{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:00:49Z","timestamp":1772233249094,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Taighde \u00c9ireann - Research Ireland","award":["12\/RC\/2289 P2 (Insight)"],"award-info":[{"award-number":["12\/RC\/2289 P2 (Insight)"]}]},{"name":"Taighde \u00c9ireann - Research Ireland","award":["12\/RC\/2289 P2 (Insight)"],"award-info":[{"award-number":["12\/RC\/2289 P2 (Insight)"]}]},{"name":"Taighde \u00c9ireann - Research Ireland","award":["12\/RC\/2289 P2 (Insight)"],"award-info":[{"award-number":["12\/RC\/2289 P2 (Insight)"]}]},{"name":"European Union\u2019s Horizon Europe","award":["101100680 (GN5-1)"],"award-info":[{"award-number":["101100680 (GN5-1)"]}]},{"name":"European Union\u2019s Horizon Europe","award":["101100680 (GN5-1)"],"award-info":[{"award-number":["101100680 (GN5-1)"]}]},{"name":"National University Ireland, Galway"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The advent of cloud computing has revolutionized data management, providing scalability and cost-effectiveness. However, it also presents challenges in ensuring data security and privacy. Thus organizations increasingly adopt multi-cloud storage strategies to avoid data loss and single points of failure, but a new array of complexities emerges, particularly related to secure data access and management with a multi-cloud strategy. This paper explores these complexities and presents an innovative encryption-based solution for secure data storage and easy accessibility in a multi-cloud system. In this work, we proposed CloudLock framework which uses hybrid ChaCha20-Poly1305 encryption mechanism to store and access the data in multi-cloud systems. Moreover, the secret key used for encryption and decryption is shared between the data owner and authentic users using Elliptic Curve Diffie-Hellman (ECDH) mechanism. Our focus is to establish a robust mechanism that permits only authenticated users to access and manage their data across multi-cloud platforms. Thus with the proposed model, we aim to balance security, accessibility, and efficiency, thereby offering a potential solution to multi-cloud storage\u2019s multifaceted challenges. Our rigorous security assessment and performance analysis, which considers a broad range of parameters including encryption and decryption time, upload and download time, turn-around time, and memory usage, affirms that our proposed framework is highly efficient. The framework meets the stringent requirements necessary for secure data sharing, demonstrating robust resilience to various security threats. When compared to existing methods, our proposed framework showcases superior performance and enhanced security characteristics.<\/jats:p>","DOI":"10.1007\/s10586-025-05433-7","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T13:03:05Z","timestamp":1753966985000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cloudlock: secure data sharing using a hybrid cryptosystem in multi-cloud data storage"],"prefix":"10.1007","volume":"28","author":[{"given":"Nitesh","family":"Bharot","sequence":"first","affiliation":[]},{"given":"Nakul","family":"Mehta","sequence":"additional","affiliation":[]},{"given":"John G.","family":"Breslin","sequence":"additional","affiliation":[]},{"given":"Priyanka","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"key":"5433_CR1","unstructured":"Grand View Research: Cloud Computing Industry. https:\/\/www.grandviewresearch.com\/industry-analysis\/cloud-computing-industry. Accessed: Mar 15, 2025"},{"key":"5433_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"I Hashem","year":"2015","unstructured":"Hashem, I., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A., Khan, S.U.: The rise of \u201cbig data\u2019\u2019 on cloud computing: review and open research issues. Inf. Syst. 47, 98\u2013115 (2015)","journal-title":"Inf. Syst."