{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T19:38:27Z","timestamp":1770925107267,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05982-5","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:57:44Z","timestamp":1770922664000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Impact factor-based improved association rule mining-based privacy preservation model for IoT with hybrid optimal key generation"],"prefix":"10.1007","volume":"29","author":[{"given":"Ravindra Sadashivrao","family":"Apare","sequence":"first","affiliation":[]},{"given":"Manoj Limchand","family":"Bangare","sequence":"additional","affiliation":[]},{"given":"Nitin Sudam","family":"More","sequence":"additional","affiliation":[]},{"given":"Pushpa Manoj","family":"Bangare","sequence":"additional","affiliation":[]},{"given":"Ratnaprabha Ravindra","family":"Borhade","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"5982_CR1","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.iotcps.2023.04.001","volume":"3","author":"JPA Yaacoub","year":"2023","unstructured":"Yaacoub, J.P.A., Noura, H.N., Salman, O.: Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions. Internet of Things and Cyber-Physical Systems 3, 155\u2013179 (2023)","journal-title":"Internet of Things and Cyber-Physical Systems"},{"key":"5982_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpbup.2022.100071","volume":"2","author":"I Sadek","year":"2022","unstructured":"Sadek, I., Codjo, J., Rehman, S.U., Abdulrazak, B.: Security and privacy in the Internet of Things healthcare systems: Toward a robust solution in real-life deployment. Computer Methods and Programs in Biomedicine Update 2, 100071 (2022)","journal-title":"Computer Methods and Programs in Biomedicine Update"},{"key":"5982_CR3","first-page":"7542","volume":"7","author":"ML Bangare","year":"2021","unstructured":"Bangare, M.L., Bangare, P.M., Apare, R.S., Bangare, S.L.: fog computing based security of IoT application. Design Engineering 7, 7542\u20137549 (2021)","journal-title":"Design Engineering"},{"key":"5982_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e19380","author":"Q Zhang","year":"2023","unstructured":"Zhang, Q.: Artistic expression and data protection: Balancing aesthetics with data privacy in IoT. Heliyon (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e19380","journal-title":"Heliyon"},{"issue":"9","key":"5982_CR5","first-page":"6808","volume":"34","author":"J Kaur","year":"2022","unstructured":"Kaur, J., Agrawal, A., Khan, R.A.: Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario. Journal of King Saud University 34(9), 6808\u20136817 (2022)","journal-title":"Journal of King Saud University"},{"key":"5982_CR6","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.future.2021.10.024","volume":"128","author":"K Sarwar","year":"2022","unstructured":"Sarwar, K., Yongchareon, S., Yu, J., ur Rehman, S.: Efficient privacy-preserving data replication in fog-enabled IoT. Future Generation Computer Systems 128, 538\u2013551 (2022)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"5982_CR7","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.dcan.2022.12.013","volume":"10","author":"M Abdel-Basset","year":"2024","unstructured":"Abdel-Basset, M., Hawash, H., Moustafa, N., Razzak, I., Abd Elfattah, M.: Privacy-preserved learning from non-iid data in fog-assisted iot: A federated learning approach. Digit. Commun. Networks. 10(2), 404\u2013415 (2024)","journal-title":"Digit. Commun. Networks"},{"key":"5982_CR8","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.future.2023.03.045","volume":"145","author":"C Pathmabandu","year":"2023","unstructured":"Pathmabandu, C., Grundy, J., Chhetri, M.B., Baig, Z.: Privacy for iot: Informed consent management in smart buildings. Future Generation Comput. Syst. 145, 367\u2013383 (2023)","journal-title":"Future Generation Comput. Syst."