{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:45:55Z","timestamp":1772027155618,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11227-022-04436-0","type":"journal-article","created":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T17:02:11Z","timestamp":1649610131000},"page":"14892-14918","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["RETRACTED ARTICLE: An improved secure file\n         deduplication avoidance using CKHO based deep learning model in a cloud\n         environment"],"prefix":"10.1007","volume":"78","author":[{"given":"N.","family":"Mageshkumar","sequence":"first","affiliation":[]},{"given":"L.","family":"Lakshmanan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,10]]},"reference":[{"key":"4436_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.34306\/itsdi.v1i2.103","volume":"1","author":"T Alam","year":"2021","unstructured":"Alam T (2021) Cloud computing and its role in the information\n               technology. IAIC Trans Sustain Dig Innov (ITSDI) 1:108\u2013115","journal-title":"IAIC Trans Sustain Dig Innov (ITSDI)"},{"issue":"1","key":"4436_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.4018\/IJARB.2021010105","volume":"11","author":"S Namasudra","year":"2021","unstructured":"Namasudra S (2021) Data access control in the cloud computing\n               environment for bioinformatics. Int J Appl Res Bioinform (IJARB)\n               11(1):40\u201350","journal-title":"Int J Appl Res Bioinform (IJARB)"},{"key":"4436_CR3","doi-asserted-by":"publisher","first-page":"107531","DOI":"10.1016\/j.compeleceng.2021.107531","volume":"96","author":"LJ Xu","year":"2021","unstructured":"Xu LJ, Hao R, Yu J, Vijayakumar P (2021) Secure deduplication for big\n               data with efficient dynamic ownership updates. Comput Elect Eng\n               96:107531","journal-title":"Comput Elect Eng"},{"key":"4436_CR4","unstructured":"Storage O, Appliances NAS, Storage B, Storage ID, Storage IS, SAS DC,\n               Blades T, Storage FC, Storage S (2008) Data deduplication."},{"key":"4436_CR5","doi-asserted-by":"crossref","unstructured":"Storer MW, Greenan K, Long DD, Miller EL (2008) Secure data\n               deduplication. In: Proceedings of the 4th ACM international workshop on Storage\n               security and survivability, pp 1\u201310","DOI":"10.1145\/1456469.1456471"},{"issue":"6","key":"4436_CR6","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2013","unstructured":"Li J, Chen X, Li M, Li J, Lee PP, Lou W (2013) Secure deduplication\n               with efficient and reliable convergent key management. IEEE Trans Parall Distrib Syst\n               25(6):1615\u20131625","journal-title":"IEEE Trans Parall Distrib Syst"},{"key":"4436_CR7","doi-asserted-by":"crossref","unstructured":"Zhou Y, Feng D, Xia W, Fu M, Huang F, Zhang Y, Li C (2015) SecDep: a\n               user-aware efficient fine-grained secure deduplication scheme with multi-level key\n               management. In: Proceedings of the 2015 31st symposium on mass storage systems and\n               technologies (MSST) (pp. 1\u201314). IEEE.","DOI":"10.1109\/MSST.2015.7208297"},{"issue":"3","key":"4436_CR8","doi-asserted-by":"publisher","first-page":"155014772091100","DOI":"10.1177\/1550147720911003","volume":"16","author":"Y Gao","year":"2020","unstructured":"Gao Y, Xian H, Yu A (2020) Secure data deduplication for\n               internet-of-things sensor networks based on threshold dynamic adjustment. Int J\n               Distrib Sens Netw 16(3):1550147720911003","journal-title":"Int J Distrib Sens Netw"},{"key":"4436_CR9","unstructured":"Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES\n               and RSA for security. Glob J Comput Sci Technol"},{"issue":"4","key":"4436_CR10","first-page":"289","volume":"9","author":"R Bhanot","year":"2015","unstructured":"Bhanot R, Hans R (2015) A review and comparative analysis of various\n               encryption algorithms. Int J Sec Appl 9(4):289\u2013306","journal-title":"Int J Sec Appl"},{"issue":"2","key":"4436_CR11","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Abeshu","year":"2018","unstructured":"Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for\n               distributed attack detection in fog-to-things computing. IEEE Commun Mag\n               56(2):169\u2013175","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"4436_CR12","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.1007\/s12083-020-00989-0","volume":"14","author":"SE Ebinazer","year":"2021","unstructured":"Ebinazer SE, Savarimuthu N (2021) An efficient secure data\n               deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud\n               environment. Peer-to-Peer Netw Appl 14(4):2443\u20132451","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4436_CR13","doi-asserted-by":"crossref","unstructured":"Senthil P, Selvakumar S (2021) Digital proof collective model using\n               integrated fusion data modelling. Wireless Person Commun 1\u201314.","DOI":"10.1007\/s11277-021-08713-8"},{"issue":"4","key":"4436_CR14","doi-asserted-by":"publisher","first-page":"3309","DOI":"10.1007\/s11277-020-07989-6","volume":"117","author":"SE Ebinazer","year":"2021","unstructured":"Ebinazer SE, Savarimuthu N, Bhanu SMS (2021) ESKEA: enhanced symmetric\n               key encryption algorithm based secure data storage in cloud networks with data\n               deduplication. Wireless Person Commun 117(4):3309\u20133325","journal-title":"Wireless Person Commun"},{"issue":"1","key":"4436_CR15","first-page":"1","volume":"9","author":"PG Shynu","year":"2020","unstructured":"Shynu PG, Nadesh RK, Menon VG, Venu P, Abbasi M, Khosravi MR (2020) A\n               secure data deduplication system for integrated cloud-edge networks. J Cloud Comput\n               9(1):1\u201312","journal-title":"J Cloud Comput"},{"key":"4436_CR16","doi-asserted-by":"crossref","unstructured":"Zhang G, Xie H, Yang Z, Tao X, Liu W (2021) BDKM: a blockchain-based\n               secure deduplication scheme with reliable key management. Neural Process Lett\n               1\u201318.","DOI":"10.1007\/s11063-021-10450-9"},{"key":"4436_CR17","doi-asserted-by":"publisher","first-page":"103523","DOI":"10.1016\/j.csi.2021.103523","volume":"78","author":"Y Wang","year":"2021","unstructured":"Wang Y, Miao M, Wang J, Zhang X (2021) Secure deduplication with\n               efficient user revocation in cloud storage. Comput Stand Interf\n               78:103523","journal-title":"Comput Stand Interf"},{"issue":"3","key":"4436_CR18","doi-asserted-by":"publisher","first-page":"102510","DOI":"10.1016\/j.ipm.2021.102510","volume":"58","author":"G Zhang","year":"2021","unstructured":"Zhang G, Yang Z, Xie H, Liu W (2021) A secure authorized deduplication\n               scheme for cloud data based on blockchain. Inform Process Manag\n               58(3):102510","journal-title":"Inform Process Manag"},{"key":"4436_CR19","doi-asserted-by":"crossref","unstructured":"Jiang S, Jiang T, Wang L (2017) Secure and efficient cloud data\n               deduplication with ownership management. IEEE Trans Serv Comput","DOI":"10.1109\/TSC.2017.2771280"},{"key":"4436_CR20","doi-asserted-by":"crossref","unstructured":"Bosman E, Razavi K, Bos H, Giuffrida C (2016) Dedup est machina: memory\n               deduplication as an advanced exploitation vector. In: Proceedings of the 2016 IEEE\n               symposium on security and privacy (SP)\u00a0(pp. 987\u20131004). IEEE.","DOI":"10.1109\/SP.2016.63"},{"issue":"7","key":"4436_CR21","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/TCAD.2014.2307002","volume":"33","author":"S Bayat-Sarmadi","year":"2014","unstructured":"Bayat-Sarmadi S, Mozaffari-Kermani M, Reyhani-Masoleh A (2014)\n               Efficient and concurrent reliable realization of the secure cryptographic SHA-3\n               algorithm. IEEE Trans Comput Aided Des Integ Circ Syst\n               33(7):1105\u20131109","journal-title":"IEEE Trans Comput Aided Des Integ Circ Syst"},{"key":"4436_CR22","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A,\n               Venkatraman S (2019) Deep learning approach for intelligent intrusion detection\n               system. IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"},{"issue":"2","key":"4436_CR23","first-page":"865","volume":"16","author":"Y Lv","year":"2014","unstructured":"Lv Y, Duan Y, Kang W, Li Z, Wang FY (2014) Traffic flow prediction with\n               big data: a deep learning approach. IEEE Trans Intell Transp Syst\n               16(2):865\u2013873","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4436_CR24","unstructured":"Wright LG, Onodera T, Stein MM, Wang T, Schachter DT, Hu Z, McMahon PL\n               (2021) Deep physical neural networks enabled by a backpropagation algorithm for\n               arbitrary physical systems. arXiv preprint arXiv:2104.13386."