{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T07:12:16Z","timestamp":1774163536951,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T00:00:00Z","timestamp":1724976000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T00:00:00Z","timestamp":1724976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11227-024-06461-7","type":"journal-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T12:02:27Z","timestamp":1725019347000},"page":"27370-27393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology"],"prefix":"10.1007","volume":"80","author":[{"given":"Ambika","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Suyel","family":"Namasudra","sequence":"additional","affiliation":[]},{"given":"Prabhat","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,30]]},"reference":[{"key":"6461_CR1","doi-asserted-by":"publisher","first-page":"365","DOI":"10.3233\/JCS-210140","volume":"31","author":"RA Chaudhari","year":"2023","unstructured":"Chaudhari RA, Gohil BN, Rao UP (2023) A review on cloud security issues and solutions. J Comput Secur 31:365\u2013391","journal-title":"J Comput Secur"},{"key":"6461_CR2","first-page":"1","volume":"55","author":"SS Abdul-Jabbar","year":"2020","unstructured":"Abdul-Jabbar SS, Aldujaili A, Mohammed SG, Saeed HS (2020) Integrity and security in cloud computing environment: a review. J Southwest Jiaotong Univ 55:1\u201315","journal-title":"J Southwest Jiaotong Univ"},{"key":"6461_CR3","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-319-32467-8_23","volume-title":"Information technology: new generations","author":"S Gupta","year":"2016","unstructured":"Gupta S, Kumar P, Singh JP, Singh MP (2016) Privacy preservation of source location using phantom nodes. In: Latifi S (ed) Information technology: new generations. Springer, New York, pp 247\u2013256"},{"key":"6461_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi11060127","volume":"11","author":"MD Donno","year":"2019","unstructured":"Donno MD, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come from clouds: security of cloud computing in the IoT era. Future Internet 11:1\u201331. https:\/\/doi.org\/10.3390\/fi11060127","journal-title":"Future Internet"},{"key":"6461_CR5","first-page":"1","volume":"1","author":"S Das","year":"2023","unstructured":"Das S, Namasudra S, Deb S, Ger PM, Crespo RG (2023) Securing IoT-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme. IEEE Internet Things J 1:1\u201310","journal-title":"IEEE Internet Things J"},{"key":"6461_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/CC.2013.6723884","volume":"10","author":"L Hongyou","year":"2013","unstructured":"Hongyou L, Jiangyong W, Jian P, Junfeng W, Tang L (2013) Energy-aware scheduling scheme using workload-aware consolidation technique in cloud data centres. China Commun 10:114\u2013124","journal-title":"China Commun"},{"key":"6461_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02158-y","author":"P Kumar","year":"2023","unstructured":"Kumar P, Rahman M, Namasudra S, Moparthi NR (2023) Enhancing security of medical images using deep learning, chaotic map, and hash table. Mob Netw Appl. https:\/\/doi.org\/10.1007\/s11036-023-02158-y","journal-title":"Mob Netw Appl"},{"key":"6461_CR8","first-page":"43","volume":"5","author":"I Dhanoa","year":"2014","unstructured":"Dhanoa I, Khurni S (2014) Energy-efficient virtual machine live migration in cloud data centers. Int J Comput Sci Technol 5:43\u201347","journal-title":"Int J Comput Sci Technol"},{"key":"6461_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.future.2015.02.001","volume":"50","author":"Y Ding","year":"2015","unstructured":"Ding Y, Qin X, Liu L, Wang T (2015) Energy efficient scheduling of virtual machines in cloud with deadline constraint. Future Gener Comput Syst 50:62\u201374","journal-title":"Future Gener Comput Syst"},{"key":"6461_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-81-322-2012-1_5","volume-title":"Intelligent computing, communication and devices","author":"H Allouch","year":"2015","unstructured":"Allouch H, Belkasmi M (2015) Distributed CloudIMS: future-generation network with internet of thing based on distributed cloud computing. In: Jain LC, Patnaik S, Ichalkaranje N (eds) Intelligent computing, communication and devices. Springer, New York, pp 31\u201345"},{"key":"6461_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.14257\/ijgdc.2015.8.5.33","volume":"8","author":"P