{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:01:35Z","timestamp":1775044895514,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18147-6","type":"journal-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T08:02:02Z","timestamp":1706256122000},"page":"68363-68391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A novel three-factor authentication and optimal mapreduce frameworks for secure medical big data transmission over the cloud with shaxecc"],"prefix":"10.1007","volume":"83","author":[{"given":"K.","family":"Rajeshkumar","sequence":"first","affiliation":[]},{"given":"S.","family":"Dhanasekaran","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,26]]},"reference":[{"issue":"1","key":"18147_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi K, Beni-Hessane A, Khaloufi H (2018) Big healthcare data: preserving security and privacy. J Big Data 5(1):1\u201318","journal-title":"J Big Data"},{"key":"18147_CR2","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.ijinfomgt.2019.05.017","volume":"49","author":"L Rajabion","year":"2019","unstructured":"Rajabion L, Shaltooki AA, Taghikhah M, Ghasemi A, Badfar A (2019) Healthcare big data processing mechanisms: The role of cloud computing. Int J Inf Manag 49:271\u2013289","journal-title":"Int J Inf Manag"},{"key":"18147_CR3","doi-asserted-by":"publisher","first-page":"75090","DOI":"10.1109\/ACCESS.2019.2920998","volume":"7","author":"J Xiong","year":"2019","unstructured":"Xiong J, Zhang Y, Tang S, Liu X, Yao Z (2019) Secure encrypted data with authorized deduplication in cloud. IEEE Access 7:75090\u201375104","journal-title":"IEEE Access"},{"key":"18147_CR4","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361\u201374382","journal-title":"IEEE Access"},{"key":"18147_CR5","unstructured":"Alexandru A, Alexandru C, Coardos D, Tudora E (2016) Healthcare, Big Data and Cloud Computing. WSEAS Transactions on Computer Research. 4:123\u2013131"},{"key":"18147_CR6","doi-asserted-by":"crossref","unstructured":"Sardar TH, Ansari Z (2022) MapReduce-based fuzzy C-means algorithm for distributed document clustering. J Inst Eng (India): Series B, pp 1\u201312","DOI":"10.1007\/s40031-021-00651-0"},{"key":"18147_CR7","doi-asserted-by":"crossref","unstructured":"Wu C, Yan B, Yu R, Yu B, Zhou X, Yu Y, Chen N (2021) K-means clustering algorithm and its simulation based on distributed computing platform. Complexity 1\u201310","DOI":"10.1155\/2021\/9446653"},{"key":"18147_CR8","doi-asserted-by":"crossref","unstructured":"Sagheer NS, Yousif SA (2021) Canopy with k-means clustering algorithm for big data analytics, In AIP Conference Proceedings 2334(1)","DOI":"10.1063\/5.0042398"},{"key":"18147_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2019.07.058","volume":"504","author":"L Wang","year":"2019","unstructured":"Wang L, Wang B, Song W, Zhang Z (2019) A key-sharing based secure deduplication scheme in cloud storage. Inf Sci 504:48\u201360","journal-title":"Inf Sci"},{"key":"18147_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics10111273","volume":"10","author":"A Rehman","year":"2021","unstructured":"Rehman A, Haseeb K, Saba T, Lloret J, Tariq U (2021) Secured big data analytics for decision-oriented medical system using internet of things. Electronics 10:1\u201313","journal-title":"Electronics"},{"key":"18147_CR11","first-page":"250","volume":"46","author":"S Li","year":"2019","unstructured":"Li S, Chunxiang Xu, Zhang Y (2019) CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage. J Inf Secur Appl 46:250\u2013258","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"18147_CR12","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.11591\/ijece.v8i3.pp1711-1719","volume":"8","author":"G Bathla","year":"2018","unstructured":"Bathla G, Aggarwal H, Rani R (2018) A novel approach for clustering big data based on mapreduce. Int J Electr Comput Eng (IJECE) 8(3):1711\u20131719","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"18147_CR13","doi-asserted-by":"crossref","unstructured":"Guan S, Zhang C, Wang Y, Liu W (2023) Hadoop-based secure storage solution for big data in cloud computing environment, Digit Commun Netw","DOI":"10.1016\/j.dcan.2023.01.014"},{"issue":"1","key":"18147_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0193-4","volume":"6","author":"P Jain","year":"2019","unstructured":"Jain P, Gyanchandani M, Khare N (2019) Enhanced secured map reduce layer for big data privacy and security. J Big Data 6(1):1\u201317","journal-title":"J Big Data"},{"key":"18147_CR15","doi-asserted-by":"crossref","unstructured":"Khatiwada P, Bhusal H, Chatterjee A, Gerdes MW (2020) A proposed access control-based privacy preservation model to share healthcare data in cloud\u201d, 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 12\u201314 October 2020, Thessaloniki, Greece","DOI":"10.1109\/WiMob50308.2020.9253414"},{"key":"18147_CR16","doi-asserted-by":"publisher","unstructured":"Thangarasu G, Dominic PDD, Subramanian K, Smiley S (2019) Biometric based signature authentication scheme for cloud healthcare