{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T07:19:04Z","timestamp":1770103144014,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-026-05957-6","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:42:37Z","timestamp":1770057757000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An adaptive cloud security approach for improving privacy with authentication"],"prefix":"10.1007","volume":"29","author":[{"given":"Kavuri K. S. V. A.","family":"Satheesh","sequence":"first","affiliation":[]},{"given":"T. Krishna","family":"Sree","sequence":"additional","affiliation":[]},{"given":"S. Mary","family":"Evanchalin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"key":"5957_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-05074-2","volume":"28","author":"S Vaidya","year":"2025","unstructured":"Vaidya, S., Jethava, G.: Elevating manufacturing excellence with multilevel optimization in smart factory cloud computing using hybrid model. Cluster Comput 28, 342 (2025). https:\/\/doi.org\/10.1007\/s10586-024-05074-2","journal-title":"Cluster Comput"},{"key":"5957_CR2","doi-asserted-by":"publisher","first-page":"32584","DOI":"10.1109\/ACCESS.2025.3541649","volume":"13","author":"KK Prakasha","year":"2025","unstructured":"Prakasha, K.K., Sumalatha, U.: Privacy-preserving techniques in biometric systems: Approaches and challenges. IEEE Access 13, 32584\u201332616 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3541649","journal-title":"IEEE Access"},{"issue":"4","key":"5957_CR3","doi-asserted-by":"publisher","first-page":"3049","DOI":"10.1109\/TPAMI.2025.3529022","volume":"47","author":"P Zhang","year":"2025","unstructured":"Zhang, P., Liu, Y., Lai, S., Li, H., Jin, L.: Privacy-preserving biometric verification with handwritten random digit string. IEEE Trans. Pattern Anal. Mach. Intell. 47(4), 3049\u20133066 (2025). https:\/\/doi.org\/10.1109\/TPAMI.2025.3529022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5957_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103887","volume":"86","author":"J Xiong","year":"2024","unstructured":"Xiong, J., Chen, J., Lin, J., Jiao, D., Liu, H.: Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption. Journal of Information Security and Applications 86, 103887 (2024). https:\/\/doi.org\/10.1016\/j.jisa.2024.103887","journal-title":"Journal of Information Security and Applications"},{"issue":"5","key":"5957_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-02929-8","volume":"5","author":"D Naidu","year":"2024","unstructured":"Naidu, D., Ray, N.K.: Robust Rabin Cryptosystem Biometric Privacy Preserving Authentication Technique for IoT Enabled Devices Over Cloud. SN Computer Science 5(5), 590 (2024). https:\/\/doi.org\/10.1007\/s42979-024-02929-8","journal-title":"SN Computer Science"},{"key":"5957_CR6","doi-asserted-by":"publisher","first-page":"119090","DOI":"10.1109\/ACCESS.2025.3585673","volume":"13","author":"M Hammad","year":"2025","unstructured":"Hammad, M., AlQahtani, A.A.S., ElAffendi, M., Ateya, A.A., Bacanin, N.: Cancelable Multi-Branch Deep Learning Framework for Privacy-Preserving ECG Biometric Authentication. IEEE Access 13, 119090\u2013119109 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3585673","journal-title":"IEEE Access"},{"key":"5957_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-025-20817-y","author":"Y Ali Zouaghi","year":"2025","unstructured":"Ali Zouaghi, Y., Mahamdioua, M., Lahoulou, A., Chettibi, S.: Privacy preserving biometric authentication based on fully homomorphic encryption, blockchain, and IPFS data storage. Multimed. Tools Appl. (2025). https:\/\/doi.org\/10.1007\/s11042-025-20817-y","journal-title":"Multimed. Tools Appl."