{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:56:39Z","timestamp":1775066199054,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05507-6","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T16:39:04Z","timestamp":1757954344000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lattice-based cryptographic technique to preserve data confidentiality in edge computing"],"prefix":"10.1007","volume":"28","author":[{"given":"Vinayak A.","family":"Telsang","sequence":"first","affiliation":[]},{"given":"Mahabaleshwar S.","family":"Kakkasageri","sequence":"additional","affiliation":[]},{"given":"Anil D.","family":"Devangavi","sequence":"additional","affiliation":[]},{"given":"Rajani S.","family":"Pujar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"issue":"5","key":"5507_CR1","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things- architecture enabling technologies, security and privacy, and applications,. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"key":"5507_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"8","author":"FA Alabaa","year":"2017","unstructured":"Alabaa, F.A., Othmana, M., Hashema, I.A.T., Alotaibib, F.: Internet of things security- a survey. J. Netw. Comput. Appl. 8, 10\u201328 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"5507_CR3","first-page":"263","volume":"20","author":"DK Alferidah","year":"2020","unstructured":"Alferidah, D.K., Jhanjhi, N.: A review on security and privacy issues and challenges in internet of things. Int. J. Comput. Netw. Inf. Secur. 20(4), 263\u2013286 (2020)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"issue":"6","key":"5507_CR4","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/3453930","volume":"64","author":"M Russinovich","year":"2021","unstructured":"Russinovich, M., Costa, M., Fournet, C., Chisnall, D., Delignat-Lavaud, A., Clebsch, S., Vaswani, K., Bhatia, V.: Toward confidential cloud computing. Commun. ACM 64(6), 54\u201361 (2021)","journal-title":"Commun. ACM"},{"key":"5507_CR5","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. Annual ACM Symposium on Theory of Computing, 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"5507_CR6","doi-asserted-by":"crossref","unstructured":"Graepel, T., Lauter, K., Naehrig, M.: ML Confidential-Machine Learning on Encrypted Data, International Conference on Information Security and Cryptology, pp. 1\u201321, Springer (2012)","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"5507_CR7","doi-asserted-by":"publisher","first-page":"48970","DOI":"10.1109\/ACCESS.2020.2978082","volume":"8","author":"X Lu","year":"2020","unstructured":"Lu, X., Liao, Y., Lio, P., Hui, P.: Privacy-preserving asynchronous federated learning mechanism for edge network computing. IEEE Access J 8, 48970\u201348981 (2020)","journal-title":"IEEE Access J"},{"issue":"3","key":"5507_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Process. Mag."},{"issue":"4","key":"5507_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"5507_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1080\/09720529.2002.10697946","volume":"5","author":"MS Hwang","year":"2002","unstructured":"Hwang, M.S., Yang, C., Tzeng, S.F.: Improved Digital Signature Scheme Based on Factoring and Discrete Logarithms. J. Discrete Math. Sci. Cryptography 5(2), 151\u2013155 (2002)","journal-title":"J. Discrete Math. Sci. Cryptography"},{"key":"5507_CR11","doi-asserted-by":"crossref","unstructured":"Dun-Yi, Y.: Data Encryption Method of SSL Digital Authentication Signature System Based on Privacy Protection. Proc. of $$12^{th}$$ International Conference on Measuring Technology and Mechatronics Automation, pp. 40\u201344 (2020)","DOI":"10.1109\/ICMTMA50254.2020.00016"},{"key":"5507_CR12","doi-asserted-by":"crossref","unstructured":"Ji, B., Wang, S.: Application of Signature Technology Based on RSA Algorithm in E-Commerce Security. Proc. of $$4^{th}$$ International Conference on Emerging Research in Electronics, Computer Science and Technology, pp. 1\u20135 (2022)","DOI":"10.1109\/ICERECT56837.2022.10060107"},{"key":"5507_CR13","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TCC.2015.2498921","volume":"6","author":"G Chen","year":"2018","unstructured":"Chen, G., Guo, S.: RASP-Boost: Confidential Boosting-Model Learning with Perturbed Data in the Cloud. IEEE Trans. Cloud Comput. 