{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:55:29Z","timestamp":1770227729014,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T00:00:00Z","timestamp":1653004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T00:00:00Z","timestamp":1653004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11227-022-04517-0","type":"journal-article","created":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T21:05:48Z","timestamp":1653080748000},"page":"17559-17593","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining"],"prefix":"10.1007","volume":"78","author":[{"given":"D.","family":"Dhinakaran","sequence":"first","affiliation":[]},{"given":"P. M. Joe","family":"Prathap","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,20]]},"reference":[{"issue":"7","key":"4517_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.9790\/3021-0707011823","volume":"7","author":"HM Al Shorman","year":"2017","unstructured":"Al Shorman HM, Jbara YH (2017) An improved association rule mining algorithm based on Apriori and ant colony approaches. IOSR J Eng 7(7):18\u201323","journal-title":"IOSR J Eng"},{"key":"4517_CR2","first-page":"1","volume":"66","author":"K Arava","year":"2019","unstructured":"Arava K, Lingamgunta S (2019) Adaptive k-anonymity approach for privacy preserving in cloud. Arab J Sci Eng 66:1\u20138","journal-title":"Arab J Sci Eng"},{"key":"4517_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107748","volume":"236","author":"B Balashunmugaraja","year":"2022","unstructured":"Balashunmugaraja B, Ganeshbabu TR (2022) Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm. Knowl Based Syst 236:107748","journal-title":"Knowl Based Syst"},{"issue":"3","key":"4517_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/IJOCI.2020070102","volume":"10","author":"A Derouiche","year":"2020","unstructured":"Derouiche A, Layeb A, Habbas Z (2020) Metaheuristics guided by the apriori principle for association rule mining: case study-CRO metaheuristic. Int J Organ Collect Intell 10(3):14\u201337","journal-title":"Int J Organ Collect Intell"},{"key":"4517_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.08.043","volume":"420","author":"Y Djenouri","year":"2017","unstructured":"Djenouri Y, Comuzzi M (2017) Combining Apriori heuristic and bio-inspired algorithms for solving the frequent itemsets mining problem. Inf Sci 420:1\u201315","journal-title":"Inf Sci"},{"key":"4517_CR6","first-page":"66","volume":"6","author":"M Djoudi","year":"2021","unstructured":"Djoudi M, Kacha L, Zitouni A (2021) KAB: a new k-anonymity approach based on black hole algorithm. J King Saud Univ Comput Inf Sci 6:66","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4517_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113502","volume":"159","author":"Y Fan","year":"2020","unstructured":"Fan Y, Wang P, Heidari AA, Wang M, Zhao X, Chen H, Li C (2020) Boosted hunting-based fruit fly optimization and advances in real-world problems. Expert Syst Appl 159:113502","journal-title":"Expert Syst Appl"},{"key":"4517_CR8","unstructured":"Gartner_Inc. (n.d.) Forecast analysis: information security, worldwide, 2Q18 update. Retrieved from https:\/\/www.gartner.com\/en\/documents\/3889055\/forecast-analysis-information-security-worldwide-2q18-up"},{"issue":"4","key":"4517_CR9","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s00500-018-3124-y","volume":"23","author":"AMM Gowthul","year":"2019","unstructured":"Gowthul AMM, Baulkani S (2019) Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput 23(4):1079\u20131098","journal-title":"Soft Comput"},{"key":"4517_CR10","first-page":"1","volume":"66","author":"BA Hassan","year":"2020","unstructured":"Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl 66:1\u201320","journal-title":"Neural Comput Appl"},{"key":"4517_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2019.105046","volume":"28","author":"BA Hassan","year":"2020","unstructured":"Hassan BA, Rashid TA (2020) Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Brief 28:105046","journal-title":"Data Brief"},{"issue":"5","key":"4517_CR12","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard J, Nepal S (2014) A survey of emerging threats in cybersecurity. J Comput Syst Sci 80(5):973\u2013993","journal-title":"J Comput Syst Sci"},{"key":"4517_CR13","first-page":"66","volume":"6","author":"T Javid","year":"2020","unstructured":"Javid T, Gupta MK, Gupta A (2020) A hybrid-security model for privacy-enhanced distributed data mining. J King Saud Univ Comput Inf Sci 6:66","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"1","key":"4517_CR14","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/TEM.2020.2974210","volume":"68","author":"RH Khokhar","year":"2020","unstructured":"Khokhar RH, Iqbal F, Fung BCM, Bentahar J (2020) Enabling secure trustworthiness assessment and privacy protection in integrating data for trading