{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:56Z","timestamp":1740122876914,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-13960-3","type":"journal-article","created":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T03:50:01Z","timestamp":1664596201000},"page":"15983-16007","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Security enhancement of the cloud paradigm using a novel optimized crypto mechanism"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5358-460X","authenticated-orcid":false,"given":"Kishan Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,1]]},"reference":[{"issue":"1","key":"13960_CR1","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00521-016-2448-8","volume":"29","author":"MS AbdLatiff","year":"2018","unstructured":"AbdLatiff MS, Madni SHH, Abdullahi M (2018) Fault tolerance aware scheduling technique for cloud computing environment using dynamic clustering algorithm. Neural Comput & Applic 29(1):279\u2013293. https:\/\/doi.org\/10.1007\/s00521-016-2448-8","journal-title":"Neural Comput & Applic"},{"key":"13960_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad S, Anwar MS, Khan MA et al (2021) Deep Frustration Severity Network for the Prediction of Declined Students' Cognitive Skills. 2021 4th international conference on Computing & Information Sciences (ICCIS), IEEE. https:\/\/doi.org\/10.1109\/ICCIS54243.2021.9676396","DOI":"10.1109\/ICCIS54243.2021.9676396"},{"key":"13960_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6503299","volume":"2022","author":"N Ahmed","year":"2022","unstructured":"Ahmed N, Deng Z, Memon I, Hassan F et al (2022) A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks. Wirel Commun Mob Comput 2022:1\u201315. https:\/\/doi.org\/10.1155\/2022\/6503299","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"13960_CR4","doi-asserted-by":"publisher","first-page":"100059","DOI":"10.1016\/j.jnlest.2020.100059","volume":"19","author":"ZR Alashhab","year":"2021","unstructured":"Alashhab ZR, Anbar M, Singh MM, Leau YB, al-Sai ZA, Abu Alhayja\u2019a S (2021) Impact of coronavirus pandemic crisis on technologies and cloud computing applications. J Electron Sci Technol 19(1):100059. https:\/\/doi.org\/10.1016\/j.jnlest.2020.100059","journal-title":"J Electron Sci Technol"},{"issue":"2","key":"13960_CR5","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1007\/s12652-021-02942-2","volume":"13","author":"P Chinnasamy","year":"2022","unstructured":"Chinnasamy P, Deepalakshmi P (2022) HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud. J Ambient Intell Humaniz Comput 13(2):1001\u20131019. https:\/\/doi.org\/10.1007\/s12652-021-02942-2","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"13960_CR6","doi-asserted-by":"publisher","first-page":"21165","DOI":"10.1007\/s11042-021-10723-4","volume":"80","author":"R Denis","year":"2021","unstructured":"Denis R, Madhubala P (2021) Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimed Tools Appl 80:21165\u201321202. https:\/\/doi.org\/10.1007\/s11042-021-10723-4","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"13960_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-01153-7","volume":"20","author":"L Ehwerhemuepha","year":"2020","unstructured":"Ehwerhemuepha L, Gasperino G, Bischoff N, Taraman S, Chang A, Feaster W (2020) HealtheDataLab\u2013a cloud computing solution for data science and advanced analytics in healthcare with application to predicting multi-center pediatric readmissions. BMC Medical Inform Decis Mak 20(1):1\u201312. https:\/\/doi.org\/10.1186\/s12911-020-01153-7","journal-title":"BMC Medical Inform Decis Mak"},{"issue":"15","key":"13960_CR8","doi-asserted-by":"publisher","first-page":"10979","DOI":"10.1007\/s00521-018-3801-x","volume":"32","author":"M Elhoseny","year":"2020","unstructured":"Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2020) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput & Applic 32(15):10979\u201310993. https:\/\/doi.org\/10.1007\/s00521-018-3801-x","journal-title":"Neural Comput & Applic"},{"key":"13960_CR9","doi-asserted-by":"publisher","first-page":"132302","DOI":"10.1109\/ACCESS.2020.3009783","volume":"8","author":"A Jaleel","year":"2020","unstructured":"Jaleel A, Mahmood T, Hassan MA, Bano G, Khurshid SK (2020) Towards medical data interoperability through collaboration of healthcare devices. IEEE Access 8:132302\u2013132319. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009783","journal-title":"IEEE Access"},{"key":"13960_CR10","doi-asserted-by":"publisher","first-page":"107838","DOI":"10.1109\/ACCESS.2020.3001152","volume":"8","author":"A Kumari","year":"2020","unstructured":"Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen CM (2020) Csef: cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 8:107838\u2013107852. https:\/\/doi.org\/10.1109\/ACCESS.2020.3001152","journal-title":"IEEE Access"},{"issue":"2","key":"13960_CR11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3390\/diagnostics11020241","volume":"11","author":"V Lahoura","year":"2021","unstructured":"Lahoura V, Singh H, Aggarwal A, Sharma B, Mohammed MA, Dama\u0161evi\u010dius R, Kadry S, Cengiz K (2021) Cloud computing-based framework for breast cancer diagnosis using extreme learning machine. Diagnostics 11(2):241. https:\/\/doi.org\/10.3390\/diagnostics11020241","journal-title":"Diagnostics"},{"key":"13960_CR12","doi-asserted-by":"publisher","first-page":"78265","DOI":"10.1109\/ACCESS.2020.2988563","volume":"8","author":"W Lie","year":"2020","unstructured":"Lie W, Jiang B, Zhao W (2020) Obstetric imaging diagnostic platform based on cloud computing technology under the background of smart medical big data and deep learning. IEEE Access 8:78265\u201378278. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988563","journal-title":"IEEE Access"},{"key":"13960_CR13","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1016\/j.future.2019.11.013","volume":"107","author":"SN Mthunzi","year":"2020","unstructured":"Mthunzi SN, Benkhelifa E, Bosakowski T, Guegan CG, Barhamgi M (2020) Cloud computing security taxonomy: from an atomistic to a holistic view. Futur Gener Comput Syst 107:620\u2013644. https:\/\/doi.org\/10.1016\/j.future.2019.11.013","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"13960_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/fi14020055","volume":"14","author":"K Muthavhine","year":"2022","unstructured":"Muthavhine K, Sumbwanyambe M (2022) Securing IoT devices against differential-linear (DL) attack used on serpent algorithm. Future Internet 14(2):55. https:\/\/doi.org\/10.3390\/fi14020055","journal-title":"Future Internet"},{"key":"13960_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.comcom.2022.05.018","volume":"192","author":"S Niu","year":"2022","unstructured":"Niu S, Song M, Fang L, Yu F, Han S, Wang C (2022) Keyword search over encrypted cloud data based on blockchain in smart medical applications. Comput Commun 192:33\u201347. https:\/\/doi.org\/10.1016\/j.comcom.2022.05.018","journal-title":"Comput Commun"},{"key":"13960_CR16","doi-asserted-by":"publisher","first-page":"4763","DOI":"10.1016\/j.jksuci.2021.01.011","volume":"34","author":"AR Panhalkar","year":"2021","unstructured":"Panhalkar AR, Doye DD (2021) Optimization of decision trees using modified African buffalo algorithm. J King Saud Univ - Comput Inf Sci 34:4763\u20134772. https:\/\/doi.org\/10.1016\/j.jksuci.2021.01.011","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"13960_CR17","doi-asserted-by":"publisher","unstructured":"Pravin A, Jacob TP, Nagarajan G (2019) Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique. J Ambient Intell Humaniz Comput:1\u20138. https:\/\/doi.org\/10.1007\/s12652-019-01563-0","DOI":"10.1007\/s12652-019-01563-0"},{"key":"13960_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-022-09666-2","volume":"125","author":"BS Raj","year":"2022","unstructured":"Raj BS, Venugopalachar S (2022) Multi-data multi-user end to end encryption for electronic health records data security in cloud. Wirel Pers Commun 125:1\u201329. https:\/\/doi.org\/10.1007\/s11277-022-09666-2","journal-title":"Wirel Pers