},{"key":"5433_CR3","doi-asserted-by":"crossref","unstructured":"Verma, P., Tapaswi, S., Godfrey, W.W.: A request aware module using cs-idr to reduce vm level collateral damages caused by ddos attack in cloud environment. Cluster Comput. 24, 1917\u20131933 (2021)","DOI":"10.1007\/s10586-021-03234-2"},{"issue":"6","key":"5433_CR4","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah, M.A., Ali, A., Hajjej, F., Pasha, M.F., Alohali, M.A.: A lightweight hybrid deep learning privacy preserving model for fc-based industrial internet of medical things. Sensors 22(6), 2112 (2022)","journal-title":"Sensors"},{"issue":"4","key":"5433_CR5","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.3390\/s22041448","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah, M.A., Hajjej, F., Ali, A., Pasha, M.F., Almomani, O.: A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based cps. Sensors 22(4), 1448 (2022)","journal-title":"Sensors"},{"key":"5433_CR6","unstructured":"Grand View Research: Multi-Cloud Management Market Report. https:\/\/www.grandviewresearch.com\/industry-analysis\/multi-cloud-management-market-report. Accessed: Mar 15, 2025"},{"key":"5433_CR7","doi-asserted-by":"publisher","unstructured":"Seth, D., Nerella, H., Najana, M., Tabbassum, A.: Navigating the multi-cloud maze: benefits, challenges, and future trends. Int. J. Global Innov. Solut. (IJGIS) (2024). https:\/\/doi.org\/10.21428\/e90189c8.8c704fe4","DOI":"10.21428\/e90189c8.8c704fe4"},{"key":"5433_CR8","doi-asserted-by":"crossref","unstructured":"AlZain, M.A., Pardede, E., Soh, B., Thom, J.A.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences, pp. 5490\u20135499 (2012). IEEE","DOI":"10.1109\/HICSS.2012.153"},{"issue":"1","key":"5433_CR9","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4018\/IJSIR.2021010103","volume":"12","author":"P Verma","year":"2021","unstructured":"Verma, P., Tapaswi, S., Godfrey, W.W.: An impact analysis and detection of http flooding attack in cloud using bio-inspired clustering approach. Int. J. Swarm Intell. Res. (IJSIR) 12(1), 29\u201349 (2021)","journal-title":"Int. J. Swarm Intell. Res. (IJSIR)"},{"issue":"4","key":"5433_CR10","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TDSC.2013.6","volume":"10","author":"J-M Bohli","year":"2013","unstructured":"Bohli, J.-M., Gruschka, N., Jensen, M., Iacono, L.L., Marnau, N.: Security and privacy-enhancing multicloud architectures. IEEE Trans. Dependable Secure Comput. 10(4), 212\u2013224 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5433_CR11","unstructured":"Shaik, K., Narayana Rao, T.V., et al.: Implementation of encryption algorithm for data security in cloud computing. Int. J. Adv. Res. Compute. Sci. 8(3), 579, (2017)"},{"key":"5433_CR12","doi-asserted-by":"crossref","unstructured":"Madanan, M., Patel, P., Agrawal, P., Mudholkar, P., Mudholkar, M., Jaganraja, V.: Security challenges in multi-cloud environments: Solutions and best practices. In: 2024 7th International Conference on Contemporary Computing and Informatics (IC3I), vol. 7, pp. 1608\u20131614 (2024). IEEE","DOI":"10.1109\/IC3I61595.2024.10828949"},{"key":"5433_CR13","doi-asserted-by":"crossref","unstructured":"Razaque, A., Nadimpalli, S.S.V., Vommina, S., Atukuri, D.K., Reddy, D.N., Anne, P., Vegi, D., Malllapu, V.S.: Secure data sharing in multi-clouds. In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1909\u20131913 (2016). IEEE","DOI":"10.1109\/ICEEOT.2016.7755020"},{"key":"5433_CR14","doi-asserted-by":"publisher","first-page":"2813","DOI":"10.1007\/s13369-019-04178-x","volume":"45","author":"P Verma","year":"2020","unstructured":"Verma, P., Tapaswi, S., Godfrey, W.W.: An adaptive threshold-based attribute selection to classify requests under ddos attack in cloud-based systems. Arab. J. Sci. Eng. 45, 2813\u20132834 (2020)","journal-title":"Arab. J. Sci. Eng."},{"issue":"2","key":"5433_CR15","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2014.2379646","volume":"11","author":"M Ali","year":"2015","unstructured":"Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y.: Sedasc: secure data sharing in clouds. IEEE Syst. J. 11(2), 395\u2013404 (2015)","journal-title":"IEEE Syst. J."