{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T18:41:43Z","timestamp":1772563303070,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T00:00:00Z","timestamp":1581120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T00:00:00Z","timestamp":1581120000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s10586-020-03069-3","type":"journal-article","created":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T00:04:16Z","timestamp":1581120256000},"page":"3057-3067","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Elliptic curve Diffie\u2013Hellman cryptosystem in big data cloud security"],"prefix":"10.1007","volume":"23","author":[{"given":"E. K.","family":"Subramanian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Latha","family":"Tamilselvan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,2,8]]},"reference":[{"issue":"6","key":"3069_CR1","first-page":"1093","volume":"12","author":"MZ Salem","year":"2017","unstructured":"Salem, M.Z., Sabbeh, S.F., Tarek, E.L.: An efficient privacy preserving public auditing mechanism for secure cloud storage. Int. J. Appl. Eng. Res. 12(6), 1093\u20131101 (2017)","journal-title":"Int. J. Appl. Eng. Res."},{"issue":"6","key":"3069_CR2","first-page":"166","volume":"8","author":"R Bhatt Agarwal","year":"2019","unstructured":"Bhatt Agarwal, R.: A technological review on scheduling algorithm to improve performance of cloud computing environment. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 8(6), 166\u2013172 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"issue":"11","key":"3069_CR3","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/TIFS.2015.2455952","volume":"10","author":"L Zhou","year":"2015","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans. Inf. Forensics Secur. 10(11), 2381\u20132395 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"3069_CR4","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847\u2013859 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"8","key":"3069_CR5","first-page":"2299","volume":"13","author":"N Panwar","year":"2018","unstructured":"Panwar, N., Negi, S., Rauthan, M.S., Aggarwal, M.A.Y.A.N.K., Jain, P.: An enhanced scheduling approach with cloudlet migrations for resource intensive applications. J. Eng. Sci. Technol. 13(8), 2299\u20132317 (2018)","journal-title":"J. Eng. Sci. Technol."},{"key":"3069_CR6","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-981-10-6620-7_46","volume-title":"Big Data Analytics","author":"M Aggrawal","year":"2018","unstructured":"Aggrawal, M., Kumar, N., Kumar, R.: Optimized cost model with optimal disk usage for cloud. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics, pp. 481\u2013485. Springer, Singapore (2018)"},{"key":"3069_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-25207-0_20","volume-title":"Natural Language Processing and Chinese Computing","author":"W Song","year":"2015","unstructured":"Song, W., Cui, Y., Peng, Z.: A full-text retrieval algorithm for encrypted data in cloud storage applications. In: Li, J., Ji, H., Zhao, D., Feng, Y. (eds.) Natural Language Processing and Chinese Computing, pp. 229\u2013241. Springer, Cham (2015)"},{"issue":"2","key":"3069_CR8","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1631\/jzus.C1200240","volume":"14","author":"Y Cheng","year":"2013","unstructured":"Cheng, Y., Wang, Z.Y., Ma, J., Wu, J.J., Mei, S.Z., Ren, J.C.: Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. J. Zhejiang Univ. Sci. C 14(2), 85\u201397 (2013)","journal-title":"J. Zhejiang Univ. Sci. C"},{"key":"3069_CR9","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1007\/s11277-018-5667-8","volume":"100","author":"S Srisakthi","year":"2018","unstructured":"Srisakthi, S. Shanthi, A.P.: Design of a secure encryption model (SEM) for cloud data storage using hadamard transforms. Wirel. Pers. Commun. 100, 1727\u20131741 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"3069_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comnet.2015.06.014","volume":"88","author":"W Wang","year":"2015","unstructured":"Wang, W., Chen, L., Zhang, Q.: Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput. Netw. 88, 136\u2013148 (2015)","journal-title":"Comput. Netw."},{"issue":"6","key":"3069_CR11","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1007\/s11390-016-1687-6","volume":"31","author":"XM He","year":"2016","unstructured":"He, X.M., Wang, X.S., Li, D., Hao, Y.N.: Semi-homogenous generalization: improving homogenous generalization for privacy preservation in cloud computing. J. Comput. Sci. Technol 31(6), 1124\u20131135 (2016)","journal-title":"J. Comput. Sci. Technol"},{"issue":"1","key":"3069_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TPDS.2014.2308218","volume":"26","author":"H Liu","year":"2015","unstructured":"Liu, H., Ning, H., Xiong, Q., Yang, L.T.: Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans. Parallel Distrib. Syst. 26(1), 241\u2013251 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3069_CR13","doi-asserted-by":"publisher","first-page":"9561","DOI":"10.1007\/s10586-018-2723-9","volume":"22","author":"GP Kanna","year":"2019","unstructured":"Kanna, G.P., Vasudevan, V.: A fully homomorphic\u2013elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data. Clust. Comput. 22, 9561\u20139569 (2019)","journal-title":"Clust. Comput."