{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T21:18:29Z","timestamp":1774041509125,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11042-021-11486-8","type":"journal-article","created":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T11:03:37Z","timestamp":1641207817000},"page":"34447-34461","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Natural disasters management using social internet of things"],"prefix":"10.1007","volume":"81","author":[{"given":"Abhilasha","family":"Rangra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0026-2284","authenticated-orcid":false,"given":"Vivek Kumar","family":"Sehgal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"issue":"1","key":"11486_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10630732.2014.942092","volume":"22","author":"V Albino","year":"2015","unstructured":"Albino V, Berardi U, Dangelico RM (2015) Smart cities: Definitions, dimensions, performance, and initiatives. J Urban Technol 22(1):3\u201321. https:\/\/doi.org\/10.1080\/10630732.2014.942092","journal-title":"J Urban Technol"},{"key":"11486_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357\u2013383","journal-title":"Inf Sci"},{"issue":"1","key":"11486_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MCOM.2014.6710070","volume":"52","author":"L Atzori","year":"2014","unstructured":"Atzori L, Iera A, Morabito G (2014) From \u201csmart objects\u201d to \u201csocial objects\u201d: The next evolutionary step of the internet of things. IEEE Commun Mag 52(1):97\u2013105","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"11486_CR4","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1080\/07421222.2017.1372996","volume":"34","author":"C Baham","year":"2017","unstructured":"Baham C, Hirschheim R, Calderon AA, Kisekka V (2017) An agile methodology for the disaster recovery of information systems under catastrophic scenarios. J Manag Inf Syst 34(3):633\u2013663","journal-title":"J Manag Inf Syst"},{"key":"11486_CR5","doi-asserted-by":"crossref","unstructured":"Birregah B, Top T, Perez C, Ch\u00e2telet E, Matta N, Lemercier M, Snoussi H (2012) Multi-layer crisis mapping: a social media-based approach. In: 2012 IEEE 21st international workshop on enabling technologies: infrastructure for collaborative enterprises. IEEE, pp 379\u2013384","DOI":"10.1109\/WETICE.2012.47"},{"issue":"2","key":"11486_CR6","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/S0951-8320(02)00233-8","volume":"79","author":"RD Braddock","year":"2003","unstructured":"Braddock RD (2003) Sensitivity analysis of the tsunami warning potential. Reliab Eng Syst Saf 79(2):225\u2013228","journal-title":"Reliab Eng Syst Saf"},{"issue":"5\u20131","key":"11486_CR7","first-page":"5","volume":"5","author":"PS Challagidad","year":"2017","unstructured":"Challagidad PS, Reshmi VS, Birje MN (2017) Reputation based trust model in cloud computing. Internet Things Cloud Comput 5(5\u20131):5\u201312","journal-title":"Internet Things Cloud Comput"},{"issue":"3","key":"11486_CR8","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1016\/j.jesit.2017.09.001","volume":"5","author":"M Chiregi","year":"2018","unstructured":"Chiregi M, Navimipour NJ (2018) Cloud computing and trust evaluation: A systematic literature review of the state-of-the-art mechanisms. J Electric Syst Inform Technol 5(3):608\u2013622","journal-title":"J Electric Syst Inform Technol"},{"issue":"2","key":"11486_CR9","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s11633-014-0840-3","volume":"12","author":"WJ Fan","year":"2015","unstructured":"Fan WJ, Yang SL, Perros H, Pei J (2015) A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int J Autom Comput 12(2):208\u2013219","journal-title":"Int J Autom Comput"},{"key":"11486_CR10","unstructured":"Fisher D, Hagon K, Lattimer C, O\u2019Callaghan S, Swithern S, Walmsley L (2018) Executive summary world disasters report: leaving no one behind. Int Fed Red Cross, Geneva, Switzerland, Tech Rep. https:\/\/media.ifrc.org\/ifrc\/wpcontent\/uploads\/sites\/5\/2018\/10\/B-WDR-2018-EXECSUM-EN.pdf."