Kaur","year":"2014","unstructured":"Kaur P, Rani A (2014) Virtual machine migration in cloud computing. Int J Grid Distrib Comput 8:337\u2013342","journal-title":"Int J Grid Distrib Comput"},{"key":"6461_CR12","first-page":"93","volume":"3","author":"V Motru","year":"2015","unstructured":"Motru V, Raja P, Kote A, Rao G, Duvvuru R (2015) A guideline for virtual machine migration algorithm in cloud computing environment. Int J Comput Commun Eng Res 3:93\u201397","journal-title":"Int J Comput Commun Eng Res"},{"key":"6461_CR13","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali M, Khan S, Vasilakos A (2015) Security in cloud computing: opportunities and challenges. Inf Sci 305:357\u2013383","journal-title":"Inf Sci"},{"key":"6461_CR14","doi-asserted-by":"publisher","first-page":"4026","DOI":"10.1109\/TCE.2024.3357115","volume":"70","author":"S Datta","year":"2024","unstructured":"Datta S, Namasudra S (2024) Blockchain-based smart contract model for securing healthcare transactions by using consumer electronics and mobile edge computing. IEEE Trans Consum Electron 70:4026","journal-title":"IEEE Trans Consum Electron"},{"key":"6461_CR15","first-page":"150","volume":"4","author":"P Singh","year":"2013","unstructured":"Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4:150\u2013154","journal-title":"Int J Sci Eng Res"},{"key":"6461_CR16","first-page":"4717","volume":"10","author":"M Saikumar","year":"2015","unstructured":"Saikumar M, Vasanth K (2015) Blowfish encryption algorithm for information security. ARPN J Eng Appl Sci 10:4717\u20134719","journal-title":"ARPN J Eng Appl Sci"},{"key":"6461_CR17","doi-asserted-by":"publisher","first-page":"143","DOI":"10.15623\/ijret.2014.0315026","volume":"3","author":"C Haldankar","year":"2014","unstructured":"Haldankar C, Kuwelkar S (2014) Implementation of AES and blowfish algorithm. Int J Res Eng Technol 3:143\u2013146","journal-title":"Int J Res Eng Technol"},{"key":"6461_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.9790\/0661-162108083","volume":"16","author":"N Valmik","year":"2014","unstructured":"Valmik N, Krshirsagar V (2014) Blowfish algorithm. IOSR J Comput Eng 16:80\u201383","journal-title":"IOSR J Comput Eng"},{"key":"6461_CR19","doi-asserted-by":"crossref","unstructured":"Ali S, Wang J, Bhuiyan M, Jiang H (2018) Secure data provenance in cloud-centric internet of things via blockchain smart contracts. In: IEEE SmartWorld, Guangzhou, pp 991\u2013998","DOI":"10.1109\/SmartWorld.2018.00175"},{"key":"6461_CR20","doi-asserted-by":"publisher","first-page":"14743","DOI":"10.1007\/s10586-018-2387-5","volume":"22","author":"M Niranjanamurthy","year":"2019","unstructured":"Niranjanamurthy M, Nithya BN, Jagannatha S (2019) Analysis of blockchain technology: Pros, cons and SWOT. Clust Comput 22:14743\u201314757","journal-title":"Clust Comput"},{"key":"6461_CR21","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s10207-014-0255-8","volume":"14","author":"N Pitropakis","year":"2014","unstructured":"Pitropakis N, Pikrakis A, Lambrinoudakis C (2014) Behaviour reflects personality: detecting co-residence attacks on xen-based cloud environments. Int J Inf Secur 14:299\u2013305","journal-title":"Int J Inf Secur"},{"key":"6461_CR22","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4018\/IJDCF.2018070102","volume":"10","author":"P Ranjan","year":"2018","unstructured":"Ranjan P, Singh V, Kumar P, Prakash S (2018) Models for the detection of malicious intent people in society. Int J Digit Crime Forensics 10:15\u201322","journal-title":"Int J Digit Crime Forensics"},{"key":"6461_CR23","first-page":"2629","volume":"16","author":"K Sura","year":"2021","unstructured":"Sura K, Khalid D, Mustafa M, Hassan R, Ahmed M (2021) Using energy efficient security technique to protect live virtual machine migration in cloud computing infrastructure. J Eng Sci Technol 16:2629\u20132651","journal-title":"J Eng Sci Technol"},{"key":"6461_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TCC.2017.2709318","volume":"9","author":"Y Hui","year":"2021","unstructured":"Hui Y, Zheng Q, JiXin Z, Ou L, Keqin L (2021) achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data. IEEE Trans Cloud Comput 9:27\u201339","journal-title":"IEEE Trans Cloud Comput"},{"key":"6461_CR25","doi-asserted-by":"publisher","first-page":"333","DOI":"10.17485\/ijst\/2015\/v8iS9\/65589","volume":"8","author":"R