},{"key":"5982_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103311","volume":"75","author":"M Adil","year":"2021","unstructured":"Adil, M., Khan, M.K.: Emerging iot applications in sustainable smart cities for covid-19: Network security and data preservation challenges with future directions. Sustainable Cities and Society 75, 103311 (2021)","journal-title":"Sustainable Cities and Society"},{"key":"5982_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100027","volume":"2","author":"S Ahmad","year":"2024","unstructured":"Ahmad, S., Mehfuz, S.: Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Security and Applications 2, 100027 (2024)","journal-title":"Cyber Security and Applications"},{"key":"5982_CR11","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Mehfuz, S., Beg, J.: Service centric attribute-based block level two step encryption scheme for improved cloud security. In AIP conference proceedings (Vol. 2816, No. 1, p. 150003). AIP Publishing LLC. (2024), March","DOI":"10.1063\/5.0177484"},{"issue":"5","key":"5982_CR12","first-page":"2062","volume":"34","author":"G Kalyani","year":"2022","unstructured":"Kalyani, G., Chaudhari, S.: Data privacy preservation in MAC aware Internet of things with optimized key generation. Journal of King Saud University 34(5), 2062\u20132071 (2022)","journal-title":"Journal of King Saud University"},{"issue":"6","key":"5982_CR13","first-page":"2343","volume":"34","author":"D Ahamad","year":"2022","unstructured":"Ahamad, D., Hameed, S.A., Akhtar, M.: A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University 34(6), 2343\u20132358 (2022)","journal-title":"Journal of King Saud University"},{"key":"5982_CR14","doi-asserted-by":"publisher","first-page":"155779","DOI":"10.1109\/ACCESS.2019.2937177","volume":"7","author":"M Gheisari","year":"2019","unstructured":"Gheisari, M., Pham, Q.V., Alazab, M., Zhang, X., Fern\u00e1ndez-Campusano, C., Srivastava, G.: ECA: An edge computing architecture for privacy-preserving in IoT-based smart city. IEEE Access 7, 155779\u2013155786 (2019)","journal-title":"IEEE Access"},{"key":"5982_CR15","unstructured":"Apare, R.S., Bangare, M.L., Bangare, P.M.: Blockchain based privacy preservation in modern iot devices. Des. Eng., 7567\u20137575. (2021)"},{"key":"5982_CR16","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.4018\/978-1-7998-8954-0.ch063","volume-title":"Research Anthology on Privatizing and Securing Data","author":"RS Apare","year":"2021","unstructured":"Apare, R.S., Gujar, S.N.: Analysis of privacy preservation techniques in IoT. In: Research Anthology on Privatizing and Securing Data, pp. 1343\u20131351. IGI Global (2021)"},{"key":"5982_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2022.100003","volume":"1","author":"H Tan","year":"2023","unstructured":"Tan, H.: An efficient IoT group association and data sharing mechanism in edge computing paradigm. Cyber Security and Applications 1, 100003 (2023)","journal-title":"Cyber Security and Applications"},{"key":"5982_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100831","volume":"23","author":"A Telikani","year":"2023","unstructured":"Telikani, A., Shahbahrami, A., Shen, J., Gaydadjiev, G., Lin, J.C.W.: An edge-aided parallel evolutionary privacy-preserving algorithm for Internet of Things. Internet of Things 23, 100831 (2023)","journal-title":"Internet of Things"},{"issue":"6","key":"5982_CR19","doi-asserted-by":"publisher","first-page":"10441","DOI":"10.1109\/JIOT.2019.2939286","volume":"6","author":"MN Aman","year":"2019","unstructured":"Aman, M.N., Basheer, M.H., Sikdar, B.: Data provenance for IoT with light weight authentication and privacy preservation. IEEE Internet of Things Journal 6(6), 10441\u201310457 (2019)","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"5982_CR20","doi-asserted-by":"publisher","first-page":"331","DOI":"10.3233\/JHS-190619","volume":"25","author":"RS Apare","year":"2019","unstructured":"Apare, R.S., Gujar, S.N.: Implementing adaptive dragonfly optimization for privacy preservation in IoT. Journal of High Speed Networks 25(4), 331\u2013348 (2019)","journal-title":"Journal of High Speed Networks"},{"key":"5982_CR21","doi-asserted-by":"crossref","unstructured":"Apare, R.S., Gujar, S.N.: Research issues in privacy preservation in IoT. In 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) (pp. 87\u201390). IEEE. (2018)","DOI":"10.1109\/GCWCN.2018.8668616"},{"key":"5982_CR22","doi-asserted-by":"publisher","first-page":"100210","DOI":"10.1016\/j.array.2022.100210","volume":"15","author":"VO Nyangaresi","year":"2022","unstructured":"Nyangaresi, V.O.: Terminal independent security token derivation scheme for ultra-dense IoT networks. Array. 