data security. https:\/\/doi.org\/10.1007\/978-3-319-99007-1_52","DOI":"10.1007\/978-3-319-99007-1_52"},{"key":"18147_CR17","doi-asserted-by":"publisher","first-page":"34404","DOI":"10.1109\/ACCESS.2022.3161439","volume":"10","author":"AV Usharani","year":"2022","unstructured":"Usharani AV, Attigeri G (2022) Secure EMR classification and deduplication using mapreduce. IEEE Access 10:34404\u201334414","journal-title":"IEEE Access"},{"issue":"3","key":"18147_CR18","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1007\/s11277-020-07229-x","volume":"114","author":"K Tamilarasi","year":"2020","unstructured":"Tamilarasi K, Jawahar A (2020) Medical data security for healthcare applications using hybrid lightweight encryption and swarm optimization algorithm. Wireless Pers Commun 114(3):1865\u20131886","journal-title":"Wireless Pers Commun"},{"key":"18147_CR19","doi-asserted-by":"publisher","first-page":"21165","DOI":"10.1007\/s11042-021-10723-4","volume":"80","author":"R Denis","year":"2021","unstructured":"Denis R, Madhubala P (2021) Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimedia Tools Appl 80:21165\u201321202. https:\/\/doi.org\/10.1007\/s11042-021-10723-4","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"18147_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21020552","volume":"21","author":"F Farid","year":"2021","unstructured":"Farid F, Elkhodr M, Sabrina F, Ahamed F, Gide E (2021) A smart biometric identity management framework for personalised IoT and cloud computing-based healthcare services. Sensors 21(2):1\u201318","journal-title":"Sensors"},{"key":"18147_CR21","doi-asserted-by":"publisher","first-page":"175","DOI":"10.5772\/intechopen.89426","volume":"4","author":"SS Darvazeh","year":"2020","unstructured":"Darvazeh SS, Vanani IR, Musolu FM (2020) Big data analytics and its applications in supply chain management. New Trends Use Artif Intell Ind 4:175. https:\/\/doi.org\/10.5772\/intechopen.89426. (ISBN: 978-1-83880-142-7)","journal-title":"New Trends Use Artif Intell Ind"},{"key":"18147_CR22","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.procs.2015.10.078","volume":"70","author":"SK Shankar","year":"2015","unstructured":"Shankar SK, Tomar AS, Tak GK (2015) Secure medical data transmission by using ECC with mutual authentication in WSNs. Procedia Comput Sci 70:455\u2013461","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"18147_CR23","first-page":"1","volume":"10","author":"C-L Chen","year":"2020","unstructured":"Chen C-L, Huang P-T, Deng Y-Y, Chen H-C, Wang Y-C (2020) A secure electronic medical record authorization system for smart device application in cloud computing environments. HCIS 10(1):1\u201331","journal-title":"HCIS"},{"issue":"6","key":"18147_CR24","first-page":"1","volume":"78","author":"B Prasanalakshmi","year":"2021","unstructured":"Prasanalakshmi B, Murugan K, Srinivasan K, Shridevi S, Shamsudheen S, Hu Y-C (2021) Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography. J Supercomput 78(6):1\u201318","journal-title":"J Supercomput"},{"key":"18147_CR25","doi-asserted-by":"crossref","unstructured":"Bhateja V, Satapathy SC, Satori H (2020) Embedded systems and artificial intelligence, Springer Nature Singapore, ISBN: ISBN 978\u2013981\u201315\u20130947\u20136","DOI":"10.1007\/978-981-15-0947-6"},{"key":"18147_CR26","doi-asserted-by":"publisher","first-page":"52062","DOI":"10.1109\/ACCESS.2020.2980627","volume":"8","author":"X Liu","year":"2020","unstructured":"Liu X, Tingting Lu, He X, Yang X, Niu S (2020) Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8:52062\u201352074","journal-title":"IEEE Access"},{"key":"18147_CR27","doi-asserted-by":"publisher","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi H, Kuchaki-Rafsanjan M (2020) A survey on security challenges in cloud computing: issues, threats and solutions. J Supercomput 76:9493\u20139532","journal-title":"J Supercomput"},{"key":"18147_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-018-1115-2","volume":"43","author":"YM Essa","year":"2019","unstructured":"Essa YM, Hemdan EED, El-Mahalawy A, Attiya G, El-Sayed A (2019) IFHDS: Intelligent framework for securing healthcare bigdata. J Med Syst 43:1\u201313","journal-title":"J Med Syst"},{"issue":"6","key":"18147_CR29","doi-asserted-by":"publisher","first-page":"883","DOI":"10.3390\/electronics11060883","volume":"11","author":"FH Awad","year":"2022","unstructured":"Awad FH, Hamad MM (2022) Improved k-means clustering algorithm for big data based on distributed smartphoneneural engine processor. Electronics 11(6):883","journal-title":"Electronics"},{"issue":"15","key":"18147_CR30","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1080\/08839514.2021.1987709","volume":"35","author":"J Usha Lawrance","year":"2021","unstructured":"Usha Lawrance J, Nayahi Jesudhasan JV (2021) Privacy preserving parallel clustering-based anonymization for big data using mapreduce framework. Appl Artif Intell 35(15):1587\u20131620","journal-title":"Appl Artif Intell"},{"key":"18147_CR31","doi-asserted-by":"crossref","unstructured":"Dandugala