{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:11:41Z","timestamp":1770538301782,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The key scientific and technological research projects in Henan province of China","award":["No.242102210137"],"award-info":[{"award-number":["No.242102210137"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05052-8","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T12:45:43Z","timestamp":1753965943000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests"],"prefix":"10.1007","volume":"28","author":[{"given":"Yiqian","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jinting","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"issue":"2","key":"5052_CR1","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/tnsm.2018.2825358","volume":"15","author":"J Huang","year":"2018","unstructured":"Huang, J., Zou, J., Xing, C.C.: Competitions among service providers in cloud computing: a new economic model. IEEE Trans. Netw. Serv. Manag. 15(2), 866\u2013877 (2018). https:\/\/doi.org\/10.1109\/tnsm.2018.2825358","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"21","key":"5052_CR2","doi-asserted-by":"publisher","first-page":"14459","DOI":"10.1007\/s00521-021-06085-5","volume":"33","author":"V Prabhakaran","year":"2021","unstructured":"Prabhakaran, V., Kulandasamy, A.: Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection. Neural Comput. Appl. 33(21), 14459\u201314479 (2021). https:\/\/doi.org\/10.1007\/s00521-021-06085-5","journal-title":"Neural Comput. Appl."},{"key":"5052_CR3","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s00500-019-03857-z","volume":"23","author":"E Shanmugapriya","year":"2019","unstructured":"Shanmugapriya, E., Kavitha, R.: Medical big data analysis: preserving security and privacy with hybrid cloud technology. Soft Comput. 23, 2585\u20132596 (2019). https:\/\/doi.org\/10.1007\/s00500-019-03857-z","journal-title":"Soft Comput."},{"key":"5052_CR4","doi-asserted-by":"publisher","first-page":"107438","DOI":"10.1016\/j.comnet.2020.107438","volume":"181","author":"A Pasdar","year":"2020","unstructured":"Pasdar, A., Lee, Y.C., Almiani, K.: Hybrid scheduling for scientific workflows on hybrid clouds. Comput. Netw. 181, 107438 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107438","journal-title":"Comput. Netw."},{"key":"5052_CR5","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.cose.2017.03.009","volume":"70","author":"A Hudic","year":"2017","unstructured":"Hudic, A., Smith, P., Weippl, E.R.: Security assurance assessment methodology for hybrid clouds. Comput. Secur. 70, 723\u2013743 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.03.009","journal-title":"Comput. Secur."},{"key":"5052_CR6","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.jisa.2018.10.008","volume":"43","author":"F Munodawafa","year":"2018","unstructured":"Munodawafa, F., Awad, A.I.: Security risk assessment within hybrid data centers: a case study of delay sensitive applications. J. Inf. Secur. Appl. 43, 61\u201372 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.10.008","journal-title":"J. Inf. Secur. Appl."},{"key":"5052_CR7","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.future.2022.12.041","volume":"142","author":"D Lee","year":"2023","unstructured":"Lee, D., Oh, Y., Hong, J.B., Kim, H., Kim, D.D.: PP-GSM: privacy-preserving graphical security model for security assessment as a service. Futur. Gener. Comput. Syst. 142, 351\u2013363 (2023). https:\/\/doi.org\/10.1016\/j.future.2022.12.041","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5052_CR8","doi-asserted-by":"publisher","first-page":"102074","DOI":"10.1016\/j.cose.2020.102074","volume":"100","author":"N Saravanan","year":"2021","unstructured":"Saravanan, N., Umamakeswari, A.: Lattice based access control for protecting user data in cloud environments with hybrid security. Comput. Secur. 100, 102074 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102074","journal-title":"Comput. Secur."