Commun"},{"key":"13960_CR19","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1016\/j.comcom.2019.11.048","volume":"150","author":"DR Rani","year":"2020","unstructured":"Rani DR, Geethakumari G (2020) Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN. Comput Commun 150:799\u2013810. https:\/\/doi.org\/10.1016\/j.comcom.2019.11.048","journal-title":"Comput Commun"},{"key":"13960_CR20","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-030-37468-6_25","volume-title":"Internet of Things (IoT)","author":"M Rashid","year":"2020","unstructured":"Rashid M, Parah SA, Wani AR, Gupta SK (2020) Securing E-Health IoT data on cloud systems using novel extended role based access control model. In: Internet of Things (IoT). Springer, Cham, pp 473\u2013489. https:\/\/doi.org\/10.1007\/978-3-030-37468-6_25"},{"key":"13960_CR21","doi-asserted-by":"publisher","unstructured":"Sasubilli MK, Venkateswarlu R (2021) Cloud computing security challenges, threats and vulnerabilities. 2021 6th international conference on inventive computation technologies (ICICT), IEEE. https:\/\/doi.org\/10.1109\/ICICT50816.2021.9358709","DOI":"10.1109\/ICICT50816.2021.9358709"},{"key":"13960_CR22","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jpdc.2019.09.004","volume":"136","author":"AR Setlur","year":"2019","unstructured":"Setlur AR, Nirmala SJ, Singh HS, Khoriya S (2019) An efficient fault tolerant workflow scheduling approach using replication heuristics and checkpointing in the cloud. J Parallel Distrib Comput 136:14\u201328. https:\/\/doi.org\/10.1016\/j.jpdc.2019.09.004","journal-title":"J Parallel Distrib Comput"},{"key":"13960_CR23","doi-asserted-by":"publisher","first-page":"25773","DOI":"10.1007\/s11042-021-10896-y","volume":"80","author":"C Shi","year":"2021","unstructured":"Shi C, Wang H, Hu Y, Li X (2021) A novel NMF-based authentication scheme for encrypted speech in cloud computing. Multimed Tools Appl 80:25773\u201325798. https:\/\/doi.org\/10.1007\/s11042-021-10896-y","journal-title":"Multimed Tools Appl"},{"key":"13960_CR24","doi-asserted-by":"publisher","first-page":"10717","DOI":"10.1007\/s11042-019-08573-2","volume":"79","author":"SK Sood","year":"2020","unstructured":"Sood SK (2020) Mobile fog based secure cloud-IoT framework for enterprise multimedia security. Multimed Tools Appl 79:10717\u201310732. https:\/\/doi.org\/10.1007\/s11042-019-08573-2","journal-title":"Multimed Tools Appl"},{"key":"13960_CR25","doi-asserted-by":"publisher","first-page":"101079","DOI":"10.1109\/ACCESS.2020.2997831","volume":"8","author":"L Sun","year":"2020","unstructured":"Sun L, Jiang X, Ren H, Guo Y (2020) Edge-cloud computing and artificial intelligence in internet of medical things: architecture, technology and application. IEEE Access 8:101079\u2013101092. https:\/\/doi.org\/10.1109\/ACCESS.2020.2997831","journal-title":"IEEE Access"},{"issue":"2","key":"13960_CR26","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s10586-020-03157-4","volume":"24","author":"M Tahir","year":"2021","unstructured":"Tahir M, Sardaraz M, Mehmood Z, Muhammad S (2021) CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Clust Comput 24(2):739\u2013752. https:\/\/doi.org\/10.1007\/s10586-020-03157-4","journal-title":"Clust Comput"},{"key":"13960_CR27","doi-asserted-by":"publisher","unstructured":"Tunio MH, Jianping L, Butt MHF et al (2021) Identification and Classification of Rice Plant Disease Using Hybrid Transfer Learning. 2021 18th international computer conference on wavelet active media technology and information processing (ICCWAMTIP), IEEE. https:\/\/doi.org\/10.1109\/ICCWAMTIP53232.2021.9674124","DOI":"10.1109\/ICCWAMTIP53232.2021.9674124"},{"issue":"3","key":"13960_CR28","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s10586-020-03114-1","volume":"23","author":"DVK Vengala","year":"2020","unstructured":"Vengala DVK, Kavitha D, Kumar APS (2020) Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Clust Comput 23(3):1683\u20131696. https:\/\/doi.org\/10.1007\/s10586-020-03114-1","journal-title":"Clust