},{"key":"4436_CR25","first-page":"1","volume":"16","author":"A Abdullah","year":"2017","unstructured":"Abdullah A (2017) Advanced encryption standard (AES) algorithm to\n               encrypt and decrypt data. Cryptogr Netw Sec 16:1\u201311","journal-title":"Cryptogr Netw Sec"},{"issue":"12","key":"4436_CR26","doi-asserted-by":"publisher","first-page":"4831","DOI":"10.1016\/j.cnsns.2012.05.010","volume":"17","author":"AH Gandomi","year":"2012","unstructured":"Gandomi AH, Alavi AH (2012) Krill herd: a new bio-inspired optimization\n               algorithm. Commun Nonlinear Sci Numer Simul 17(12):4831\u20134845","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4436_CR27","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.protcy.2013.12.473","volume":"12","author":"S Saremi","year":"2014","unstructured":"Saremi S, Mirjalili SM, Mirjalili S (2014) Chaotic krill herd\n               optimization algorithm. Proced Technol 12:180\u2013185","journal-title":"Proced Technol"},{"issue":"S2","key":"4436_CR28","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1002\/smj.4250151011","volume":"15","author":"D Levy","year":"1994","unstructured":"Levy D (1994) Chaos theory and strategy: theory, application, and\n               managerial implications. Strat Manag J 15(S2):167\u2013178","journal-title":"Strat Manag J"},{"key":"4436_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-021-06159-5","volume":"25","author":"H Bilal","year":"2021","unstructured":"Bilal H, \u00d6zt\u00fcrk F (2021) Rubber bushing optimization by using a novel\n               chaotic krill herd optimization algorithm. Soft Comput 25:1\u201323","journal-title":"Soft Comput"},{"key":"4436_CR30","doi-asserted-by":"crossref","unstructured":"Wang HG, Chen KF, Qin BD, Wang LL (2015) Randomized convergent\n               encryption in the standard model via UCEs. In: Proceedings of the 2015 international\n               conference on computer science and applications (CSA), pp. 298\u2013302\n               IEEE.","DOI":"10.1109\/CSA.2015.43"},{"key":"4436_CR31","doi-asserted-by":"crossref","unstructured":"Jayapandian N, Md Zubair Rahman AMJ (2018) Secure deduplication for\n               cloud storage using interactive message-locked encryption with convergent encryption,\n               to reduce storage space. Brazil Arch Biol Technol 61.","DOI":"10.1590\/1678-4324-2017160609"},{"key":"4436_CR32","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-981-10-3174-8_27","volume-title":"Artificial intelligence and evolutionary computations in engineering systems","author":"N Dinesh","year":"2017","unstructured":"Dinesh N, Juvanna I (2017) Dynamic auditing and deduplication with\n               secure data deletion in Cloud. Artificial intelligence and evolutionary computations\n               in engineering systems. Springer, Singapore, pp 305\u2013313"},{"issue":"7","key":"4436_CR33","doi-asserted-by":"publisher","first-page":"5161","DOI":"10.1007\/s11042-018-6339-0","volume":"79","author":"D Praveena","year":"2020","unstructured":"Praveena D, Rangarajan P (2020) A machine learning application for\n               reducing the security risks in hybrid cloud networks. Multim Tools Appl\n               79(7):5161\u20135173","journal-title":"Multim Tools Appl"},{"issue":"1","key":"4436_CR34","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/s10586-017-1382-6","volume":"22","author":"E Daniel","year":"2019","unstructured":"Daniel E, Vasanthi NA (2019) LDAP: lightweight deduplication and\n               auditing protocol for secure data storage in a cloud environment. Cluster Comput\n               22(1):1247\u20131258","journal-title":"Cluster Comput"},{"key":"4436_CR35","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"V Sundararaj","year":"2018","unstructured":"Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster\n               formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy\n               traffic load in wireless sensor networks. Comput Sec 77:277\u2013288","journal-title":"Comput Sec"},{"key":"4436_CR36","doi-asserted-by":"crossref","unstructured":"Ravikumar S, Kavitha D (2020) IoT based home monitoring system with\n               secure data storage by Keccak\u2013Chaotic sequence in cloud server. J Ambient Intell Hum\n               Comput 1\u201313.","DOI":"10.1007\/s12652-020-02424-x"},{"key":"4436_CR37","doi-asserted-by":"crossref","unstructured":"Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for\n               practical application problems. Neural Comput Appl 1\u201320","DOI":"10.1007\/s00521-020-05474-6"},{"issue":"3","key":"4436_CR38","first-page":"117","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj V (2016) An efficient threshold prediction scheme for\n               wavelet based ECG signal noise reduction using variable step size firefly algorithm.