6, 584\u2013597 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5507_CR14","doi-asserted-by":"publisher","first-page":"706","DOI":"10.3390\/ai4030037","volume":"4","author":"M Kolhar","year":"2023","unstructured":"Kolhar, M., Aldossary, S.M.: Privacy-Preserving Convolutional Bi-LSTM Network for Robust Analysis of Encrypted Time-Series Medical Images. J. AI 4, 706\u2013720 (2023)","journal-title":"J. AI"},{"key":"5507_CR15","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: A System for Scalable Privacy-Preserving Machine Learning. IEEE Symposium on Security and Privacy, 19\u201338 (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"5507_CR16","doi-asserted-by":"crossref","unstructured":"Mo, Fan, Shamsabadi, Ali Shahin, Katevas, Kleomenis, Cavallaro, Andrea, Haddadi, Hamed: Towards Characterizing and Limiting Information Exposure in DNN Layers. Proc. of ACM SIGSAC Conference on Computer and Communications Security, pp. 2653\u20132655 (2019)","DOI":"10.1145\/3319535.3363279"},{"key":"5507_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13677-023-00394-x","volume":"12","author":"X Yu","year":"2023","unstructured":"Yu, X., Tang, D., Zhao, W.: Privacy-Preserving Cloud-Edge Collaborative Learning Without Trusted Third-Party Coordinator. J. Cloud Comput. 12, 19 (2023)","journal-title":"J. Cloud Comput."},{"key":"5507_CR18","first-page":"5094830","volume":"1","author":"X Yu","year":"2022","unstructured":"Yu, X., Zhao, W., Tang, D., Liang, K.: Privacy-Preserving Vertical Collaborative Logistic Regression without Trusted Third-Party Coordinator. Secur. Commun. Netw. 1, 5094830 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"5507_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Bai, G., Li, X., Curtis, C., Chen, C., Ko, R.K.L.: PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. European Symposium on Research in Computer Security, 399\u2013418 (2020)","DOI":"10.1007\/978-3-030-58951-6_20"},{"issue":"11","key":"5507_CR20","doi-asserted-by":"publisher","first-page":"3003","DOI":"10.1109\/TIFS.2019.2911169","volume":"14","author":"LT Phong","year":"2019","unstructured":"Phong, L.T., Phuong, T.T.: Privacy-Preserving Deep Learning via Weight Transmission. IEEE Trans. Inf. Forensics Secur. 14(11), 3003\u20133015 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5507_CR21","doi-asserted-by":"crossref","unstructured":"Farjana, N., Roy, S., Mahi, M.J.N., Whaiduzzaman, M.: An Identity-Based Encryption Scheme for Data Security In Fog Computing. Proc. of International Joint Conference on Computational Intelligence, pp. 215-226, Springer (2020)","DOI":"10.1007\/978-981-13-7564-4_19"},{"key":"5507_CR22","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1007\/s11227-023-05517-4","volume":"80","author":"Chen Zhonghua","year":"2024","unstructured":"Zhonghua, Chen, Goyal, S.B., Rajawat, Anand Singh: Smart Contracts Attribute-Based Access Control Model for Security & Privacy of IoT System Using Blockchain and Edge Computing. J. Supercomput. 80, 1396\u20131425 (2024)","journal-title":"J. Supercomput."},{"key":"5507_CR23","doi-asserted-by":"publisher","first-page":"41975","DOI":"10.1109\/ACCESS.2020.2977048","volume":"8","author":"K Zhao","year":"2020","unstructured":"Zhao, K., Sun, D., Ren, G., Zhang, Y.: Public Auditing Scheme with Identity Privacy Preserving Based on Certificateless Ring Signature for Wireless Body Area Networks. IEEE Access J. 8, 41975\u201341984 (2020)","journal-title":"IEEE Access J."