},{"issue":"1","key":"5052_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.36548\/jiip.2021.1.004","volume":"3","author":"JS Manoharan","year":"2021","unstructured":"Manoharan, J.S.: A novel user layer cloud security model based on chaotic Arnold transformation using fingerprint biometric traits. JIIP 3(1), 36\u201351 (2021)","journal-title":"JIIP"},{"key":"5052_CR10","doi-asserted-by":"publisher","first-page":"102296","DOI":"10.1016\/j.simpat.2021.102296","volume":"109","author":"T Yeh","year":"2021","unstructured":"Yeh, T., Chen, Y.: Improving the hybrid cloud performance through disk activity-aware data access. Simul. Modell. Pract. Theory 109, 102296 (2021). https:\/\/doi.org\/10.1016\/j.simpat.2021.102296","journal-title":"Simul. Modell. Pract. Theory"},{"key":"5052_CR11","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2018.09.026","volume":"93","author":"H He","year":"2019","unstructured":"He, H., Zhang, J., Li, P., Jin, Y., Zhang, T.: A lightweight secure conjunctive keyword search scheme in hybrid cloud. Futur. Gener. Comput. Syst. 93, 727\u2013736 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.09.026","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"5052_CR12","doi-asserted-by":"publisher","first-page":"1940","DOI":"10.1109\/tcc.2022.3173260","volume":"11","author":"H Liu","year":"2022","unstructured":"Liu, H., Lu, X., Duan, S., Zhang, Y., Xiang, Y.: An efficient oblivious random data access scheme in cloud computing. IEEE Trans. Cloud Comput. 11(2), 1940\u20131953 (2022). https:\/\/doi.org\/10.1109\/tcc.2022.3173260","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"23","key":"5052_CR13","doi-asserted-by":"publisher","first-page":"13145","DOI":"10.1007\/s00500-022-06977-1","volume":"26","author":"SR Vulapula","year":"2022","unstructured":"Vulapula, S.R., Valiveti, H.B.: Secure and efficient data storage scheme for unstructured data in hybrid cloud environment. Soft Comput. 26(23), 13145\u201313152 (2022). https:\/\/doi.org\/10.1007\/s00500-022-06977-1","journal-title":"Soft Comput."},{"issue":"1","key":"5052_CR14","doi-asserted-by":"publisher","first-page":"2376484","DOI":"10.1155\/2017\/2376484","volume":"2017","author":"X Xu","year":"2017","unstructured":"Xu, X., Zhao, X., Ruan, F., Zhang, J., Tian, W., Dou, W., Liu, A.X.: Data placement for privacy-aware applications over big data in hybrid clouds. Secur. Commun. Netw. 2017(1), 2376484 (2017). https:\/\/doi.org\/10.1155\/2017\/2376484","journal-title":"Secur. Commun. Netw."},{"key":"5052_CR15","doi-asserted-by":"publisher","first-page":"103837","DOI":"10.1016\/j.jnca.2024.103837","volume":"3","author":"F Ullah","year":"2024","unstructured":"Ullah, F., Dhingra, S., Xiao, X., Babar, M.A.: Evaluation of distributed data processing frameworks in hybrid clouds. J. Netw. Comput. Appl. 3, 103837 (2024). https:\/\/doi.org\/10.1016\/j.jnca.2024.103837","journal-title":"J. Netw. Comput. Appl."},{"key":"5052_CR16","doi-asserted-by":"publisher","first-page":"211540","DOI":"10.1109\/access.2020.3037921","volume":"8","author":"W Hu","year":"2020","unstructured":"Hu, W., Li, X., Li, X.: Hybrid cloud workflow scheduling method with privacy data. IEEE Access 8, 211540\u2013211552 (2020). https:\/\/doi.org\/10.1109\/access.2020.3037921","journal-title":"IEEE Access"},{"issue":"5","key":"5052_CR17","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1109\/jiot.2017.2732357","volume":"4","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Huang, H., Xiang, Y., Zhang, L.Y., He, X.: Harnessing the hybrid cloud for secure big image data service. IEEE Internet Things J. 4(5), 1380\u20131388 (2017). https:\/\/doi.org\/10.1109\/jiot.2017.2732357","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"5052_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3119896","volume":"13","author":"P Viotti","year":"2017","unstructured":"Viotti, P., Dobre, D., Vukolic, M.: Hybris: robust hybrid cloud storage. ACM Trans. Storage 13(3), 1\u201332 (2017). https:\/\/doi.org\/10.1145\/3119896","journal-title":"ACM Trans. Storage"},{"issue":"3","key":"5052_CR19","doi-asserted-by":"publisher","first-page":"3810","DOI":"10.1109\/jsyst.2023.3246727","volume":"17","author":"S Zhu","year":"2023","unstructured":"Zhu, S., Wang, J., Li, W.W.: Cloud or in-house service? strategic joining and social optimality in hybrid service systems with retrial orbit. IEEE Syst. J. 17(3), 3810\u20133821 (2023). https:\/\/doi.org\/10.1109\/jsyst.2023.3246727","journal-title":"IEEE Syst. J."