},{"key":"11486_CR11","doi-asserted-by":"crossref","unstructured":"Gonzalez AJ, Nencioni G, Helvik BE, Kamisinski A (2016) A fault-tolerant and consistent SDN controller. In&nbsp;2016 IEEE global communications conference (GLOBECOM). IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2016.7841496"},{"key":"11486_CR12","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. IEEE, pp 933\u2013939","DOI":"10.1109\/TrustCom.2011.129"},{"key":"11486_CR13","doi-asserted-by":"publisher","unstructured":"Hanka W, Saul J, Weber B, Becker J, Harjadi P, Rudloff A, Clinton J (2010) Real-time earthquake monitoring for tsunami warning in the Indian Ocean and beyond. Nat Hazard. https:\/\/doi.org\/10.5194\/NHESS-10-2611-2010","DOI":"10.5194\/NHESS-10-2611-2010"},{"key":"11486_CR14","doi-asserted-by":"crossref","unstructured":"Haworth B, Bruce E (2015) A review of volunteered geographic information for disaster management. Geogr Compass 9(5):237\u2013250","DOI":"10.1111\/gec3.12213"},{"issue":"1","key":"11486_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/2192-113X-2-9","volume":"2","author":"J Huang","year":"2013","unstructured":"Huang J, Nicol DM (2013) Trust mechanisms for cloud computing. J Cloud Comput 2(1):9","journal-title":"J Cloud Comput"},{"issue":"2","key":"11486_CR16","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.ocecoaman.2010.10.025","volume":"54","author":"D Jin","year":"2011","unstructured":"Jin D, Lin J (2011) Managing tsunamis through early warning systems: a multidisciplinary approach. Ocean Coast Manag 54(2):189\u2013199","journal-title":"Ocean Coast Manag"},{"issue":"2","key":"11486_CR17","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1177\/0275074005280605","volume":"36","author":"N Kapucu","year":"2006","unstructured":"Kapucu N (2006) Interagency communication networks during emergencies: Boundary spanners in multiagency coordination. Am Rev Public Admin 36(2):207\u2013225","journal-title":"Am Rev Public Admin"},{"key":"11486_CR18","first-page":"14","volume":"4","author":"K Khajehei","year":"2017","unstructured":"Khajehei K (2017) Trust models in cloud computing: a review. Int J Wirel Microwav Technol 4:14\u201327","journal-title":"Int J Wirel Microwav Technol"},{"key":"11486_CR19","doi-asserted-by":"crossref","unstructured":"Ko RK, Jagadpramana P, Mowbray M, Pearson S, Kirchberg M, Liang Q, Lee BS (2011) TrustCloud: a framework for accountability and trust in cloud computing. In: 2011 IEEE world congress on services. IEEE, pp 584\u2013588","DOI":"10.1109\/SERVICES.2011.91"},{"issue":"2","key":"11486_CR20","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/2963175.2963179","volume":"47","author":"J Lansing","year":"2016","unstructured":"Lansing J, Sunyaev A (2016) Trust in cloud computing: conceptual typology and trust-building antecedents. ACM SIGMIS Database 47(2):58\u201396","journal-title":"ACM SIGMIS Database"},{"issue":"1","key":"11486_CR21","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","volume":"18","author":"R Mijumbi","year":"2015","unstructured":"Mijumbi R, Serrat J, Gorricho JL, Bouten N, De Turck F, Boutaba R (2015) Network function virtualization: state-of-the-art and research challenges. IEEE Commun Surv Tutorials 18(1):236\u2013262","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"11486_CR22","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1109\/COMST.2018.2844341","volume":"20","author":"M Mohammadi","year":"2018","unstructured":"Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2018) Deep learning for IoT big data and streaming analytics: a survey. IEEE Communications Surveys & Tutorials 20(4):2923\u20132960","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"11486_CR23","doi-asserted-by":"publisher","first-page":"4119","DOI":"10.1109\/JIOT.2018.2867255","volume":"5","author":"C Mouradian","year":"2018","unstructured":"Mouradian C, Jahromi NT, Glitho RH (2018) NFV and SDN-based distributed IoT gateway for large-scale disaster management. IEEE Internet Things J 5(5):4119\u20134131","journal-title":"IEEE Internet Things J"},{"issue":"1\/2","key":"11486_CR24","first-page":"15","volume":"64","author":"P Pandey","year":"2019","unstructured":"Pandey P, Litoriya R (2019) Elderly care through unusual behavior detection: a disaster management approach using IoT and intelligence. IBM J Res Dev 64(1\/2):15\u201321","journal-title":"IBM J Res Dev"},{"issue":"2","key":"11486_CR25","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TETC.2015.2432742","volume":"3","author":"S Poslad","year":"2015","unstructured":"Poslad S, Middleton SE, Chaves F, Tao R, Necmioglu O, B\u00fcgel U (2015) A semantic IoT early warning system for natural environment crisis management. IEEE Trans Emerg Top Comput 3(2):246\u2013257","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"11486_CR26","doi-asserted-by":"publisher","first-page":"91885","DOI":"10.1109\/ACCESS.2019.2928233","volume":"7","author":"SA Shah","year":"2019","unstructured":"Shah SA, Seker DZ, Rathore MM, Hameed S, Yahia SB, Draheim D (2019) Towards disaster resilient