{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:27:01Z","timestamp":1772119621782,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09510-8","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T06:09:01Z","timestamp":1743487741000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["OSI network layers based secured data sharins in cloud computing using STXORSK-QC and dhdecct-MAC"],"prefix":"10.1007","volume":"28","author":[{"given":"Chandra Shekhar","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"9510_CR1","doi-asserted-by":"publisher","first-page":"99393","DOI":"10.1109\/ACCESS.2020.2997351","volume":"8","author":"C Yang","year":"2020","unstructured":"Yang C, Liu Y, Tao X, Zhao F. Publicly verifiable and efficient fine-grained data deletion scheme in cloud computing. IEEE Access. 2020;8:99393\u2013403. https:\/\/doi.org\/10.1109\/ACCESS.2020.2997351.","journal-title":"IEEE Access"},{"key":"9510_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.101889","volume":"96","author":"C Fang","year":"2020","unstructured":"Fang C, Guo Y, Wang N, Ju A. Highly efficient federated learning with strong privacy preservation in cloud computing. Comput Secur. 2020;96:1\u201322. https:\/\/doi.org\/10.1016\/j.cose.2020.101889.","journal-title":"Comput Secur"},{"key":"9510_CR3","doi-asserted-by":"publisher","unstructured":"Mayukha S, Vadivel R. Various possible attacks and mitigations of the OSI model layers through pentesting\u2014an overview. In: New frontiers in communication and intelligent systems; 2023. p. 799\u2013809. https:\/\/doi.org\/10.52458\/978-81-95502-00-4-78.","DOI":"10.52458\/978-81-95502-00-4-78"},{"key":"9510_CR4","doi-asserted-by":"publisher","unstructured":"Mahmood S, Mohsin SM, Akber SMA. Network security issues of data link layer: an overview. In: 2020 3rd international conference on computing, mathematics and engineering technologies: idea to innovation for building the knowledge economy; 2020. p. 1\u20137. https:\/\/doi.org\/10.1109\/iCoMET48670.2020.9073825.","DOI":"10.1109\/iCoMET48670.2020.9073825"},{"key":"9510_CR5","doi-asserted-by":"publisher","unstructured":"Sundaram BB, Rajkumar P, Ananthi M, Sravan Kumar D, Vijaykumar J, Karthika P. Network security analysis for signal strength based packet filitering. In: Proceedings of the 3rd international conference on intelligent sustainable systems; 2020. p 1352\u20135. https:\/\/doi.org\/10.1109\/ICISS49785.2020.9315943.","DOI":"10.1109\/ICISS49785.2020.9315943"},{"key":"9510_CR6","doi-asserted-by":"publisher","first-page":"151465","DOI":"10.1109\/ACCESS.2020.3016760","volume":"8","author":"H Yu","year":"2020","unstructured":"Yu H, Lu X, Pan Z. An authorized public auditing scheme for dynamic big data storage in cloud computing. IEEE Access. 2020;8:151465\u201373. https:\/\/doi.org\/10.1109\/ACCESS.2020.3016760.","journal-title":"IEEE Access"},{"issue":"4","key":"9510_CR7","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1109\/TCC.2019.2908163","volume":"9","author":"Q Huang","year":"2021","unstructured":"Huang Q, Yang Y, Yue W, He Y. Secure data group sharing and conditional dissemination with multi-owner in cloud computing. IEEE Trans Cloud Comput. 2021;9(4):1607\u201318. https:\/\/doi.org\/10.1109\/TCC.2019.2908163.","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"9510_CR8","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/TCC.2019.2916856","volume":"9","author":"R Mendes","year":"2021","unstructured":"Mendes R, Oliveira T, Cogo V, Neves N, Bessani A. Charon: a secure cloud-of-clouds system for storing and sharing big data. IEEE Trans Cloud Comput. 2021;9(4):1349\u201361. https:\/\/doi.org\/10.1109\/TCC.2019.2916856.","journal-title":"IEEE Trans Cloud Comput"},{"key":"9510_CR9","doi-asserted-by":"publisher","first-page":"130866","DOI":"10.1109\/ACCESS.2020.3009539","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Wang M, Li T, Liu R, Wang C. Privacy-preserving cloud auditing for multiple users scheme with authorization and traceability. IEEE Access. 2020;8:130866\u201377. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009539.","journal-title":"IEEE Access"},{"issue":"6","key":"9510_CR10","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JSAC.2020.2986619","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen M, Duan J, Zhu L, Zhang J, Du X, Guizani M. Blockchain-based incentives for secure and collaborative data sharing in multiple clouds. IEEE J Sel Areas Commun. 2020;38(6):1229\u201341. https:\/\/doi.org\/10.1109\/JSAC.2020.2986619.","journal-title":"IEEE J Sel Areas Commun"},{"key":"9510_CR11","doi-asserted-by":"publisher","first-page":"99005","DOI":"10.1109\/ACCESS.2023.3312609","volume":"11","author":"G Sucharitha","year":"2023","unstructured":"Sucharitha G, Sitharamulu V, Mohanty SN, Matta A, Jose D. Enhancing secure communication in the cloud through blockchain assisted-CP-DABE. IEEE Access. 