Comput"},{"issue":"9","key":"13960_CR29","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TC.2014.2366751","volume":"64","author":"J Wang","year":"2015","unstructured":"Wang J, Bao W, Zhu X, Yang LT, Xiang Y (2015) FESTAL: fault-tolerant elastic scheduling algorithm for real-time tasks in virtualized clouds. IEEE Trans Comput 64(9):2545\u20132558. https:\/\/doi.org\/10.1109\/TC.2014.2366751","journal-title":"IEEE Trans Comput"},{"key":"13960_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.future.2018.11.001","volume":"94","author":"B Wu","year":"2019","unstructured":"Wu B, Hao K, Cai X, Wang T (2019) An integrated algorithm for multi-agent fault-tolerant scheduling based on MOEA. Futur Gener Comput Syst 94:51\u201361. https:\/\/doi.org\/10.1016\/j.future.2018.11.001","journal-title":"Futur Gener Comput Syst"},{"key":"13960_CR31","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TSC.2019.2959775","volume":"15","author":"W Xiangyu","year":"2019","unstructured":"Xiangyu W, Ma J, Yinbin M, Liu X et al (2019) Privacy-preserving diverse keyword search and online pre-diagnosis in cloud computing. IEEE Trans Serv Comput 15:710\u2013723. https:\/\/doi.org\/10.1109\/TSC.2019.2959775","journal-title":"IEEE Trans Serv Comput"},{"key":"13960_CR32","doi-asserted-by":"publisher","first-page":"9819","DOI":"10.1007\/s11042-019-07900-x","volume":"79","author":"X Xu","year":"2020","unstructured":"Xu X, Chen Y, Yuan Y, Huang T, Zhang X, Qi L (2020) Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimed Tools Appl 79:9819\u20139844. https:\/\/doi.org\/10.1007\/s11042-019-07900-x","journal-title":"Multimed Tools Appl"},{"key":"13960_CR33","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11036-019-01484-4","volume":"26","author":"J Xu","year":"2020","unstructured":"Xu J, Yu Y, Meng Q, Wu Q, Zhou F (2020) Role-based access control model for cloud storage using identity-based cryptosystem. Mob Netw Appl 26:1475\u20131492. https:\/\/doi.org\/10.1007\/s11036-019-01484-4","journal-title":"Mob Netw Appl"},{"key":"13960_CR34","doi-asserted-by":"publisher","first-page":"45468","DOI":"10.1109\/ACCESS.2020.2976894","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Li T, Pei X, Wen L, Wang C (2020) Medical data sharing scheme based on attribute cryptosystem and blockchain technology. IEEE Access 8:45468\u201345476. https:\/\/doi.org\/10.1109\/ACCESS.2020.2976894","journal-title":"IEEE Access"},{"key":"13960_CR35","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1109\/TCC.2019.2908400","volume":"9","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Xu C, Lin X, Shen XS (2019) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans Cloud Comput 9:923\u2013937. https:\/\/doi.org\/10.1109\/TCC.2019.2908400","journal-title":"IEEE Trans Cloud Comput"},{"key":"13960_CR36","doi-asserted-by":"publisher","first-page":"54402","DOI":"10.1109\/ACCESS.2020.2981503","volume":"8","author":"X Zhang","year":"2020","unstructured":"Zhang X, Huang C, Zhang Y, Zhang J, Gong J (2020) Ldvas: lattice-based designated verifier auditing scheme for electronic medical data in cloud-assisted wbans. IEEE Access 8:54402\u201354414. https:\/\/doi.org\/10.1109\/ACCESS.2020.2981503","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13960-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13960-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13960-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T09:16:23Z","timestamp":1681550183000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13960-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":36,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["13960"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13960-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,10,1]]},"assertion":[{"value":"25 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no potential conflict of interest.<b>Statement of human and animal rights<\/b>","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of potential conflict of interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"For this type of study formal consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}