Divyambika","year":"2015","unstructured":"Divyambika R, Umamakeswari A (2015) Protection of virtual machines during live migration in cloud environment. Indian J Sci Technol 8:333\u2013339","journal-title":"Indian J Sci Technol"},{"key":"6461_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.heliyon.2019.e02066","volume":"5","author":"M Soltanshahi","year":"2019","unstructured":"Soltanshahi M, Asemi R, Shafiei N (2019) Energy-aware virtual machines allocation by krill herd algorithm in cloud data centers. Heliyon 5:1\u20136","journal-title":"Heliyon"},{"key":"6461_CR27","first-page":"21","volume":"10","author":"Z Mavus","year":"2019","unstructured":"Mavus Z, Ang\u0131n P (2019) A secure model for efficient live migration of containers. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 10:21\u201344","journal-title":"J Wirel Mob Netw Ubiquitous Comput Dependable Appl"},{"key":"6461_CR28","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TCC.2018.2849699","volume":"9","author":"M Dickinson","year":"2021","unstructured":"Dickinson M et al (2021) Multi-cloud performance and security driven federated workflow management. IEEE Trans Cloud Comput 9:240\u2013257","journal-title":"IEEE Trans Cloud Comput"},{"key":"6461_CR29","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.compeleceng.2017.12.032","volume":"69","author":"A Satpathy","year":"2018","unstructured":"Satpathy A, Addya S, Turuk A, Majhi B, Sahoo G (2018) Crow search based virtual machine placement strategy in cloud data centers with live migration. Comput Electr Eng 69:334\u2013350","journal-title":"Comput Electr Eng"},{"key":"6461_CR30","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1109\/COMST.2020.3020092","volume":"22","author":"D Nguyen","year":"2020","unstructured":"Nguyen D, Pathirana P, Ding M, Seneviratne A (2020) Integration of blockchain and cloud of things: architecture, applications and challenges. IEEE Commun Surv Tutor 22:2521\u20132549","journal-title":"IEEE Commun Surv Tutor"},{"key":"6461_CR31","doi-asserted-by":"publisher","first-page":"3374","DOI":"10.1007\/s11227-018-2583-3","volume":"76","author":"K Karthikeyan","year":"2018","unstructured":"Karthikeyan K et al (2018) Energy consumption analysis of VM migration in cloud using hybrid swarm optimization (ABC\u2013BA). J Supercomput 76:3374\u20133390","journal-title":"J Supercomput"},{"key":"6461_CR32","doi-asserted-by":"publisher","first-page":"8319","DOI":"10.1007\/s10586-018-1769-z","volume":"22","author":"M Basset","year":"2019","unstructured":"Basset M, Fatah L, Sangaiah A (2019) An improved Levy based whale optimization algorithm for bandwidth-efficient virtual machine placement in cloud computing environment. Clust Comput 22:8319\u20138334","journal-title":"Clust Comput"},{"key":"6461_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3578364","volume":"20","author":"S Namasudra","year":"2023","unstructured":"Namasudra S, Lorenz P, Kadry S, Bukhari SAC (2023) Introduction to the special issue on DNA-centric modeling and practice for next-generation computing and communication systems. ACM Trans Multim Comput Commun Appl 20:1\u201317","journal-title":"ACM Trans Multim Comput Commun Appl"},{"key":"6461_CR34","doi-asserted-by":"crossref","unstructured":"Basu S, Karmakar S, Bera D (2021) Blockchain-based secured virtual machine image monitor. In: International conference on information systems security and privacy, pp 432\u2013439","DOI":"10.5220\/0010228804320439"},{"key":"6461_CR35","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10772-020-09682-2","volume":"23","author":"S Sutar","year":"2020","unstructured":"Sutar S, Mali P, More A (2020) Resource utilization enhancement through live VM migration in cloud using ant colony optimization algorithm. Int J Speech Technol 23:79\u201385","journal-title":"Int J Speech Technol"},{"key":"6461_CR36","first-page":"1","volume":"54","author":"Z Jinglin","year":"2021","unstructured":"Jinglin Z et al (2021) Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput Surv 54:1\u201336","journal-title":"ACM Comput Surv"},{"key":"6461_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3092521","author":"D Saxena","year":"2021","unstructured":"Saxena D, Gupta I, Kumar J, Singh A, Wen X (2021) A secure and multiobjective virtual machine placement framework for cloud data center. IEEE