LS, Vani KS (2022) A weighted k-means clustering algorithm for clustering big data based on mapreduce","DOI":"10.21203\/rs.3.rs-1710704\/v1"},{"issue":"10","key":"18147_CR32","doi-asserted-by":"publisher","first-page":"15287","DOI":"10.1007\/s11042-022-13929-2","volume":"82","author":"R Vankdothu","year":"2023","unstructured":"Vankdothu R, Hameed MA, Bhukya R, Garg G (2023) Entropy and sigmoid based K-means clustering and AGWO for effective big data handling. Multimedia Tools Appl 82(10):15287\u201315304","journal-title":"Multimedia Tools Appl"},{"key":"18147_CR33","doi-asserted-by":"crossref","unstructured":"Nguyen CD, Nguyen DT, Pham VH (2013) Parallel two-phase K-means, In Computational Science and Its Applications\u2013ICCSA 2013: 13th International Conference, Ho Chi Minh City, Vietnam, June 24\u201327, Proceedings, Part V, 224\u2013231","DOI":"10.1007\/978-3-642-39640-3_16"},{"key":"18147_CR34","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s11704-013-3158-3","volume":"8","author":"Y He","year":"2014","unstructured":"He Y, Tan H, Luo W, Feng S, Fan J (2014) MR-DBSCAN: a scalable MapReduce-based DBSCAN algorithm for heavily skewed data. Front Comp Sci 8:83\u201399","journal-title":"Front Comp Sci"},{"key":"18147_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1374-6","volume":"43","author":"E Shanmugapriya","year":"2019","unstructured":"Shanmugapriya E, Kavitha R (2019) Efficient and secure privacy analysis for medical big data using TDES and MKSVM with access control in cloud. J Med Syst 43:1\u201312","journal-title":"J Med Syst"},{"issue":"6","key":"18147_CR36","first-page":"393","volume":"12","author":"SDM Satar","year":"2021","unstructured":"Satar SDM, Hussin M, Hanapi ZM, Mohamed MA (2021) Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme. (IJACSA) Int J Adv Comput Sci Appl 12(6):393\u2013399","journal-title":"(IJACSA) Int J Adv Comput Sci Appl"},{"key":"18147_CR37","first-page":"1","volume":"28","author":"Z Wang","year":"2022","unstructured":"Wang Z, Gao W, Yang M, Hao R (2022) Enabling secure data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems. Clust Comput 28:1\u20136","journal-title":"Clust Comput"},{"issue":"1","key":"18147_CR38","doi-asserted-by":"publisher","first-page":"86","DOI":"10.17762\/ijcnis.v14i1.5187","volume":"14","author":"I Chandrakar","year":"2022","unstructured":"Chandrakar I, Hulipalled VR (2022) Improved technique for preserving privacy while mining real time big data. Int J Commun Netw Inf Secur 14(1):86\u201392","journal-title":"Int J Commun Netw Inf Secur"},{"key":"18147_CR39","doi-asserted-by":"publisher","unstructured":"Padmaja K, Seshadri R (2021) A real-time secure medical device authentication for personal E-Healthcare services on cloud computing. Int J Syst Assur Eng Manag. https:\/\/doi.org\/10.1007\/s13198-021-01148-1","DOI":"10.1007\/s13198-021-01148-1"},{"issue":"6","key":"18147_CR40","first-page":"3121","volume":"34","author":"U Narayanan","year":"2020","unstructured":"Narayanan U, Paul V, Joseph S (2020) A novel system architecture for secure authentication and data sharing in cloud enabled big data environment. J King Saud Univ Comput Inf Sci 34(6):3121\u20133135","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"1","key":"18147_CR41","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jksuci.2017.07.001","volume":"32","author":"KA Shakil","year":"2020","unstructured":"Shakil KA, Zareen FJ, Alam M, Jabin S (2020) BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. J King Saud Univ Comput Inf Sci 32(1):57\u201364. https:\/\/doi.org\/10.1016\/j.jksuci.2017.07.001","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"18147_CR42","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.jpdc.2021.05.001","volume":"155","author":"SO Ogundoyin","year":"2021","unstructured":"Ogundoyin SO, Kamil IA (2021) PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities. J Parallel Distrib Comput 155:101\u2013119","journal-title":"J Parallel Distrib Comput"},{"issue":"5","key":"18147_CR43","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s12083-021-01162-x","volume":"14","author":"M Masud","year":"2021","unstructured":"Masud M, Gaba GS, Choudhary K, Alroobaea R, Shamim Hossain M (2021) A robust and lightweight secure access scheme for cloud-based E-healthcare services. Peer-to-Peer Netw Appl 14(5):3043\u20133057","journal-title":"Peer-to-Peer Netw Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18147-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18147-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18147-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T05:38:17Z","timestamp":1721885897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18147-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":43,"journal-issue":{"issue":"26","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["18147"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18147-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"5 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}