2023;11:99005\u201315. https:\/\/doi.org\/10.1109\/ACCESS.2023.3312609.","journal-title":"IEEE Access"},{"issue":"12","key":"9510_CR12","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1109\/TKDE.2019.2922357","volume":"32","author":"M Thangavel","year":"2020","unstructured":"Thangavel M, Varalakshmi P. Enabling ternary hash tree based integrity verification for secure cloud data storage. IEEE Trans Knowl Data Eng. 2020;32(12):2351\u201362. https:\/\/doi.org\/10.1109\/TKDE.2019.2922357.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"9510_CR13","doi-asserted-by":"publisher","first-page":"2198","DOI":"10.1109\/TDSC.2021.3050517","volume":"19","author":"J Shen","year":"2022","unstructured":"Shen J, Yang H, Vijayakumar P, Kumar N. A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secure Comput. 2022;19(4):2198\u2013210. https:\/\/doi.org\/10.1109\/TDSC.2021.3050517.","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"9510_CR14","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1109\/TCC.2020.3024226","volume":"10","author":"J Li","year":"2022","unstructured":"Li J, Ma J, Miao Y, Yang R, Liu X, Choo KKR. Practical multi-keyword ranked search with access control over encrypted cloud data. IEEE Trans Cloud Comput. 2022;10(3):2005\u201319. https:\/\/doi.org\/10.1109\/TCC.2020.3024226.","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"9510_CR15","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/tbdata.2019.2907133","volume":"6","author":"E Zaghloul","year":"2019","unstructured":"Zaghloul E, Zhou K, Ren J. P-MOD: secure privilege-based multilevel organizational data-sharing in cloud computing. IEEE Trans Big Data. 2019;6(4):804\u201315. https:\/\/doi.org\/10.1109\/tbdata.2019.2907133.","journal-title":"IEEE Trans Big Data"},{"issue":"1","key":"9510_CR16","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s12652-021-02893-8","volume":"13","author":"SI Shyla","year":"2022","unstructured":"Shyla SI, Sujatha SS. Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm. J Ambient Intell Humaniz Comput. 2022;13(1):151\u201363. https:\/\/doi.org\/10.1007\/s12652-021-02893-8.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"9510_CR17","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1080\/1206212X.2020.1809177","volume":"44","author":"MA Hossain","year":"2022","unstructured":"Hossain MA, Al Hasan MA. Improving cloud data security through hybrid verification technique based on biometrics and encryption system. Int J Comput Appl. 2022;44(5):455\u201364. https:\/\/doi.org\/10.1080\/1206212X.2020.1809177.","journal-title":"Int J Comput Appl"},{"issue":"6","key":"9510_CR18","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1016\/j.jksuci.2020.05.005","volume":"34","author":"U Narayanan","year":"2022","unstructured":"Narayanan U, Paul V, Joseph S. A novel system architecture for secure authentication and data sharing in cloud enabled big data environment. J King Saud Univ Compute Inform Sci. 2022;34(6):3121\u201335. https:\/\/doi.org\/10.1016\/j.jksuci.2020.05.005.","journal-title":"J King Saud Univ Compute Inform Sci"},{"issue":"2","key":"9510_CR19","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s10586-020-03157-4","volume":"24","author":"M Tahir","year":"2021","unstructured":"Tahir M, Sardaraz M, Mehmood Z, Muhammad S. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Clust Comput. 2021;24(2):739\u201352. https:\/\/doi.org\/10.1007\/s10586-020-03157-4.","journal-title":"Clust Comput"},{"key":"9510_CR20","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.comcom.2019.12.041","volume":"151","author":"S Namasudra","year":"2020","unstructured":"Namasudra S, Devi D, Kadry S, Sundarasekar R, Shanthini A. Towards DNA based data security in the cloud computing environment. Comput Commun. 2020;151:539\u201347. https:\/\/doi.org\/10.1016\/j.comcom.2019.12.041.","journal-title":"Comput Commun"},{"issue":"1","key":"9510_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit F, Alhomdy APS, Al-Ahdal AHA, Jagtap PDS. A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transit Proc. 2021;2(1):91\u20139. https:\/\/doi.org\/10.1016\/j.gltp.2021.01.013.","journal-title":"Global Transit Proc"},{"issue":"4","key":"9510_CR22","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.icte.2021.04.006","volume":"7","author":"T Thilagam","year":"2021","unstructured":"Thilagam T, Aruna R. Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express. 2021;7(4):512\u201320. https:\/\/doi.org\/10.1016\/j.icte.2021.04.006.","journal-title":"ICT Express"},{"key":"9510_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ijin.2021.03.001","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit F, Alhomdy S, Jagtap S. A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. Int J Intell Netw. 2021;2:18\u201333. https:\/\/doi.org\/10.1016\/j.ijin.2021.03.001.","journal-title":"Int J Intell Netw"},{"key":"9510_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.102507","volume":"151","author":"M Rabbani","year":"2020","unstructured":"Rabbani M, Wang YL, Khoshkangini R, Jelodar H, Zhao R, Hu P. A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. J Netw Comput Appl. 2020;151:1\u201337. https:\/\/doi.org\/10.1016\/j.jnca.2019.102507.","journal-title":"J Netw Comput Appl"},{"key":"9510_CR25","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.aej.2023.10.054","volume":"84","author":"D Shivaramakrishna","year":"2023","unstructured":"Shivaramakrishna D, Nagaratna M. A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and time-limited access control. Alex Eng J. 2023;84:275\u201384. https:\/\/doi.org\/10.1016\/j.aej.2023.10.054.","journal-title":"Alex Eng J"},{"issue":"4","key":"9510_CR26","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Singh AK. Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw Lett. 2022;4(4):217\u201321. https:\/\/doi.org\/10.1109\/LNET.2022.3215248.","journal-title":"IEEE Netw Lett"},{"issue":"2","key":"9510_CR27","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2022","unstructured":"Gupta R, Gupta I, Singh AK, Saxena D, Lee CN. An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst J. 2022;17(2):2445\u201354. https:\/\/doi.org\/10.1109\/JSYST.2022.3218894.","journal-title":"IEEE Syst J"},{"issue":"23","key":"9510_CR28","doi-asserted-by":"publisher","first-page":"33127","DOI":"10.1007\/s11042-021-11751-w","volume":"81","author":"AK Singh","year":"2022","unstructured":"Singh AK, Gupta R. A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl. 2022;81(23):33127\u201350. https:\/\/doi.org\/10.1007\/s11042-021-11751-w.","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"9510_CR29","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta R, Singh AK. A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. New Gener Comput. 2022;40(3):737\u201364. https:\/\/doi.org\/10.1007\/s00354-022-00185-z.","journal-title":"New Gener Comput"},{"issue":"21","key":"9510_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8205","volume":"36","author":"S Ahmad","year":"2024","unstructured":"Ahmad S, Arif M, Ahmad J, Nazim M, Mehfuz S. Convergent encryption enabled secure data deduplication algorithm for cloud environment. Concurr Comput Pract Exp. 2024;36(21): e8205. https:\/\/doi.org\/10.1002\/cpe.8205.","journal-title":"Concurr Comput Pract Exp"},{"key":"9510_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100027","volume":"2","author":"S Ahmad","year":"2024","unstructured":"Ahmad S, Mehfuz S. Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Secur Appl. 2024;2: 100027. https:\/\/doi.org\/10.1016\/j.csa.2023.100027.","journal-title":"Cyber Secur Appl"},{"issue":"3","key":"9510_CR32","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1007\/s10586-020-03222-y","volume":"24","author":"S Krishnaveni","year":"2021","unstructured":"Krishnaveni S, Sivamohan S, Sridhar SS, Prabakaran S. Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust Comput. 2021;24(3):1761\u201379. https:\/\/doi.org\/10.1007\/s10586-020-03222-y.","journal-title":"Clust Comput"},{"issue":"4","key":"9510_CR33","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s10586-020-03082-6","volume":"23","author":"AN Jaber","year":"2020","unstructured":"Jaber AN, Rehman SU. FCM\u2013SVM based intrusion detection system for cloud computing environment. Clust Comput. 2020;23(4):3221\u201331. https:\/\/doi.org\/10.1007\/s10586-020-03082-6.","journal-title":"Clust Comput"},{"issue":"3","key":"9510_CR34","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1109\/TCC.2020.3001017","volume":"10","author":"W Wang","year":"2022","unstructured":"Wang W, Du X, Shan D, Qin R, Wang N. Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans Cloud Comput. 2022;10(3):1634\u201346. https:\/\/doi.org\/10.1109\/TCC.2020.3001017.","journal-title":"IEEE Trans Cloud Comput"},{"key":"9510_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.measen.2022.100612","volume":"25","author":"K Samunnisa","year":"2023","unstructured":"Samunnisa K, Kumar GSV, Madhavi K. Intrusion detection system in distributed cloud computing: hybrid clustering and classification methods. Meas Sens. 2023;25:1\u201312. https:\/\/doi.org\/10.1016\/j.measen.2022.100612.","journal-title":"Meas Sens"},{"issue":"3","key":"9510_CR36","doi-asserted-by":"publisher","first-page":"311","DOI":"10.26599\/BDMA.2022.9020038","volume":"6","author":"H Attou","year":"2023","unstructured":"Attou H, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y. Cloud-based intrusion detection approach using machine learning techniques. Big Data Min Anal. 2023;6(3):311\u201320. https:\/\/doi.org\/10.26599\/BDMA.2022.9020038.","journal-title":"Big Data Min Anal"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09510-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09510-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09510-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T06:09:02Z","timestamp":1743487742000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09510-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9510"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09510-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4605990\/v1","asserted-by":"object"}]},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"19 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"23"}}