{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:38:25Z","timestamp":1776353905029,"version":"3.51.2"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-021-04173-w","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:03:47Z","timestamp":1642377827000},"page":"9414-9437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing"],"prefix":"10.1007","volume":"78","author":[{"given":"K.","family":"Anand","sequence":"first","affiliation":[]},{"given":"A.","family":"Vijayaraj","sequence":"additional","affiliation":[]},{"given":"M.","family":"Vijay Anand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"issue":"1","key":"4173_CR1","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s10586-017-1298-1","volume":"22","author":"AM Elmisery","year":"2019","unstructured":"Elmisery AM, Rho S, Aborizka M (2019) A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services. Clust Comput 22(1):1611\u20131638","journal-title":"Clust Comput"},{"issue":"4","key":"4173_CR2","doi-asserted-by":"publisher","first-page":"3595","DOI":"10.1007\/s11277-021-08278-6","volume":"118","author":"A Sathya","year":"2021","unstructured":"Sathya A, Raja SKS (2021) Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure. Wirel Pers Commun 118(4):3595\u20133614","journal-title":"Wirel Pers Commun"},{"key":"4173_CR3","doi-asserted-by":"crossref","unstructured":"Sendhil R and Amuthan A (2021) Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications.\u00a0Int J Inform Technol, pp.1\u20139","DOI":"10.1007\/s41870-021-00704-z"},{"issue":"2","key":"4173_CR4","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1109\/JIOT.2018.2843561","volume":"6","author":"H Liu","year":"2018","unstructured":"Liu H, Yao X, Yang T, Ning H (2018) Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J 6(2):1352\u20131362","journal-title":"IEEE Internet Things J"},{"key":"4173_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/jcop.22681","author":"Q Xie","year":"2021","unstructured":"Xie Q, Sundararaj V, Mr R (2021) Analyzing the factors affecting the attitude of public toward lockdown, institutional trust, and civic engagement activities. J Community Psychol. https:\/\/doi.org\/10.1002\/jcop.22681","journal-title":"J Community Psychol"},{"issue":"3","key":"4173_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4018\/IJISMD.2020070102","volume":"11","author":"S Mewada","year":"2020","unstructured":"Mewada S, Gautam SS, Sharma P (2020) Artificial bee colony-based approach for privacy preservation of medical data. Int J Inform Syst Mod Des (IJISMD) 11(3):22\u201339","journal-title":"Int J Inform Syst Mod Des (IJISMD)"},{"issue":"1","key":"4173_CR7","first-page":"38","volume":"8","author":"S Madan","year":"2020","unstructured":"Madan S, Goswami P (2020) A privacy preservation model for big data in map-reduced framework based on k-anonymisation and swarm-based algorithms. Int J Intell Eng Inform 8(1):38\u201353","journal-title":"Int J Intell Eng Inform"},{"key":"4173_CR8","doi-asserted-by":"crossref","unstructured":"Kalia P, Bansal D and Sofat S (2021) Privacy preservation in cloud computing using randomized encoding.\u00a0Wirel Pers Commun, pp.1\u201313","DOI":"10.1007\/s11277-021-08588-9"},{"key":"4173_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03865-7","author":"NA Tu","year":"2021","unstructured":"Tu NA, Wong KS, Demirci MF, Lee YK (2021) Toward efficient and intelligent video analytics with visual privacy protection for large-scale surveillance. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-03865-7","journal-title":"J Supercomput"},{"key":"4173_CR10","doi-asserted-by":"publisher","first-page":"7154705","DOI":"10.1155\/2021\/7154705","volume":"2021","author":"HO Mansour","year":"2021","unstructured":"Mansour HO, Siraj MM, Ghaleb FA, Saeed F, Alkhammash EH, Maarof MA (2021) Quasi-Identifier recognition algorithm for privacy preservation of cloud data based on risk reidentification. Wirel Commun Mob Comput 2021:7154705. https:\/\/doi.org\/10.1155\/2021\/7154705","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"4173_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12065-018-0162-4","volume":"11","author":"MA Alphonsa","year":"2018","unstructured":"Alphonsa MA, Amudhavalli P (2018) Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evol Intel 11(1):101\u2013116","journal-title":"Evol Intel"},{"key":"4173_CR12","doi-asserted-by":"crossref","unstructured":"Wu X, Xu X, Dai F, Gao J, Ji G, and Qi L (2020) An Ensemble of Random Decision Trees with Personalized Privacy Preservation in Edge-Cloud Computing. In:\u00a02020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pp. 779\u2013786. IEEE","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00134"},{"key":"4173_CR13","doi-asserted-by":"crossref","unstructured":"Abdo MA, Abdel-Hamid AA. and Elzouka HA (2020) A Cloud-based Mobile Healthcare Monitoring Framework with Location Privacy Preservation. In:\u00a02020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)\u00a0(pp. 1\u20138). IEEE","DOI":"10.1109\/3ICT51146.2020.9311999"},{"key":"4173_CR14","doi-asserted-by":"crossref","unstructured":"Khatiwada P, Bhusal H, Chatterjee A and Gerdes MW (2020) A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud. In:\u00a02020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)(50308)\u00a0(pp. 40\u201347). IEEE","DOI":"10.1109\/WiMob50308.2020.9253414"},{"key":"4173_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.10.015","author":"D Ahamad","year":"2020","unstructured":"Ahamad D, Hameed SA, Akhtar M (2020) A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J King Saud Univ Comput Inform Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2020.10.015","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"4173_CR16","doi-asserted-by":"publisher","first-page":"103719","DOI":"10.1016\/j.micpro.2020.103719","volume":"81","author":"A Mondal","year":"2021","unstructured":"Mondal A, Goswami RT (2021) Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocess Microsyst 81:103719","journal-title":"Microprocess Microsyst"},{"key":"4173_CR17","doi-asserted-by":"publisher","first-page":"212888","DOI":"10.1109\/ACCESS.2020.3039981","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Wang M, Wang X, Chen G, Wang C (2020) Stateless cloud auditing scheme for non-manager dynamic group data with privacy preservation. IEEE Access 8:212888\u2013212903","journal-title":"IEEE Access"},{"key":"4173_CR18","doi-asserted-by":"publisher","first-page":"101889","DOI":"10.1016\/j.cose.2020.101889","volume":"96","author":"C Fang","year":"2020","unstructured":"Fang C, Guo Y, Wang N, Ju A (2020) Highly efficient federated learning with strong privacy preservation in cloud computing. Comput Secur 96:101889","journal-title":"Comput Secur"},{"key":"4173_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.12.003","author":"R Jayaram","year":"2020","unstructured":"Jayaram R, Prabakaran S (2020) Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system. Egypt Inform J. https:\/\/doi.org\/10.1016\/j.eij.2020.12.003","journal-title":"Egypt Inform J"},{"key":"4173_CR20","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.comcom.2020.04.057","volume":"158","author":"KM Prabha","year":"2020","unstructured":"Prabha KM, Saraswathi PV (2020) Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing. Comput Commun 158:85\u201394","journal-title":"Comput Commun"},{"key":"4173_CR21","first-page":"157","volume":"44","author":"J Mandala","year":"2019","unstructured":"Mandala J, Rao MCS (2019) Privacy preservation of data using crow search with adaptive awareness probability. J Inform Secur Appl 44:157\u2013169","journal-title":"J Inform Secur Appl"},{"key":"4173_CR22","doi-asserted-by":"crossref","unstructured":"Noel MM, Muthiah-Nakarajan V, Amali GB and Trivedi AS (2021) A new biologically inspired global optimization algorithm based on firebug reproductive swarming behaviour.\u00a0Exp Syst Appl, p.115408","DOI":"10.1016\/j.eswa.2021.115408"},{"key":"4173_CR23","doi-asserted-by":"crossref","unstructured":"Karthik E and Sethukarasi T (2021) Sarcastic user behavior classification and prediction from social media data using firebug swarm optimization-based long short-term memory.