smart cities: can internet of things and big data analytics be the game changers? IEEE Access 7:91885\u201391903","journal-title":"IEEE Access"},{"key":"11486_CR27","doi-asserted-by":"publisher","first-page":"54595","DOI":"10.1109\/ACCESS.2019.2913340","volume":"7","author":"SA Shah","year":"2019","unstructured":"Shah SA, Seker DZ, Hameed S, Draheim D (2019) The rising role of big data analytics and IoT in disaster management: recent advances, taxonomy and prospects. IEEE Access 7:54595\u201354614","journal-title":"IEEE Access"},{"key":"11486_CR28","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.procs.2015.03.165","volume":"45","author":"R Shaikh","year":"2015","unstructured":"Shaikh R, Sasikumar M (2015) Trust model for measuring security strength of cloud computing service. Proc Comput Sci 45:380\u2013389","journal-title":"Proc Comput Sci"},{"key":"11486_CR29","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.scs.2018.01.053","volume":"38","author":"BN Silva","year":"2018","unstructured":"Silva BN, Khan M, Han K (2018) Towards sustainable smart cities: a review of trends, architectures, components, and open challenges in smart cities. Sustain Cities Soc 38:697\u2013713","journal-title":"Sustain Cities Soc"},{"key":"11486_CR30","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.1016\/j.proeng.2011.08.537","volume":"15","author":"D Sun","year":"2011","unstructured":"Sun D, Chang G, Sun L, Wang X (2011) Surveying and analyzing security, privacy and trust issues in cloud computing environments. Proc Eng 15:2852\u20132856","journal-title":"Proc Eng"},{"key":"11486_CR31","doi-asserted-by":"crossref","unstructured":"Takabi H, Joshi JB, Ahn GJ (2010) Securecloud: towards a comprehensive security framework for cloud computing environments. In 2010 IEEE 34th annual computer software and applications conference workshops. IEEE, pp 393\u2013398","DOI":"10.1109\/COMPSACW.2010.74"},{"key":"11486_CR32","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.future.2016.01.009","volume":"74","author":"M Tang","year":"2017","unstructured":"Tang M, Dai X, Liu J, Chen J (2017) Towards a trust evaluation middleware for cloud service selection. Futur Gener Comput Syst 74:302\u2013312","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"11486_CR33","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10389-006-0043-7","volume":"14","author":"S Tekeli-Ye\u015fil","year":"2006","unstructured":"Tekeli-Ye\u015fil S (2006) Public health and natural disasters: disaster preparedness and response in health systems. J Public Health 14(5):317\u2013324","journal-title":"J Public Health"},{"key":"11486_CR34","unstructured":"Wiltshire A (2006) Developing early warning systems: a checklist. In: Proc 3rd Int Conf Early Warning (EWC), pp 27\u201319"},{"key":"11486_CR35","doi-asserted-by":"publisher","DOI":"10.1093\/acrefore\/9780199389407.013.25","author":"B Wisner","year":"2016","unstructured":"Wisner B (2016) Vulnerability as concept, model, metric, and tool. Nat Hazard Sci. https:\/\/doi.org\/10.1093\/acrefore\/9780199389407.013.25","journal-title":"Nat Hazard Sci"},{"key":"11486_CR36","volume-title":"Handbook of hazards and disaster risk reduction","year":"2012","unstructured":"Wisner B, Gaillard JC, Kelman I (eds) (2012) Handbook of hazards and disaster risk reduction. Routledge, London"},{"issue":"1","key":"11486_CR37","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/COMST.2016.2626784","volume":"19","author":"W Xia","year":"2016","unstructured":"Xia W, Zhao P, Wen Y, Xie H (2016) A survey on data center networking (DCN): infrastructure and operations. IEEE Commun Surv Tutorials 19(1):640\u2013656","journal-title":"IEEE Commun Surv Tutorials"},{"key":"11486_CR38","unstructured":"Zakaria SAS, Azimi MA, Majid TA (2014) Exploring the issues of information and communication technology (ICT) application in disaster risk management: a case study of 2014 major flood event in Kelantan"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11486-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11486-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11486-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T10:43:06Z","timestamp":1663843386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11486-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":38,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["11486"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11486-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,3]]},"assertion":[{"value":"1 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}