},{"key":"5507_CR24","doi-asserted-by":"crossref","unstructured":"Yang, Qiang, Li, Daofeng: Provably Secure Lattice-Based Self-Certified Signature Scheme. Security and Communication Networks Journal, 1\u20139 (2021)","DOI":"10.1155\/2021\/2459628"},{"key":"5507_CR25","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1109\/LCOMM.2020.3042648","volume":"25","author":"Z Xu","year":"2020","unstructured":"Xu, Z., Luo, M., Khan, M.K., Choo, K.K.R., He, D.: Analysis And Improvement of A Certificateless Signature Scheme for Resource-Constrained Scenarios. IEEE Commun. Lett. 25, 1074\u20131078 (2020)","journal-title":"IEEE Commun. Lett."},{"key":"5507_CR26","volume":"63","author":"Chandrakant P Navdeti","year":"2021","unstructured":"Navdeti, Chandrakant P., Banerjee, Indrajit, Giri, Chandan: Privacy Preservation and Secure Data Sharing Scheme in Fog Based Vehicular Ad-hoc Network. J. Inf. Secur. Appl. 63, 103014 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"5507_CR27","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1016\/j.jksuci.2019.12.008","volume":"34","author":"G Kalyani","year":"2022","unstructured":"Kalyani, G., Chaudhari, Shilpa: Data Privacy Preservation in MAC Aware Internet of Things With Optimized Key Generation. J. King Saud Univ. Comp. Info. 34, 2062\u20132071 (2022)","journal-title":"J. King Saud Univ. Comp. Info."},{"key":"5507_CR28","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.jpdc.2022.01.005","volume":"163","author":"Saleh Muhammad Rubai","year":"2022","unstructured":"Rubai, Saleh Muhammad: Hybrid Heuristic-Based Key Generation Protocol for Intelligent Privacy Preservation in Cloud Sector. J. Parallel Distributed Comput. 163, 166\u2013180 (2022)","journal-title":"J. Parallel Distributed Comput."},{"key":"5507_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104673","volume":"94","author":"M Kamal","year":"2022","unstructured":"Kamal, M., Amin, S., Ferooz, F., Awan, M.J., Mohammed, M.A., Al-Boridi, O., Abdulkareem, K.H.: Privacy-Aware Genetic Algorithm-Based Data Security Framework for Distributed Cloud Storage. J. Microprocess. Microsyst. 94, 104673 (2022)","journal-title":"J. Microprocess. Microsyst."},{"key":"5507_CR30","doi-asserted-by":"publisher","first-page":"31630","DOI":"10.1109\/ACCESS.2018.2844406","volume":"6","author":"MA Mughal","year":"2018","unstructured":"Mughal, M.A., Luo, X., Ullah, A., Ullah, S., Mahmood, Z.: A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things. IEEE Access J. 6, 31630\u201331643 (2018)","journal-title":"IEEE Access J."},{"issue":"2","key":"5507_CR31","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s00145-022-09425-3","volume":"35","author":"I Damg\u00e5rd","year":"2022","unstructured":"Damg\u00e5rd, I., Orlandi, C., Takahashi, A., Tibouchi, M.: Two-Round N-Out-of-N and Multi-Signatures and Trapdoor Commitment from Lattices. J. Cryptol. 35(2), 14 (2022)","journal-title":"J. Cryptol."},{"key":"5507_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110107","volume":"238","author":"Muhammad Kashif","year":"2024","unstructured":"Kashif, Muhammad, Kalkan, Kubra: EPIoT: Enhanced Privacy Preservation based Blockchain Mechanism for Internet of Things. Comput. Netw. J. 238, 110107 (2024)","journal-title":"Comput. Netw. J."},{"issue":"4","key":"5507_CR33","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10723-023-09699-2","volume":"21","author":"C Awasthi","year":"2023","unstructured":"Awasthi, C., Mishra, P.K., Pal, P.K., Khan, S.B., Agarwal, A.K., Gadekallu, T.R., Malibari, A.A.: Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices. J. Grid Comput. 21(4), 69 (2023)","journal-title":"J. Grid Comput."