Syst J. https:\/\/doi.org\/10.1109\/JSYST.2021.3092521","journal-title":"IEEE Syst J"},{"key":"6461_CR38","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1504\/IJWGS.2023.135587","volume":"19","author":"T Kumar","year":"2023","unstructured":"Kumar T, Namasudra S, Kumar P (2023) Providing data security using DNA computing in the cloud computing environment. Int J Web Grid Serv 19:463\u2013486","journal-title":"Int J Web Grid Serv"},{"key":"6461_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3456628","volume":"54","author":"J Zou","year":"2019","unstructured":"Zou J, He D, Kumar N, Wang H, Choo K (2019) Integrated blockchain and cloud computing systems: a systematic survey, solutions, and challenges. ACM Comput Surv 54:1\u20137","journal-title":"ACM Comput Surv"},{"key":"6461_CR40","first-page":"2326","volume":"71","author":"D Kalpanadevi","year":"2022","unstructured":"Kalpanadevi D, Rani MJ, Karuppasamy M (2022) k-out-of-n systems growth study focusing on redundant reliability systems by using heuristic programming approach. Math Stat Eng Appl 71:2326\u20139865","journal-title":"Math Stat Eng Appl"},{"key":"6461_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09319-w","author":"G Verma","year":"2022","unstructured":"Verma G (2022) Secure VM migration in cloud: multi-criteria perspective with improved optimization model. Wirel Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-09319-w","journal-title":"Wirel Pers Commun"},{"key":"6461_CR42","first-page":"1","volume":"80","author":"M Rahman","year":"2024","unstructured":"Rahman M, Murmu A, Kumar P, Rao NM, Namasudra S (2024) A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J Inform Secur Appl 80:1\u201312","journal-title":"J Inform Secur Appl"},{"key":"6461_CR43","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/TCC.2020.2982900","volume":"10","author":"X Gao","year":"2022","unstructured":"Gao X, Xiao J, Wang H, Stavrou A (2022) Understanding the security implication of aborting virtual machine live migration. IEEE Trans Cloud Comput 10:1275\u20131286","journal-title":"IEEE Trans Cloud Comput"},{"key":"6461_CR44","doi-asserted-by":"publisher","unstructured":"Pecholt J, Huber M, Wessel S (2021) Live migration of operating system containers in encrypted virtual machines. In: CCSW '21\u2014proceedings of the 2021 on cloud computing security workshop, pp 125\u2013137. https:\/\/doi.org\/10.1145\/3474123.3486761","DOI":"10.1145\/3474123.3486761"},{"key":"6461_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108152","author":"MSA Khan","year":"2022","unstructured":"Khan MSA, Santhosh R (2022) Hybrid optimization algorithm for VM migration in cloud computing. Comput Electr Eng. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108152","journal-title":"Comput Electr Eng"},{"key":"6461_CR46","first-page":"983","volume":"17","author":"HN Infantia","year":"2023","unstructured":"Infantia HN, Anbuananth C, Kalarani S (2023) An effective process of VM migration with hybrid heuristic-assisted encryption technique for secured data transmission in cloud environment. Intell Decis Technol 17:983\u20131006","journal-title":"Intell Decis Technol"},{"key":"6461_CR47","first-page":"166","volume":"21","author":"G Narayanan","year":"2024","unstructured":"Narayanan G, Kannan S (2024) Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. Int Arab J Inform Technol 21:166\u2013178","journal-title":"Int Arab J Inform Technol"},{"key":"6461_CR48","first-page":"1","volume":"7","author":"H Naeem","year":"2023","unstructured":"Naeem H (2023) Analysis of network security in IoT-based cloud computing using machine learning. Int J Electron Crime Investig 7:1\u201316","journal-title":"Int J Electron Crime Investig"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06461-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06461-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06461-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T09:15:11Z","timestamp":1728033311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06461-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,30]]},"references-count":48,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["6461"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06461-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,30]]},"assertion":[{"value":"14 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}