\u00a0The J Supercomput, pp.1\u201325","DOI":"10.1007\/s11227-021-04028-4"},{"issue":"9","key":"4173_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-020-01608-4","volume":"44","author":"E Sulis","year":"2020","unstructured":"Sulis E, Terna P, Di Leva A, Boella G, Boccuzzi A (2020) Agent-oriented decision support system for business processes management with genetic algorithm optimization: an application in healthcare. J Med Syst 44(9):1\u20137","journal-title":"J Med Syst"},{"key":"4173_CR25","doi-asserted-by":"publisher","first-page":"105884","DOI":"10.1016\/j.asoc.2019.105884","volume":"86","author":"H Chen","year":"2020","unstructured":"Chen H, Zhang Q, Luo J, Xu Y, Zhang X (2020) An enhanced bacterial foraging optimization and its application for training kernel extreme learning machine. Appl Soft Comput 86:105884","journal-title":"Appl Soft Comput"},{"issue":"3","key":"4173_CR26","doi-asserted-by":"crossref","first-page":"e12663","DOI":"10.1111\/exsy.12663","volume":"38","author":"M Shivashankar","year":"2021","unstructured":"Shivashankar M, Mary SA (2021) Privacy preservation of data using modified rider optimization algorithm: optimal data sanitization and restoration model. Exp Syst 38(3):e12663","journal-title":"Exp Syst"},{"key":"4173_CR27","unstructured":"Asaumya (2021) HealthCare Problem: Prediction Stroke Patients,\u00a0Kaggle, 17-Jul-2018. [Online]. Available: https:\/\/www.kaggle.com\/asaumya\/healthcare-problem-prediction-stroke-patients. [Accessed: 20-Oct-2021]"},{"issue":"1","key":"4173_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sdata.2016.35","volume":"3","author":"AE Johnson","year":"2016","unstructured":"Johnson AE, Pollard TJ, Shen L, Li-Wei HL, Feng M, Ghassemi M, Moody B, Szolovits P, Celi LA, Mark RG (2016) MIMIC-III, a freely accessible critical care database. Sci data 3(1):1\u20139","journal-title":"Sci data"},{"key":"4173_CR29","doi-asserted-by":"crossref","unstructured":"Banos O, Garcia R, Holgado-Terriza JA, Damas M, Pomares H, Rojas I, Saez A and Villalonga C (2014) mHealthDroid: a novel framework for agile development of mobile health applications. In:\u00a0International workshop on ambient assisted living. Springer, Cham pp. 91\u201398","DOI":"10.1007\/978-3-319-13105-4_14"},{"key":"4173_CR30","first-page":"11","volume-title":"Evolutionary and swarm intelligence algorithms","author":"JC Bansal","year":"2019","unstructured":"Bansal JC (2019) Particle swarm optimization. Evolutionary and swarm intelligence algorithms. Springer, Cham, pp 11\u201323"},{"key":"4173_CR31","doi-asserted-by":"crossref","unstructured":"Yang XS (2009) Firefly algorithms for multimodal optimization. In:\u00a0International symposium on stochastic algorithms. Springer: Berlin, Heidelberg pp. 169\u2013178","DOI":"10.1007\/978-3-642-04944-6_14"},{"key":"4173_CR32","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"4173_CR33","doi-asserted-by":"publisher","first-page":"199424","DOI":"10.1109\/ACCESS.2020.3032655","volume":"8","author":"V Miranda-L\u00f3pez","year":"2020","unstructured":"Miranda-L\u00f3pez V, Tchernykh A, Babenko M, Avetisyan A, Toporkov V, Drozdov AY (2020) 2Lbp-RRNS: two-levels RRNS with backpropagation for increased reliability and privacy-preserving of secure multi-clouds data storage. IEEE Access 8:199424\u2013199439","journal-title":"IEEE Access"},{"key":"4173_CR34","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"V Sundararaj","year":"2018","unstructured":"Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277\u2013288","journal-title":"Comput Secur"},{"issue":"3","key":"4173_CR35","first-page":"117","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117\u2013126","journal-title":"Int J Intell Eng Syst"},{"issue":"4","key":"4173_CR36","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325","journal-title":"Int J Biomed Eng Technol"},{"issue":"11","key":"4173_CR37","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/pip.3315","volume":"28","author":"V Sundararaj","year":"2020","unstructured":"Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, MR, Rejeesh. and Regu Sundararaj, (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovoltaics Res Appl 28(11):1128\u20131145","journal-title":"Prog Photovoltaics Res Appl"},{"key":"4173_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/rob.22020","author":"S Ravikumar","year":"2021","unstructured":"Ravikumar S, Kavitha D (2021) CNN-OHGS: CNN-oppositional-based Henry gas solubility optimization model for autonomous vehicle control