},{"issue":"1","key":"5507_CR34","first-page":"1900","volume":"11","author":"Y Chang","year":"2023","unstructured":"Chang, Y., Li, J., Lu, N., Shi, W., Su, Z., Meng, W.: Practical Privacy-Preserving Scheme with Fault Tolerance for Smart Grids. IEEE Internet Things J. 11(1), 1900\u20132005 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5507_CR35","doi-asserted-by":"crossref","unstructured":"Pradeep, S., Muthurajkumar, S., Ganapathy, S., Kannan, A.: Symmetric Key and Polynomial-Based Key Generation Mechanism for Secured Data Communications in 5G Networks. Soft Computing Journal, 1\u201316 (2024)","DOI":"10.1007\/s00500-023-09601-y"},{"key":"5507_CR36","doi-asserted-by":"publisher","first-page":"110490","DOI":"10.1109\/ACCESS.2023.3322196","volume":"11","author":"K Chait","year":"2023","unstructured":"Chait, K., Laouid, A., Kara, M., Hammoudeh, M., Aldabbas, O., Al-Essa, A.T.: An Enhanced RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size. IEEE Access J. 11, 110490\u2013110501 (2023)","journal-title":"IEEE Access J."},{"key":"5507_CR37","doi-asserted-by":"publisher","first-page":"82989","DOI":"10.1109\/ACCESS.2023.3296781","volume":"11","author":"C Wang","year":"2023","unstructured":"Wang, C., Lu, J., Li, X., Cao, P., Zhou, Z., Wen, Q.: A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-dimensional Attribute Domains. IEEE Access J. 11, 82989\u201383003 (2023)","journal-title":"IEEE Access J."},{"key":"5507_CR38","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.future.2023.04.017","volume":"147","author":"S Kanchan","year":"2023","unstructured":"Kanchan, S., Jang, J.W., Yoon, J.Y., Choi, B.J.: Efficient and Privacy-Preserving Group Signature for Federated Learning. Future Gener. Comput. Syst. 147, 93\u2013106 (2023)","journal-title":"Future Gener. Comput. Syst."},{"key":"5507_CR39","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.aej.2023.11.036","volume":"85","author":"Shimaa A Abdel Hakeem","year":"2023","unstructured":"Hakeem, Shimaa A Abdel., Kim, HyungWon: Evaluation and Analysis of A Secure Voting-Based Aggregated Signatures Authentication and Revocation Protocol for 5 G-V2X Communication. Alexandria Eng. J. 85, 160\u2013176 (2023)","journal-title":"Alexandria Eng. J."},{"key":"5507_CR40","unstructured":"Kara, M., Laouid, A., Bounceur, A., Hammoudeh, M., AlShaikh, M.: Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption using OTP with A Single Pre-shared Key. Journal of Information Science & Engineering 39(1) (2023)"},{"key":"5507_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109765","volume":"120","author":"HJ Nath","year":"2024","unstructured":"Nath, H.J., Choudhury, H.: LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET. Comput. Electr. Eng. 120, 109765 (2024)","journal-title":"Comput. Electr. Eng."},{"key":"5507_CR42","doi-asserted-by":"publisher","first-page":"19117","DOI":"10.1109\/ACCESS.2022.3150839","volume":"10","author":"C Wei","year":"2022","unstructured":"Wei, C., Wu, T., Liu, X., Xiong, S.: The latticed-based path privacy protection aggregation scheme for internet of vehicles. IEEE Access J. 10, 19117\u201319123 (2022)","journal-title":"IEEE Access J."},{"key":"5507_CR43","doi-asserted-by":"publisher","first-page":"9851","DOI":"10.1109\/ACCESS.2023.3240304","volume":"11","author":"X Tao","year":"2023","unstructured":"Tao, X., Qiang, Y., Wang, P., Wang, Y.: LMIBE: Lattice-based matchmaking identity-based encryption for internet of things. IEEE Access J. 11, 9851\u20139858 (2023)","journal-title":"IEEE Access J."},{"key":"5507_CR44","doi-asserted-by":"publisher","first-page":"114322","DOI":"10.1109\/ACCESS.2023.3324740","volume":"11","author":"T Haritha","year":"2023","unstructured":"Haritha, T., Anitha, A.: Multi-level security in healthcare by integrating lattice-based access control and blockchain-based smart contracts system. IEEE Access J. 11, 114322\u2013114340 (2023)","journal-title":"IEEE Access J."