person-specific information. IEEE Trans Eng Manag 68(1):149\u2013169","journal-title":"IEEE Trans Eng Manag"},{"key":"4517_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"issue":"1","key":"4517_CR16","first-page":"6","volume":"1","author":"TS Patel","year":"2013","unstructured":"Patel TS, Mayur P, Dhara L, Jahnvi K, Piyusha D, Ashish P, Reecha P, Tushar SP, Mayur P, Dhara L (2013) An analytical study of various frequent itemset mining algorithms. Res J Comput IT Sci 1(1):6\u20139","journal-title":"Res J Comput IT Sci"},{"key":"4517_CR17","doi-asserted-by":"crossref","unstructured":"Pramanik MI, Lau RYK, Zhang W (2016) K-anonymity through the enhanced clustering method. In: 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE). IEEE, pp 85\u201391","DOI":"10.1109\/ICEBE.2016.024"},{"key":"4517_CR18","doi-asserted-by":"crossref","unstructured":"Pushpa B (2020) Hybrid data encryption algorithm for secure medical data transmission in cloud environment. In: 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). IEEE, pp 329\u2013334","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00062"},{"key":"4517_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115989","volume":"188","author":"Y Qiao","year":"2022","unstructured":"Qiao Y, Lan Q, Zhou Z, Ma C (2022) Privacy-preserving credit evaluation system based on blockchain. Expert Syst Appl 188:115989","journal-title":"Expert Syst Appl"},{"key":"4517_CR20","doi-asserted-by":"crossref","unstructured":"Rafiei M, van der Aalst WMP (2021) Group-based privacy preservation techniques for process mining. arXiv preprint arXiv:2105.11983","DOI":"10.1016\/j.datak.2021.101908"},{"issue":"1","key":"4517_CR21","first-page":"1075","volume":"8","author":"S Ramesh","year":"2021","unstructured":"Ramesh S, Jayasankar T, Bhavadharini RM, Nagarajan NR, Mani G (2021) Securing medical data using extended role based access control model and twofish algorithms on cloud platform. Eur J Mol Clin Med 8(1):1075\u20131089","journal-title":"Eur J Mol Clin Med"},{"key":"4517_CR22","first-page":"66","volume":"6","author":"Y Ren","year":"2022","unstructured":"Ren Y, Li X, Miao Y, Deng R, Weng J, Ma S, Ma J (2022) DistPreserv: maintaining user distribution for privacy-preserving location-based services. IEEE Trans Mob Comput 6:66","journal-title":"IEEE Trans Mob Comput"},{"key":"4517_CR23","unstructured":"Sobers R (2020) Updated: the likelihood of a cyber attack compared. Inside out security. March 30, 2020. Accessed 9 June 2021. https:\/\/www.varonis.com\/blog\/likelihood-of-a-cyber-attack\/"},{"key":"4517_CR24","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.ins.2020.10.020","volume":"553","author":"L Shabtay","year":"2021","unstructured":"Shabtay L, Fournier-Viger P, Yaari R, Dattner I (2021) A guided FP-Growth algorithm for mining multitude-targeted item-sets and class association rules in imbalanced data. Inf Sci 553:353\u2013375","journal-title":"Inf Sci"},{"issue":"8","key":"4517_CR25","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s00500-019-03857-z","volume":"23","author":"E Shanmugapriya","year":"2019","unstructured":"Shanmugapriya E, Kavitha R (2019) Medical big data analysis: preserving security and privacy with hybrid cloud technology. Soft Comput 23(8):2585\u20132596","journal-title":"Soft Comput"},{"key":"4517_CR26","first-page":"66","volume":"6","author":"Z Shao","year":"2021","unstructured":"Shao Z, Wang H, Zou Y, Gao Z, Lv H (2021) From centralized protection to distributed edge collaboration: a location difference-based privacy-preserving framework for mobile crowdsensing. Secur Commun Netw 6:66","journal-title":"Secur Commun Netw"},{"key":"4517_CR27","unstructured":"Sharif MHU (2021) Privacy preservation of medical data using random decision tree"},{"key":"4517_CR28","doi-asserted-by":"publisher","first-page":"38107","DOI":"10.1109\/ACCESS.2021.3063603","volume":"9","author":"J Sharma","year":"2021","unstructured":"Sharma J, Kim D, Lee A, Seo D (2021) On differential privacy-based framework for enhancing user data privacy in mobile edge computing environment. IEEE Access 9:38107\u201338118","journal-title":"IEEE Access"},{"key":"4517_CR29","unstructured":"Sudrajat AW, Cholid I (2021) Application of the Apriori algorithm and FP-growth to find out the association rule between gender, education level on wages of SMEs workers in Palembang City. In: International Conference Health, Science and Technology (ICOHETECH), pp 170\u2013173"},{"key":"4517_CR30","doi-asserted-by":"publisher","first-page":"152103","DOI":"10.1109\/ACCESS.2019.2947295","volume":"7","author":"Z Sun","year":"2019","unstructured":"Sun Z, Wang Y, Shu M, Liu R, Zhao H (2019) Differential privacy for data and model publishing of medical data. IEEE Access 7:152103\u2013152114","journal-title":"IEEE Access"},{"issue":"3","key":"4517_CR31","first-page":"117","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117\u2013126","journal-title":"Int