15, 100210 (2022)","journal-title":"Array"},{"issue":"9","key":"5982_CR23","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/fi14090246","volume":"14","author":"T Alam","year":"2022","unstructured":"Alam, T., Gupta, R.: Federated learning and its role in the privacy preservation of IoT devices. Future Internet. 14(9), 246 (2022)","journal-title":"Future Internet"},{"key":"5982_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.01.028","volume":"123","author":"M Gheisari","year":"2021","unstructured":"Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Generation Computer Systems 123, 1\u201313 (2021)","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"5982_CR25","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326\u20132341 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"5982_CR26","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TII.2021.3070544","volume":"18","author":"Y Sun","year":"2021","unstructured":"Sun, Y., Liu, J., Yu, K., Alazab, M., Lin, K.: PMRSS: Privacy-preserving medical record searching scheme for intelligent diagnosis in IoT healthcare. IEEE Transactions on Industrial Informatics 18(3), 1981\u20131990 (2021)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5982_CR27","doi-asserted-by":"publisher","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak, B.D., Al-Turjman, F., Aloqaily, M., Alfandi, O.: An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 7, 135632\u2013135649 (2019)","journal-title":"IEEE Access"},{"issue":"12","key":"5982_CR28","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/TITS.2018.2885054","volume":"20","author":"AR Sfar","year":"2019","unstructured":"Sfar, A.R., Challal, Y., Moyal, P., Natalizio, E.: A game theoretic approach for privacy preserving model in IoT-based transportation. IEEE Transactions on Intelligent Transportation Systems 20(12), 4405\u20134414 (2019)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"5","key":"5982_CR29","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MNET.001.1800503","volume":"33","author":"M Shen","year":"2019","unstructured":"Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-preserving image retrieval for medical IoT systems: A blockchain-based approach. Ieee Network 33(5), 27\u201333 (2019)","journal-title":"Ieee Network"},{"issue":"4","key":"5982_CR30","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.dcan.2022.05.004","volume":"9","author":"Y Shen","year":"2023","unstructured":"Shen, Y., Shen, S., Li, Q., Zhou, H., Wu, Z., Qu, Y.: Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes. Digit. Commun. Networks. 9(4), 906\u2013919 (2023)","journal-title":"Digit. Commun. Networks"},{"issue":"11","key":"5982_CR31","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6844","volume":"34","author":"K Solomon Doss","year":"2022","unstructured":"Solomon Doss, K., Kamalakkannan, S.: Hybrid optimization-based privacy preservation of database publishing in cloud environment. Concurrency and Computation: Practice and Experience 34(11), e6844 (2022)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"2","key":"5982_CR32","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s12065-019-00309-3","volume":"15","author":"GK Shailaja","year":"2022","unstructured":"Shailaja, G.K., Rao, C.G.: Robust and lossless data privacy preservation: optimal key based data sanitization. Evolutionary Intelligence 15(2), 1123\u20131134 (2022)","journal-title":"Evolutionary