},{"key":"5433_CR16","doi-asserted-by":"crossref","unstructured":"Balasaraswathi, V., Manikandan, S.: Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In: 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, pp. 1190\u20131194 (2014). IEEE","DOI":"10.1109\/ICACCCT.2014.7019286"},{"key":"5433_CR17","doi-asserted-by":"crossref","unstructured":"Vaidya, M., Nehe, S.: Data security using data slicing over storage clouds. In: 2015 International Conference on Information Processing (ICIP), pp. 322\u2013325 (2015). IEEE","DOI":"10.1109\/INFOP.2015.7489401"},{"issue":"2","key":"5433_CR18","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1007\/s11277-020-07630-6","volume":"115","author":"P Verma","year":"2020","unstructured":"Verma, P., Tapaswi, S., Godfrey, W.W.: Avdr: a framework for migration policy to handle ddos attacked vm in cloud. Wireless Pers. Commun. 115(2), 1335\u20131361 (2020)","journal-title":"Wireless Pers. Commun."},{"issue":"1","key":"5433_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.54660\/.IJMRGE.2025.6.1.26-35","volume":"6","author":"AO Akinade","year":"2025","unstructured":"Akinade, A.O., Adepoju, P.A., Ige, A.B., Afolabi, A.I.: Cloud security challenges and solutions: a review of current best practices. Int. J. Multidiscip. Res. Growth Eval. 6(1), 26\u201335 (2025)","journal-title":"Int. J. Multidiscip. Res. Growth Eval."},{"key":"5433_CR20","doi-asserted-by":"publisher","unstructured":"Karnik, N., Kumar, A., Mahajan, P. et al. An efficient technique for securing a multi-cloud storage environment. Int J Syst Assur Eng Manag (2025). https:\/\/doi.org\/10.1007\/s13198-025-02751-2","DOI":"10.1007\/s13198-025-02751-2"},{"key":"5433_CR21","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/s12204-014-1514-6","volume":"19","author":"L-L Wang","year":"2014","unstructured":"Wang, L.-L., Ke-fei, C., Xian-ping, M., Yong-tao, W.: Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J. Shanghai Jiaotong Univ. (Chin. Ed.) 19, 398\u2013405 (2014)","journal-title":"J. Shanghai Jiaotong Univ. (Chin. Ed.)"},{"key":"5433_CR22","doi-asserted-by":"crossref","unstructured":"Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshops, pp. 275\u2013279 (2010). IEEE","DOI":"10.1109\/ICPPW.2010.45"},{"key":"5433_CR23","first-page":"1","volume":"3783","author":"C Cachin","year":"2010","unstructured":"Cachin, C., Haas, R., Vukolic, M.: Dependable storage in the intercloud. IBM Res. 3783, 1\u20136 (2010)","journal-title":"IBM Res."},{"issue":"4","key":"5433_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535929","volume":"9","author":"A Bessani","year":"2013","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: Depsky: dependable and secure storage in a cloud-of-clouds. Acm Trans. Storage (tos) 9(4), 1\u201333 (2013)","journal-title":"Acm Trans. Storage (tos)"},{"key":"5433_CR25","unstructured":"Bhatt, S., Shivarudra, A., Kavuri, S., Mehra, A., Paulraj, B.: Building scalable and secure data ecosystems for multi-cloud architectures. Lett. High Energy Phys. 2024, 11 (2025)"},{"issue":"5","key":"5433_CR26","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/TNSE.2023.3285070","volume":"10","author":"A Ali","year":"2023","unstructured":"Ali, A., Pasha, M.F., Guerrieri, A., Guzzo, A., Sun, X., Saeed, A., Hussain, A., Fortino, G.: A novel homomorphic encryption and consortium blockchain-based hybrid deep learning model for industrial internet of medical things. IEEE Trans. Netw. Sci. Eng. 10(5), 2402\u20132418 (2023)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"5433_CR27","doi-asserted-by":"publisher","first-page":"572","DOI":"10.3390\/s22020572","volume":"22","author":"A Ali","year":"2022","unstructured":"Ali, A., Almaiah, M.A., Hajjej, F., Pasha, M.F., Fang, O.H., Khan, R., Teo, J., Zakarya, M.: An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 22(2), 572 (2022)","journal-title":"Sensors"},{"issue":"1","key":"5433_CR28","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1093\/comjnl\/bxae092","volume":"68","author":"N Hajlaoui","year":"2025","unstructured":"Hajlaoui, N., Bejaoui, C., Ismail, T., Ghanmi, H., Touati, H.: A hybrid architecture for secure data sharing in multi-clouds system. Comput. J. 68(1), 58\u201373 (2025)","journal-title":"Comput. J."