},{"key":"3069_CR14","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jcss.2016.12.006","volume":"89","author":"Z Wang","year":"2017","unstructured":"Wang, Z., Cao, C., Yang, N., Chang, V.: ABE with improved auxiliary input for big data security. J. Comput. Syst. Sci. 89, 41\u201350 (2017)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"3069_CR15","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","volume":"4","author":"K Yang","year":"2017","unstructured":"Yang, K., Han, Q., Li, H., Zheng, K., Su, Z., Shen, X.: An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J. 4(2), 563\u2013571 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"3069_CR16","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s00779-017-1090-5","volume":"22","author":"CY Yang","year":"2018","unstructured":"Yang, C.Y., Huang, C.T., Wang, Y.P., Chen, Y.W., Wang, S.J.: File changes with security proof stored in cloud service systems. Pers. Ubiquit. Comput. 22(1), 45\u201353 (2018)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"21","key":"3069_CR17","doi-asserted-by":"publisher","first-page":"22803","DOI":"10.1007\/s11042-017-4590-4","volume":"76","author":"C Stergiou","year":"2017","unstructured":"Stergiou, C., Psannis, K.E.: Efficient and secure BIG data delivery in cloud computing. Multimed. Tools Appl. 76(21), 22803\u201322822 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"3069_CR18","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s10586-017-1368-4","volume":"21","author":"M Thangavel","year":"2018","unstructured":"Thangavel, M., Varalakshmi, P.: Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Clust. Comput. 21, 1411\u20131437 (2018)","journal-title":"Clust. Comput."},{"key":"3069_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.amc.2017.07.008","volume":"314","author":"D He","year":"2017","unstructured":"He, D., Kumar, N., Wang, H., Wang, L., Choo, K.K.R.: Privacy-preserving certificate less provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314, 31\u201343 (2017)","journal-title":"Appl. Math. Comput."},{"key":"3069_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jpdc.2016.05.017","volume":"99","author":"W Song","year":"2017","unstructured":"Song, W., Wang, B., Wang, Q., Peng, Z., Lou, W., Cui, Y.: A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J. Parallel Distrib. Comput. 99, 14\u201327 (2017)","journal-title":"J. Parallel Distrib. Comput."},{"key":"3069_CR21","unstructured":"Gnanaprakasam, T., Rajivkannan, A.: Optimal Ecc based dual encryption technique for data security in cloud. Int. J. Adv. Eng. Technol. VII(II) (2016)"},{"issue":"3","key":"3069_CR22","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari, A., Gupta, B.B.: Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J. Supercomput. 73(3), 1085\u20131102 (2017)","journal-title":"J. Supercomput."},{"key":"3069_CR23","doi-asserted-by":"publisher","unstructured":"Gupta, B.B., Agrawal, D.P.: Handbook of research on cloud computing and big data applications in IoT. In: IGI Global. (2019). https:\/\/doi.org\/10.4018\/978-1-5225-8407-0","DOI":"10.4018\/978-1-5225-8407-0"},{"issue":"2","key":"3069_CR24","first-page":"79","volume":"9","author":"OO Olakanmi","year":"2019","unstructured":"Olakanmi, O.O., Dada, A.: An efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms. Int. J. Cloud Appl. Comput. (IJCAC) 9(2), 79\u201398 (2019)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"issue":"4","key":"3069_CR25","first-page":"20","volume":"7","author":"P Azad","year":"2017","unstructured":"Azad, P., Navimipour, N.J.: An energy-aware task scheduling in the cloud computing using a hybrid cultural and ant colony optimization algorithm. Int. J. Cloud Appl. Comput. (IJCAC) 7(4), 20\u201340 (2017)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"3069_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1486-z","author":"S Anbuchelian","year":"2017","unstructured":"Anbuchelian, S., Sowmya, C.M., Ramesh, C.: Efficient and secure auditing scheme for privacy preserving data storage in cloud. Clust. Comput. (2017). https:\/\/doi.org\/10.1007\/s10586-017-1486-z","journal-title":"Clust. Comput."},{"key":"3069_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2829880","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Depend. Secure Comput. (2018). https:\/\/doi.org\/10.1109\/TDSC.2018.2829880","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"6","key":"3069_CR28","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TIFS.2016.2528500","volume":"11","author":"J Yu","year":"2016","unstructured":"Yu, J., Ren, K., Wang, C.: Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 11(6), 1362\u20131375 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03069-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-020-03069-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03069-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T03:03:11Z","timestamp":1612839791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-020-03069-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,8]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["3069"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03069-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,8]]},"assertion":[{"value":"30 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}