Intelligence"},{"issue":"1","key":"5982_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11036-023-02115-9","volume":"29","author":"J Escorcia-Gutierrez","year":"2024","unstructured":"Escorcia-Gutierrez, J., Mansour, R.F., Leal, E., Villanueva, J., Jimenez-Cabas, J., Soto, C., Soto-D\u00edaz, R.: Privacy preserving blockchain with energy aware clustering scheme for IoT healthcare systems. Mobile Networks and Applications 29(1), 1\u201312 (2024)","journal-title":"Mobile Networks and Applications"},{"key":"5982_CR34","doi-asserted-by":"publisher","first-page":"51","DOI":"10.26636\/jtit.2023.166922","volume":"1","author":"R Patil","year":"2023","unstructured":"Patil, R., HimaBindu, G.: Improved Association Rule Mining-Based Data Sanitization for Privacy Preservation Model in Cloud. Journal of Telecommunications and Information Technology 1, 51\u201359 (2023)","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"5982_CR35","first-page":"2653","volume":"45","author":"S Nithya","year":"2021","unstructured":"Nithya, S., Sangeetha, M., Prethi, K.A., Vellingiri, S.: Impact factor based data sanitization in association rule mining. Materials Today: Proceedings 45, 2653\u20132659 (2021)","journal-title":"Materials Today: Proceedings"},{"key":"5982_CR36","doi-asserted-by":"crossref","unstructured":"Yulanda, R.D., Wahyuningsih, S., Amijaya, F.D.T.: Association rules with apriori algorithm and hash-based algorithm. In Journal of Physics: Conference Series (Vol. 1277, No. 1, p. 012048). IOP Publishing. (2019), July","DOI":"10.1088\/1742-6596\/1277\/1\/012048"},{"issue":"1","key":"5982_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/924652","volume":"2014","author":"H Lu","year":"2014","unstructured":"Lu, H., Wang, X., Fei, Z., Qiu, M.: The effects of using chaotic map on improving the performance of multiobjective evolutionary algorithms. Mathematical Problems in Engineering 2014(1), 924652 (2014)","journal-title":"Mathematical Problems in Engineering"},{"issue":"21","key":"5982_CR38","doi-asserted-by":"publisher","first-page":"11736","DOI":"10.3390\/su132111736","volume":"13","author":"A Alam","year":"2021","unstructured":"Alam, A., Verma, P., Tariq, M., Sarwar, A., Alamri, B., Zahra, N., Urooj, S.: Jellyfish search optimization algorithm for Mpp tracking of pv system. Sustainability. 13(21), 11736 (2021)","journal-title":"Sustainability"},{"issue":"3","key":"5982_CR39","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3390\/s22030855","volume":"22","author":"P Trojovsk\u00fd","year":"2022","unstructured":"Trojovsk\u00fd, P., Dehghani, M.: Pelican optimization algorithm: A novel nature-inspired algorithm for engineering applications. Sensors. 22(3), 855 (2022)","journal-title":"Sensors"},{"issue":"1","key":"5982_CR40","volume":"2014","author":"Y Hu","year":"2014","unstructured":"Hu, Y., Zhu, C., Wang, Z.: An improved piecewise linear chaotic map based image encryption algorithm. The Scientific World Journal 2014(1), 275818 (2014)","journal-title":"The Scientific World Journal"},{"key":"5982_CR41","unstructured":"https:\/\/archive.ics.uci.edu\/dataset\/45\/heart+disease"},{"key":"5982_CR42","unstructured":"https:\/\/www.kaggle.com\/datasets\/pushpakjaiswal26\/enhanced-large-health-dataset?select=enhanced_large_health_dataset.csv"},{"key":"5982_CR43","unstructured":"Ravindra, S., Apare: Privacy Preservation in IoT: Deep Learning Tuned Key Generation Assisted Data Sanitization and Restoration Process, Accepted in International Journal of Modeling, Simulation, and Scientific Computing"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05982-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05982-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05982-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:57:48Z","timestamp":1770922668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05982-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5982"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05982-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"26 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"147"}}