{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T01:00:34Z","timestamp":1768611634717,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"S4","license":[{"start":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T00:00:00Z","timestamp":1522627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s10586-018-2723-9","type":"journal-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T07:53:59Z","timestamp":1522655639000},"page":"9561-9569","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A fully homomorphic\u2013elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data"],"prefix":"10.1007","volume":"22","author":[{"given":"G.","family":"Prabu Kanna","sequence":"first","affiliation":[]},{"given":"V.","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,2]]},"reference":[{"key":"2723_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Privacy preservation over big data in cloud systems. In: Security, Privacy and Trust in Cloud Systems, Springer, pp. 239\u2013257 (2014)","DOI":"10.1007\/978-3-642-38586-5_8"},{"key":"2723_CR2","unstructured":"Prasad, P., et al.: Data sharing security and privacy preservation in cloud computing. In: Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, pp. 1070\u20131075 (2015)"},{"key":"2723_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Scalable local-recoding anonymization using locality sensitive hashing for big data privacy preservation. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 1793\u20131802 (2016)","DOI":"10.1145\/2983323.2983841"},{"key":"2723_CR4","unstructured":"Suganthi, J., et al.: Privacy preservation and public auditing for cloud data using ASS in multi-cloud. In: Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on, pp. 1\u20136 (2015)"},{"key":"2723_CR5","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comnet.2015.06.014","volume":"88","author":"W Wang","year":"2015","unstructured":"Wang, W., et al.: Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput. Netw. 88, 136\u2013148 (2015)","journal-title":"Comput. Netw."},{"key":"2723_CR6","doi-asserted-by":"crossref","unstructured":"Li, F., et al.: Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners. In: Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, pp. 53\u201364 (2015)","DOI":"10.1145\/2808425.2808430"},{"key":"2723_CR7","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1007\/s11390-016-1687-6","volume":"31","author":"X-M He","year":"2016","unstructured":"He, X.-M., et al.: Semi-homogenous generalization: improving homogenous generalization for privacy preservation in cloud computing. J. Comput. Sci. Technol. 31, 1124\u20131135 (2016)","journal-title":"J. Comput. Sci. Technol."},{"key":"2723_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TPDS.2014.2308218","volume":"26","author":"H Liu","year":"2015","unstructured":"Liu, H., et al.: Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans. Parallel Distrib. Syst. 26, 241\u2013251 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2723_CR9","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/JBHI.2013.2292829","volume":"18","author":"Q Shen","year":"2014","unstructured":"Shen, Q., et al.: Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation. IEEE J. Biomed. Health Inform. 18, 430\u2013439 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"2723_CR10","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1016\/j.compeleceng.2016.05.012","volume":"56","author":"XA Wang","year":"2016","unstructured":"Wang, X.A., et al.: Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage. Comput. Electr. Eng. 56, 871\u2013883 (2016)","journal-title":"Comput. Electr. Eng."},{"key":"2723_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25, 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2723_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.jart.2015.06.004","volume":"13","author":"R Hayward","year":"2015","unstructured":"Hayward, R., Chiang, C.-C.: Parallelizing fully homomorphic encryption for a cloud environment. J. Appl. Res. Technol. 13, 245\u2013252 (2015)","journal-title":"J. Appl. Res. Technol."},{"key":"2723_CR13","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.procs.2016.03.023","volume":"79","author":"C Dhote","year":"2016","unstructured":"Dhote, C.: Homomorphic encryption for security of cloud data. Procedia Comput. Sci. 79, 175\u2013181 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"2723_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.procs.2017.08.282","volume":"113","author":"K Makkaoui El","year":"2017","unstructured":"El Makkaoui, K., et al.: Fast cloud-RSA scheme for promoting data confidentiality in the cloud computing. Procedia Comput. Sci. 113, 33\u201340 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"2723_CR15","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1016\/j.pisc.2016.06.061","volume":"8","author":"S Dasgupta","year":"2016","unstructured":"Dasgupta, S., Pal, S.: Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspect. Sci. 8, 692\u2013695 (2016)","journal-title":"Perspect. Sci."},{"key":"2723_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.ifacol.2016.10.390","volume":"49","author":"F Farokhi","year":"2016","unstructured":"Farokhi, F., et al.: Secure and private cloud-based control using semi-homomorphic encryption. IFAC-PapersOnLine 49, 163\u2013168 (2016)","journal-title":"IFAC-PapersOnLine"},{"key":"2723_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.comcom.2017.07.006","volume":"111","author":"N Kaaniche","year":"2017","unstructured":"Kaaniche, N., Laurent, M.: Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Comput. Commun. 111, 120\u2013141 (2017)","journal-title":"Comput. Commun."},{"key":"2723_CR18","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2017","unstructured":"Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12, 767\u2013778 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2723_CR19","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2956185","volume":"49","author":"J Tang","year":"2016","unstructured":"Tang, J., et al.: Ensuring security and privacy preservation for cloud data services. ACM Comput. Surv. (CSUR) 49, 13 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2723_CR20","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1109\/TC.2014.2360516","volume":"64","author":"X Zhang","year":"2015","unstructured":"Zhang, X., et al.: Proximity-aware local-recoding anonymization with mapreduce for scalable big data privacy preservation in cloud. IEEE Trans. Comput. 64, 2293\u20132307 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"2723_CR21","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., et al.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27, 340\u2013352 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2723_CR22","unstructured":"Wang, B., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM, 2014 Proceedings IEEE, pp. 2112\u20132120 (2014)"},{"key":"2723_CR23","first-page":"233","volume":"34","author":"K Hariss","year":"2017","unstructured":"Hariss, K., et al.: Fully enhanced homomorphic encryption algorithm of MORE approach for real world applications. J. Inf. Secur. Appl. 34, 233\u2013242 (2017)","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2723-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2723-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2723-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T18:47:19Z","timestamp":1660762039000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2723-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,2]]},"references-count":23,"journal-issue":{"issue":"S4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["2723"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2723-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,2]]},"assertion":[{"value":"1 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}