CR158","doi-asserted-by":"publisher","first-page":"94668","DOI":"10.1109\/ACCESS.2021.3089681","volume":"9","author":"S Zaman","year":"2021","unstructured":"Zaman S et al (2021) Security threats and artificial intelligence based countermeasures for Internet of Things networks: a comprehensive survey. IEEE Access 9:94668\u201394690","journal-title":"IEEE Access"},{"key":"10908_CR159","doi-asserted-by":"publisher","first-page":"101921","DOI":"10.1016\/j.cose.2020.101921","volume":"96","author":"MA Zarandi","year":"2020","unstructured":"Zarandi MA, Dara Rozita A, Evan F (2020) A survey of machine learning-based solutions to protect privacy in the Internet of Things. Comput Secur 96:101921","journal-title":"Comput Secur"},{"key":"10908_CR160","doi-asserted-by":"publisher","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang J, Chen B, Zhao Y, Cheng X, Hu F (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6:18209\u201318237","journal-title":"IEEE Access"},{"key":"10908_CR161","doi-asserted-by":"crossref","unstructured":"Zhang W, Jin S (2020) Research and application of data privacy protection technology in cloud computing environment based on attribute encryption. In: 2020 IEEE International conference on power, intelligent computing and systems (ICPICS), Shenyang, China, pp 994\u2013996","DOI":"10.1109\/ICPICS50287.2020.9202055"},{"key":"10908_CR162","doi-asserted-by":"publisher","first-page":"26372","DOI":"10.1109\/ACCESS.2020.2971519","volume":"8","author":"X-P Zhao","year":"2020","unstructured":"Zhao X-P, Jiang R (2020) Distributed machine learning oriented data integrity verification scheme in cloud computing environment. IEEE Access 8:26372\u201326384","journal-title":"IEEE Access"},{"issue":"1","key":"10908_CR163","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag 55(1):26\u201333","journal-title":"IEEE Commun Mag"},{"key":"10908_CR164","doi-asserted-by":"publisher","first-page":"90036","DOI":"10.1109\/ACCESS.2019.2924486","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu H et al (2019) A secure and efficient data integrity verification scheme for Cloud-IoT based on short signature. IEEE Access 7:90036\u201390044","journal-title":"IEEE Access"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-10908-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-024-10908-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-10908-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T03:43:12Z","timestamp":1727235792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-024-10908-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":164,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["10908"],"URL":"https:\/\/doi.org\/10.1007\/s10462-024-10908-x","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,27]]},"assertion":[{"value":"6 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Being the corresponding author I declare that there is no conflict of interest with any person or organization for this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"269"}}