\n               Int J Intell Eng Syst 9(3):117\u2013126","journal-title":"Int J Intell Eng Syst"},{"issue":"4","key":"4436_CR39","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj V (2019) Optimised denoising scheme via opposition-based\n               self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction.\n               Int J Biomed Eng Technol 31(4):325","journal-title":"Int J Biomed Eng Technol"},{"issue":"11","key":"4436_CR40","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/pip.3315","volume":"28","author":"V Sundararaj","year":"2020","unstructured":"Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P,\n               Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based\n               global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl\n               28(11):1128\u20131145","journal-title":"Prog Photovolt Res Appl"},{"key":"4436_CR41","doi-asserted-by":"crossref","unstructured":"Ravikumar S, Kavitha D (2021) CNN\u2010OHGS: CNN\u2010oppositional\u2010based Henry\n               gas solubility optimization model for autonomous vehicle control system. J Field\n               Robot","DOI":"10.1002\/rob.22020"},{"issue":"16","key":"4436_CR42","doi-asserted-by":"publisher","first-page":"22691","DOI":"10.1007\/s11042-019-7577-5","volume":"78","author":"MR Rejeesh","year":"2019","unstructured":"Rejeesh MR (2019) Interest point based face recognition using adaptive\n               neuro fuzzy inference system. Multimed Tools Appl\n               78(16):22691\u201322710","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"4436_CR43","doi-asserted-by":"publisher","first-page":"e4132","DOI":"10.1002\/ett.4132","volume":"32","author":"D Kavitha","year":"2021","unstructured":"Kavitha D, Ravikumar S (2021) IOT and context-aware learning-based\n               optimal neural network model for real-time health monitoring. Trans Emerg Telecommun\n               Technol 32(1):e4132","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4436_CR44","doi-asserted-by":"publisher","first-page":"105046","DOI":"10.1016\/j.dib.2019.105046","volume":"28","author":"BA Hassan","year":"2020","unstructured":"Hassan BA, Rashid TA (2020) Datasets on statistical analysis and\n               performance evaluation of backtracking search optimisation algorithm compared with\n               its counterpart algorithms. Data Brief 28:105046","journal-title":"Data Brief"},{"key":"4436_CR45","doi-asserted-by":"crossref","unstructured":"Hassan BA, Rashid TA, Mirjalili S (2021) Formal context reduction in\n               deriving concept hierarchies from corpora using adaptive evolutionary clustering\n               algorithm star. Compl Intell Syst 1\u201316.","DOI":"10.1007\/s40747-021-00422-w"},{"key":"4436_CR46","unstructured":"Alam MG (2021) A new hybrid approach for data clustering analysis using\n               hybrid fuzzy C-means and fuzzy particle swarm optimization. Des Eng\n               480\u2013492."},{"issue":"3","key":"4436_CR47","first-page":"299","volume":"12","author":"MM GowthulAlam","year":"2017","unstructured":"GowthulAlam MM, Baulkani S (2017) Reformulated query-based document\n               retrieval using optimised kernel fuzzy clustering algorithm. Int J Bus Intell Data\n               Min 12(3):299","journal-title":"Int J Bus Intell Data Min"},{"issue":"4","key":"4436_CR48","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s00500-018-3124-y","volume":"23","author":"MM GowthulAlam","year":"2019","unstructured":"GowthulAlam MM, Baulkani S (2019) Geometric structure information based\n               multi-objective function to increase fuzzy clustering performance with artificial and\n               real-life data. Soft Comput 23(4):1079\u20131098","journal-title":"Soft Comput"}],"updated-by":[{"DOI":"10.1007\/s11227-024-06360-x","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"record-id":"62418"},{"DOI":"10.1007\/s11227-024-06360-x","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04436-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04436-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04436-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T16:16:53Z","timestamp":1721060213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04436-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,10]]},"references-count":48,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["4436"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04436-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,10]]},"assertion":[{"value":"7 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2024","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-024-06360-x","URL":"https:\/\/doi.org\/10.1007\/s11227-024-06360-x","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}