system. J Field Robot. https:\/\/doi.org\/10.1002\/rob.22020","journal-title":"J Field Robot"},{"key":"4173_CR39","doi-asserted-by":"crossref","unstructured":"Ravikumar S and Kavitha D (2020) IoT based home monitoring system with secure data storage by Keccak\u2013Chaotic sequence in cloud server. J Ambient Intell Human Comput pp.1\u201313","DOI":"10.1007\/s12652-020-02424-x"},{"issue":"16","key":"4173_CR40","doi-asserted-by":"publisher","first-page":"22691","DOI":"10.1007\/s11042-019-7577-5","volume":"78","author":"MR Rejeesh","year":"2019","unstructured":"Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691\u201322710","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"4173_CR41","doi-asserted-by":"crossref","first-page":"e4132","DOI":"10.1002\/ett.4132","volume":"32","author":"D Kavitha","year":"2021","unstructured":"Kavitha D, Ravikumar S (2021) IOT and context-aware learning-based optimal neural network model for real-time health monitoring. Trans Emerg Telecommun Technol 32(1):e4132","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4173_CR42","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/ICACC.2013.56","volume-title":"2013 Third International Conference on Advances in Computing and Communications","author":"AC Edwin","year":"2013","unstructured":"Edwin AC, Madheswari AN (2013) Job scheduling and VM provisioning in clouds. In: 2013 Third International Conference on Advances in Computing and Communications. IEEE, pp 261\u2013264"},{"issue":"2","key":"4173_CR43","first-page":"671","volume":"125","author":"SJ Nirmal Kumar","year":"2020","unstructured":"Nirmal Kumar SJ, Ravimaran S, Alam MM (2020) An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing. Comput Model Eng Sci 125(2):671\u2013697","journal-title":"Comput Model Eng Sci"},{"issue":"3","key":"4173_CR44","first-page":"299","volume":"12","author":"MM Gowthul Alam","year":"2017","unstructured":"Gowthul Alam MM, Baulkani S (2017) Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data Min 12(3):299","journal-title":"Int J Bus Intell Data Min"},{"issue":"4","key":"4173_CR45","first-page":"11","volume":"9","author":"MG Alam","year":"2016","unstructured":"Alam MG, Baulkani S (2016) A hybrid approach for web document clustering using K-means and artificial bee colony algorithm. Int J Intell Eng Syst 9(4):11\u201320","journal-title":"Int J Intell Eng Syst"},{"key":"4173_CR46","first-page":"689","volume-title":"2013 Third International Conference on Advances in Computing and Communications","author":"AN Madheswari","year":"2013","unstructured":"Madheswari AN (2013) Performance optimized routing for SLA enforcement in cloud computing. In: 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE). IEEE, pp 689\u2013693"},{"issue":"19","key":"4173_CR47","doi-asserted-by":"publisher","first-page":"29875","DOI":"10.1007\/s11042-021-11123-4","volume":"80","author":"V Sundararaj","year":"2021","unstructured":"Sundararaj V, Selvi M (2021) Opposition grasshopper optimizer based multimedia data distribution using user evaluation strategy. Multimed Tools Appl 80(19):29875\u201329891","journal-title":"Multimed Tools Appl"},{"issue":"37","key":"4173_CR48","doi-asserted-by":"publisher","first-page":"28411","DOI":"10.1007\/s11042-020-09234-5","volume":"79","author":"MR Rejeesh","year":"2020","unstructured":"Rejeesh MR, Thejaswini P (2020) MOTF: multi-objective optimal trilateral filtering based partial moving frame algorithm for image denoising. Multimed Tools Appl 79(37):28411\u201328430","journal-title":"Multimed Tools Appl"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04173-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04173-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04173-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T22:05:34Z","timestamp":1700085934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04173-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4173"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04173-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"25 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent does not apply as this was a retrospective review with no identifying patient information.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}