},{"key":"5957_CR8","doi-asserted-by":"publisher","first-page":"158322","DOI":"10.1109\/ACCESS.2025.3602795","volume":"13","author":"M Imran","year":"2025","unstructured":"Imran, M., Umar, M.S., Malhotra, S.: Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System. IEEE Access 13, 158322\u2013158399 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3602795","journal-title":"IEEE Access"},{"key":"5957_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-025-05361-6","volume":"28","author":"K Namdev","year":"2025","unstructured":"Namdev, K., Rajak, R.: Enhancing fork and join based workflow scheduling model in cloud computing. Cluster Comput 28, 821 (2025). https:\/\/doi.org\/10.1007\/s10586-025-05361-6","journal-title":"Cluster Comput"},{"key":"5957_CR10","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-031-87837-4_18","volume-title":"Industry 5.0: Key Technologies and Drivers","author":"N Sasikaladevi","year":"2025","unstructured":"Sasikaladevi, N., Geetha, K., Aarthi, S.: Privacy-Preserving and Anti-spoofing-Based Robust Remote Authentication Scheme (PAS). In: Industry 5.0: Key Technologies and Drivers, pp. 435\u2013456. Springer Nature Switzerland, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-87837-4_18"},{"issue":"2","key":"5957_CR11","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13645","volume":"42","author":"J Wang","year":"2025","unstructured":"Wang, J., Xin, R., Alfarraj, O., Tolba, A., Tang, Q.: Privacy preserving security using multi-key homomorphic encryption for face recognition. Expert Systems 42(2), e13645 (2025). https:\/\/doi.org\/10.1111\/exsy.13645","journal-title":"Expert Systems"},{"issue":"8","key":"5957_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2025.103463","volume":"16","author":"V Maheshwari","year":"2025","unstructured":"Maheshwari, V., Prasanna, M.: Privacy-preserving Authentication for 5G healthcare with HBZKP: Hierarchical blockchain-based zero knowledge proof for secure edge devices. Ain Shams Engineering Journal 16(8), 103463 (2025). https:\/\/doi.org\/10.1016\/j.asej.2025.103463","journal-title":"Ain Shams Engineering Journal"},{"issue":"1","key":"5957_CR13","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/TETC.2024.3374568","volume":"12","author":"J Han","year":"2024","unstructured":"Han, J., Schaumont, P., Susilo, W.: Guest editorial IEEE transactions on emerging topics in computing special section on advances in emerging Privacy-Preserving computing. IEEE Trans. Emerg. Top. Comput. 12(1), 266\u2013268 (2024). https:\/\/doi.org\/10.1109\/TETC.2024.3374568","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"5957_CR14","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/OJCOMS.2024.3523518","volume":"6","author":"M ul Hassan","year":"2025","unstructured":"ul Hassan, M., Abbas, Y., Iqbal, W., Chehri, A., Iqbal, J.: Prida-me: A privacy-preserving, interoperable and decentralized authentication scheme for metaverse environment. IEEE Open J. Commun. Soc. 6, 493\u2013515 (2025). https:\/\/doi.org\/10.1109\/OJCOMS.2024.3523518","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"23","key":"5957_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/app142310808","volume":"14","author":"A Odeh","year":"2024","unstructured":"Odeh, A., Abdelfattah, E., Salameh, W.: Privacy-preserving data sharing in telehealth services. Applied Sciences 14(23), 10808 (2024). https:\/\/doi.org\/10.3390\/app142310808","journal-title":"Applied Sciences"},{"issue":"3","key":"5957_CR16","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TSC.2024.3382950","volume":"17","author":"BD Deebak","year":"2024","unstructured":"Deebak, B.D., Hwang, S.O.: Privacy preserving based on seamless authentication with provable key verification using mIoMT for B5G-enabled healthcare systems. IEEE Trans. Serv. Comput. 17(3), 1097\u20131113 (2024). https:\/\/doi.org\/10.1109\/TSC.2024.3382950","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5957_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.375","author":"P Dash","year":"2024","unstructured":"Dash, P., Sarma, M., Samanta, D.: Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications. Security and Privacy 7(3), e375 (2024). https:\/\/doi.org\/10.1002\/spy2.375"},{"key":"5957_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3615515","author":"M Mobarak","year":"2025","unstructured":"Mobarak, M., AlTawy, R., Youssef, A.: Privacy-Preserving Authentication for Unlinkable Avatars in the Metaverse. IEEE Transactions on Information Forensics and Security (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3615515","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5957_CR19","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1109\/TIFS.2025.3550051","volume":"20","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., Gu, C., Shi, P., Jing, Z., Li, B., Liu, B.: Bring your device group (BYDG): Efficient and Privacy-Preserving User-Device authentication protocol in Multi-Access edge computing. IEEE Trans. Inf. Forensics Secur. 