J Intell Eng Syst"},{"issue":"4","key":"4517_CR32","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325","journal-title":"Int J Biomed Eng Technol"},{"issue":"11","key":"4517_CR33","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/pip.3315","volume":"28","author":"V Sundararaj","year":"2020","unstructured":"Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128\u20131145","journal-title":"Prog Photovolt Res Appl"},{"issue":"5","key":"4517_CR34","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzz Knowl Based Syst"},{"key":"4517_CR35","unstructured":"Van Blarkom GW, Borking JJ, Olk JGE (2003) Handbook of privacy and privacy-enhancing technologies. In: Privacy Incorporated Software Agent (PISA) Consortium, vol 198. The Hague, p 14"},{"issue":"1","key":"4517_CR36","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"S Vinu","year":"2019","unstructured":"Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173\u2013197","journal-title":"Wirel Pers Commun"},{"issue":"2016","key":"4517_CR37","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.knosys.2016.01.006","volume":"97","author":"L Wang","year":"2016","unstructured":"Wang L, Liu R, Liu S (2016) An effective and efficient fruitfly optimization algorithm with level probability policy and its applications. Knowl Based Syst 97(2016):158\u2013174","journal-title":"Knowl Based Syst"},{"issue":"1","key":"4517_CR38","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TCSS.2019.2950017","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Gu M, Ma J, Jin Q (2019) DNN-DP: Differential privacy enabled deep neural network learning framework for sensitive crowdsourcing data. IEEE Trans Comput Soc Syst 7(1):215\u2013224","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"6","key":"4517_CR39","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1109\/TMC.2018.2861765","volume":"18","author":"Z Wang","year":"2018","unstructured":"Wang Z, Pang X, Chen Y, Shao H, Wang Q, Wu L, Chen H, Qi H (2018) Privacy-preserving crowd-sourced statistical data publishing with an untrusted server. IEEE Trans Mob Comput 18(6):1356\u20131367","journal-title":"IEEE Trans Mob Comput"},{"key":"4517_CR40","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","volume":"105","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: limitations, issues and recommendations. Fut Gener Comput Syst 105:581\u2013606","journal-title":"Fut Gener Comput Syst"},{"key":"4517_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub J-PA, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M (2020) Cyber-physical systems security: limitations, issues and future trends. Microprocess Microsyst 77:103201","journal-title":"Microprocess Microsyst"},{"issue":"8","key":"4517_CR42","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2017","unstructured":"Yin C, Xi J, Sun R, Wang J (2017) Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans Ind Inform 14(8):3628\u20133636","journal-title":"IEEE Trans Ind Inform"},{"key":"4517_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103214","volume":"195","author":"H Zhang","year":"2021","unstructured":"Zhang H, Lin L, Xu L, Wang X (2021) Graph partition based privacy-preserving scheme in social networks. J Netw Comput Appl 195:103214","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"4517_CR44","doi-asserted-by":"publisher","first-page":"235","DOI":"10.26599\/TST.2021.9010018","volume":"27","author":"X Zheng","year":"2021","unstructured":"Zheng X, Zhang L, Li K, Zeng X (2021) Efficient publication of distributed and overlapping graph data under differential privacy. Tsinghua Sci Technol 27(2):235\u2013243","journal-title":"Tsinghua Sci Technol"},{"key":"4517_CR45","doi-asserted-by":"crossref","unstructured":"Zhong S, Yang Z, Wright RN (2005) Privacy-enhancing k-anonymization of customer data. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles Of Database Systems, pp 139\u2013147","DOI":"10.1145\/1065167.1065185"}],"updated-by":[{"DOI":"10.1007\/s11227-022-04652-8","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04517-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04517-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04517-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T15:13:29Z","timestamp":1668698009000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04517-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,20]]},"references-count":45,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["4517"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04517-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,20]]},"assertion":[{"value":"8 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2022","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-022-04652-8","URL":"https:\/\/doi.org\/10.1007\/s11227-022-04652-8","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}