},{"issue":"12","key":"5507_CR45","doi-asserted-by":"publisher","first-page":"65","DOI":"10.31449\/inf.v48i12.6047","volume":"48","author":"MH Al-Zubaidie","year":"2024","unstructured":"Al-Zubaidie, M.H., Razzaq, R.H.: Maintaining security of patient data by employing private blockchain and fog computing technologies based on internet of medical things. Informatica 48(12), 65\u201380 (2024)","journal-title":"Informatica"},{"issue":"3","key":"5507_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.58496\/MJCS\/2024\/012","volume":"4","author":"DH Tahayur","year":"2024","unstructured":"Tahayur, D.H., Al-Zubaidie, M.: Enhancing electronic agriculture data security with a blockchain-based search method and e-signatures. Mesopotamian J. CyberSecur. 4(3), 1\u201321 (2024)","journal-title":"Mesopotamian J. CyberSecur."},{"key":"5507_CR47","doi-asserted-by":"crossref","unstructured":"Micciancio, Daniele, Regev, Oded: Lattice-based Cryptography. Journal of Post-quantum Cryptography, pp. 147\u2013191, Springer (2009)","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"5507_CR48","unstructured":"Balbas, D.: The Hardness of LWE and Ring-LWE: A Survey. Journal of Cryptololgy, https:\/\/eprint.iacr.org\/2021\/1358.pdf (accessed on 8 October 2021)"},{"key":"5507_CR49","doi-asserted-by":"publisher","first-page":"85108","DOI":"10.1109\/ACCESS.2023.3302691","volume":"11","author":"Po-Wen Chi","year":"2023","unstructured":"Chi, Po-Wen., Yun-Hsiu, Lu., Guan, Albert: A privacy-preserving zero-knowledge proof for blockchain. IEEE Access J. 11, 85108\u201385117 (2023)","journal-title":"IEEE Access J."},{"key":"5507_CR50","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of Key-exchange Protocols and Their Use for Building Secure Channels, Proc. of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp. 453\u2013474, Springer, (2001)","DOI":"10.1007\/3-540-44987-6_28"},{"key":"5507_CR51","doi-asserted-by":"crossref","unstructured":"Random Oracle Model. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, https:\/\/doi.org\/10.1007\/978-1-4419-5906-5$$_220$$","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"5507_CR52","doi-asserted-by":"crossref","unstructured":"Aciobanitei, I., Guinea, R. I., Pura, M. L.: AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols, Proc. of $$15^{th}$$ Int. Joint Conf. on e-Business and Telecomm (ICETE), 2, pp. 520\u2013525, (2018)","DOI":"10.5220\/0006887905200525"},{"issue":"8","key":"5507_CR53","doi-asserted-by":"publisher","first-page":"5172","DOI":"10.3390\/app13085172","volume":"13","author":"F Lalem","year":"2023","unstructured":"Lalem, F., Laouid, A., Kara, M., Al-Khalidi, M., Eleyan, A.: A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques. J. Appl. Sci. 13(8), 5172 (2023)","journal-title":"J. Appl. Sci."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05507-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05507-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05507-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T15:35:42Z","timestamp":1761924942000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05507-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"references-count":53,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5507"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05507-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,15]]},"assertion":[{"value":"20 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author Vinayak Telsang declares that he has no Conflict of interest. Author Mahabaleshwar S. Kakkasageri declares that he has no Conflict of interest. Author Anil D. Devangavi declares that he has no Conflict of interest. Author Rajani S. Pujar declares that she has no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We consent for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"753"}}