},{"key":"5433_CR29","doi-asserted-by":"publisher","unstructured":"Vaishnav, J., Aulakh, D., Wadhwa, B., Ganesh, D., Singh, J., Sinha, S.K.: Multi-cloud storage augmentation: a novel secured framework for information sharing. Int. J. Syst. Assur. Eng. Manage. 1\u201310 (2025). https:\/\/doi.org\/10.1007\/s13198-025-02731-6","DOI":"10.1007\/s13198-025-02731-6"},{"key":"5433_CR30","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.is.2014.05.004","volume":"48","author":"B Fabian","year":"2015","unstructured":"Fabian, B., Ermakova, T., Junghanns, P.: Collaborative and secure sharing of healthcare data in multi-clouds. Inf. Syst. 48, 132\u2013150 (2015)","journal-title":"Inf. Syst."},{"issue":"2","key":"5433_CR31","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s12065-020-00404-w","volume":"14","author":"G Viswanath","year":"2021","unstructured":"Viswanath, G., Krishna, P.V.: Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intel. 14(2), 691\u2013698 (2021)","journal-title":"Evol. Intel."},{"issue":"11","key":"5433_CR32","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"5433_CR33","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop On, pp. 313\u2013313 (1979). IEEE Computer Society","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"3","key":"5433_CR34","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.csi.2007.08.004","volume":"30","author":"MH Dehkordi","year":"2008","unstructured":"Dehkordi, M.H., Mashhadi, S.: An efficient threshold verifiable multi-secret sharing. Comput. Stand. Interfaces 30(3), 187\u2013190 (2008)","journal-title":"Comput. Stand. Interfaces"},{"key":"5433_CR35","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.tcs.2012.05.006","volume":"445","author":"C Hu","year":"2012","unstructured":"Hu, C., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on lfsr sequences. Theoret. Comput. Sci. 445, 52\u201362 (2012)","journal-title":"Theoret. Comput. Sci."},{"issue":"15","key":"5433_CR36","doi-asserted-by":"publisher","first-page":"2889","DOI":"10.1016\/j.ins.2010.04.015","volume":"180","author":"Z Eslami","year":"2010","unstructured":"Eslami, Z., Ahmadabadi, J.Z.: A verifiable multi-secret sharing scheme based on cellular automata. Inf. Sci. 180(15), 2889\u20132894 (2010)","journal-title":"Inf. Sci."},{"issue":"9","key":"5433_CR37","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.ins.2007.11.031","volume":"178","author":"MH Dehkordi","year":"2008","unstructured":"Dehkordi, M.H., Mashhadi, S.: New efficient and practical verifiable multi-secret sharing schemes. Inf. Sci. 178(9), 2262\u20132274 (2008)","journal-title":"Inf. Sci."},{"key":"5433_CR38","doi-asserted-by":"crossref","unstructured":"Nir, Y., Langley, A.: Request for comments 7539: Chacha20 and poly1305 for ietf protocols. Internet Research Task Force (IRTF). (2015)","DOI":"10.17487\/RFC7539"},{"key":"5433_CR39","unstructured":"Procter, G.: A security analysis of the composition of chacha20 and poly1305. Cryptology ePrint Archive (2014)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05433-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05433-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05433-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:42:19Z","timestamp":1757439739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05433-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,31]]},"references-count":39,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5433"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05433-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,31]]},"assertion":[{"value":"21 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"464"}}