20, 3346\u20133361 (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3550051","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5957_CR20","doi-asserted-by":"publisher","first-page":"174053","DOI":"10.1109\/ACCESS.2024.3502632","volume":"12","author":"H Kim","year":"2024","unstructured":"Kim, H.: Security Enhancement of biometric-based authentication systems using smart card. IEEE Access 12, 174053\u2013174065 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3502632","journal-title":"IEEE Access"},{"key":"5957_CR21","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/OJCS.2025.3538557","volume":"6","author":"K Sasikumar","year":"2025","unstructured":"Sasikumar, K., Nagarajan, S.: Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques. IEEE Open J. Comput. Soc 6, 392\u2013402 (2025). https:\/\/doi.org\/10.1109\/OJCS.2025.3538557","journal-title":"IEEE Open J. Comput. Soc"},{"key":"5957_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120553","volume":"669","author":"D Wu","year":"2024","unstructured":"Wu, D., Li, L., Tian, W., Xian, H., Tian, C.: Biometric identification on the cloud: A more secure and faster construction. Inf. Sci 669, 120553 (2024). https:\/\/doi.org\/10.1016\/j.ins.2024.120553","journal-title":"Inf. Sci"},{"key":"5957_CR23","doi-asserted-by":"publisher","first-page":"28029","DOI":"10.1109\/ACCESS.2025.3534223","volume":"13","author":"S Vatchala","year":"2025","unstructured":"Vatchala, S., Yogesh, C., Govindarajan, Y., Raja, M.K., Ganesan, V.P.A., Vinod, A.A., Ramesh, D.: Multimodal biometric Authentication: Leveraging shared layer architectures for enhanced security. IEEE Access 13, 28029\u201328041 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3534223","journal-title":"IEEE Access"},{"issue":"1","key":"5957_CR24","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s11276-024-03780-8","volume":"31","author":"RM Jasmine","year":"2025","unstructured":"Jasmine, R.M., Jasper, J., Geetha, M.R.: An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments. Wirel. Netw 31(1), 545\u2013565 (2025). https:\/\/doi.org\/10.1007\/s11276-024-03780-8","journal-title":"Wirel. Netw"},{"key":"5957_CR25","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/s12046-025-02851-6","volume":"50","author":"P Yan","year":"2025","unstructured":"Yan, P., Peng, H., Qi, F.: Enhancing medical cloud security: A multi-level approach with twofish encryption and fingerprint authentication. S\u0101dhan\u0101. 50, 148 (2025). https:\/\/doi.org\/10.1007\/s12046-025-02851-6","journal-title":"S\u0101dhan\u0101"},{"key":"5957_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100027","volume":"2","author":"S Ahmad","year":"2024","unstructured":"Ahmad, S., Mehfuz, S.: Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Security Appl 2, 100027 (2024). https:\/\/doi.org\/10.1016\/j.csa.2023.100027","journal-title":"Cyber Security Appl"},{"issue":"1","key":"5957_CR27","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00442-6","volume":"12","author":"M Suganya","year":"2023","unstructured":"Suganya, M., Sasipraba, T.: Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment. Journal of Cloud Computing 12(1), 74 (2023). https:\/\/doi.org\/10.1186\/s13677-023-00442-6","journal-title":"Journal of Cloud Computing"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05957-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05957-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05957-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:42:38Z","timestamp":1770057758000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05957-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,2]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5957"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05957-6","relation":{"references":[{"id-type":"doi","id":"10.1002\/spy2.375","asserted-by":"subject"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,2]]},"assertion":[{"value":"3 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"126"}}