},{"key":"5052_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-019-0140-0","volume":"8","author":"I Lee","year":"2019","unstructured":"Lee, I.: An optimization approach to capacity evaluation and investment decision of hybrid cloud: a corporate customer\u2019s perspective. J. Cloud Comput. 8, 1\u201313 (2019). https:\/\/doi.org\/10.1186\/s13677-019-0140-0","journal-title":"J. Cloud Comput."},{"issue":"1","key":"5052_CR21","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/tcc.2019.2956134","volume":"10","author":"G Liu","year":"2019","unstructured":"Liu, G., Xiao, Z., Chronopoulos, A.T., Liu, C., Tang, Z.: A many-to-many demand and response hybrid game method for cloud environments. IEEE Trans. Cloud Comput. 10(1), 158\u2013171 (2019). https:\/\/doi.org\/10.1109\/tcc.2019.2956134","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5052_CR22","first-page":"952","volume-title":"IEEE\u20196-international conference on Cloud Computing","author":"JY Zhang","year":"2013","unstructured":"Zhang, J.Y., Wu, P., Zhu, J., Hu, H., Bonomi, F.: Privacy-preserved mobile sensing through hybrid cloud trust framework. In: IEEE\u20196-international conference on Cloud Computing, pp. 952\u2013953. IEEE, Piscataway (2013)"},{"issue":"2","key":"5052_CR23","doi-asserted-by":"publisher","first-page":"49","DOI":"10.3390\/fi16020049","volume":"16","author":"H Saadatfar","year":"2024","unstructured":"Saadatfar, H., Gholampour Ahangar, H., Hassannataj Joloudari, J.: A new dynamic game-based pricing model for cloud environment. Futur. Internet 16(2), 49 (2024). https:\/\/doi.org\/10.3390\/fi16020049","journal-title":"Futur. Internet"},{"key":"5052_CR24","doi-asserted-by":"publisher","first-page":"4191","DOI":"10.1007\/s00500-019-04183-0","volume":"24","author":"Z Zhu","year":"2020","unstructured":"Zhu, Z., Peng, J., Liu, K., Zhang, X.: A game-based resource pricing and allocation mechanism for profit maximization in cloud computing. Soft Comput. 24, 4191\u20134203 (2020). https:\/\/doi.org\/10.1007\/s00500-019-04183-0","journal-title":"Soft Comput."},{"key":"5052_CR25","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10586-023-03975-2","volume":"27","author":"Z Alomari","year":"2024","unstructured":"Alomari, Z., AL-Oudat, M., Alkhushayni, S.: Pricing the cloud based on multi-attribute auction mechanism. Clust. Comput. 27, 629\u2013654 (2024)","journal-title":"Clust. Comput."},{"key":"5052_CR26","doi-asserted-by":"publisher","first-page":"107957","DOI":"10.1016\/j.cie.2022.107957","volume":"165","author":"F Chen","year":"2022","unstructured":"Chen, F., Lu, A., Wu, H., Dou, R., Wang, X.: Optimal strategies on pricing and resource allocation for cloud services with service guarantees. Comput. Ind. Eng. 165, 107957 (2022). https:\/\/doi.org\/10.1016\/j.cie.2022.107957","journal-title":"Comput. Ind. Eng."},{"issue":"16","key":"5052_CR27","doi-asserted-by":"publisher","first-page":"18627","DOI":"10.1007\/s11227-023-05374-1","volume":"79","author":"H Ye","year":"2023","unstructured":"Ye, H., Feng, B., Li, X.: A game-based approach for cloudlet resource pricing for cloudlet federation. J. Supercomput. 79(16), 18627\u201318647 (2023). https:\/\/doi.org\/10.1007\/s11227-023-05374-1","journal-title":"J. Supercomput."},{"key":"5052_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/9781118625651","volume-title":"Fundamentals of queueing theory","author":"D Gross","year":"2008","unstructured":"Gross, D., Shortle, F.J., Thompson, J.M., Harris, C.M.: Fundamentals of queueing theory. Wiley, Hoboken (2008)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05052-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05052-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05052-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:41:33Z","timestamp":1757439693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05052-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,31]]},"references-count":28,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5052"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05052-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,31]]},"assertion":[{"value":"24 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"426"}}