{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:14:12Z","timestamp":1774127652545,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11276-024-03843-w","type":"journal-article","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T15:30:17Z","timestamp":1731684617000},"page":"1959-1973","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy based trust model for cloud access control classification mechanism using ghost net architecture"],"prefix":"10.1007","volume":"31","author":[{"given":"D.","family":"Kalaiyarasi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. Priscilla","family":"Joy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. Victor","family":"Jose","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Sridhar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,15]]},"reference":[{"key":"3843_CR1","doi-asserted-by":"publisher","DOI":"10.1177\/1847979019897444","author":"P Sun","year":"2020","unstructured":"Sun, P. (2020). Research on cloud computing service based on trust access control. International Journal of Engineering Business Management. https:\/\/doi.org\/10.1177\/1847979019897444","journal-title":"International Journal of Engineering Business Management"},{"key":"3843_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-1-4842-8236-6_2","volume-title":"Cloud Attack Vector","author":"MJ Haber","year":"2022","unstructured":"Haber, M. J., Chappell, B., & Hills, C. (2022). Cloud computing. Cloud Attack Vector (pp. 9\u201325). Berkeley: Apress."},{"issue":"4","key":"3843_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398036","volume":"53","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Deng, R. H., Xu, S., Sun, J., Li, Q., & Zheng, D. (2020). Attribute-based encryption for cloud computing access control: A survey. ACM Computing Surveys (CSUR), 53(4), 1\u201341. https:\/\/doi.org\/10.1145\/3398036","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"3843_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","volume":"75","author":"S Singh","year":"2016","unstructured":"Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200\u2013222. https:\/\/doi.org\/10.1016\/j.jnca.2016.09.002","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"3843_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/tcc.2015.2469662","volume":"5","author":"Z Yan","year":"2015","unstructured":"Yan, Z., Li, X., Wang, M., & Vasilakos, A. V. (2015). Flexible data access control based on trust and reputation in cloud computing. IEEE Transactions on Cloud Computing, 5(3), 485\u2013498. https:\/\/doi.org\/10.1109\/tcc.2015.2469662","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"4","key":"3843_CR6","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.ijinfomgt.2016.03.005","volume":"36","author":"M Ramachandran","year":"2016","unstructured":"Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618\u2013625. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.03.005","journal-title":"International Journal of Information Management"},{"issue":"2","key":"3843_CR7","doi-asserted-by":"publisher","first-page":"e3720","DOI":"10.1002\/ett.3720","volume":"31","author":"R El Sibai","year":"2020","unstructured":"El Sibai, R., Gemayel, N., Bou Abdo, J., & Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies, 31(2), e3720. https:\/\/doi.org\/10.1002\/ett.3720","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"12","key":"3843_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/cc.2015.7385527","volume":"12","author":"S Tu","year":"2015","unstructured":"Tu, S., & Huang, Y. (2015). Towards efficient and secure access control system for mobile cloud computing. China Communications, 12(12), 43\u201352. https:\/\/doi.org\/10.1109\/cc.2015.7385527","journal-title":"China Communications"},{"key":"3843_CR9","doi-asserted-by":"publisher","first-page":"86384","DOI":"10.1109\/access.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access, 7, 86384\u201386393. https:\/\/doi.org\/10.1109\/access.2019.2926354","journal-title":"IEEE Access"},{"issue":"3","key":"3843_CR10","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/tifs.2015.2493983","volume":"11","author":"JK Liu","year":"2015","unstructured":"Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2015). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484\u2013497. https:\/\/doi.org\/10.1109\/tifs.2015.2493983","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"3843_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-019-0188-3","volume":"9","author":"WB Daoud","year":"2019","unstructured":"Daoud, W. B., Obaidat, M. S., Meddeb-Makhlouf, A., Zarai, F., & Hsiao, K. F. (2019). TACRM: Trust access control and resource management mechanism in fog computing. Human-centric Computing and Information Sciences, 9(1), 1\u201318. https:\/\/doi.org\/10.1186\/s13673-019-0188-3","journal-title":"Human-centric Computing and Information Sciences"},{"key":"3843_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-030-03359-0_3","volume-title":"Cloud Computing for Geospatial Big Data Analytics","author":"PM Khilar","year":"2019","unstructured":"Khilar, P. M., Chaudhari, V., & Swain, R. R. (2019). Trust-based access control in cloud computing using machine learning. Cloud Computing for Geospatial Big Data Analytics (pp. 55\u201379). Cham: Springer."},{"key":"3843_CR13","doi-asserted-by":"publisher","first-page":"101722","DOI":"10.1016\/j.cose.2020.101722","volume":"91","author":"PS Challagidad","year":"2020","unstructured":"Challagidad, P. S., & Birje, M. N. (2020). multi-dimensional dynamic trust evaluation scheme for cloud environment. Computers & Security, 91, 101722. https:\/\/doi.org\/10.1016\/j.cose.2020.101722","journal-title":"Computers & Security"},{"key":"3843_CR14","doi-asserted-by":"publisher","unstructured":"Putra, G. D., Dedeoglu, V., Kanhere, S. S., & Jurdak, R. (2020). Trust management in decentralized iot access control system. In: 2020 IEEE international conference on blockchain and cryptocurrency (ICBC), IEEE, pp 1\u20139. https:\/\/doi.org\/10.1109\/icbc48266.2020.9169481.","DOI":"10.1109\/icbc48266.2020.9169481"},{"issue":"3","key":"3843_CR15","doi-asserted-by":"publisher","first-page":"492","DOI":"10.3390\/sym13030492","volume":"13","author":"ST Alshammari","year":"2021","unstructured":"Alshammari, S. T., Albeshri, A., & Alsubhi, K. (2021). Integrating a high-reliability multicriteria trust evaluation model with task role-based access control for cloud services. Symmetry, 13(3), 492. https:\/\/doi.org\/10.3390\/sym13030492","journal-title":"Symmetry"},{"key":"3843_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4651205","author":"S Pan Jun","year":"2020","unstructured":"Pan Jun, S. (2020). A trust-game-based access control model for cloud service. Mobile Information Systems. https:\/\/doi.org\/10.1155\/2020\/4651205","journal-title":"Mobile Information Systems"},{"issue":"5","key":"3843_CR17","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s12083-021-01162-x","volume":"14","author":"M Masud","year":"2021","unstructured":"Masud, M., Gaba, G. S., Choudhary, K., Alroobaea, R., & Hossain, M. S. (2021). A robust and lightweight secure access scheme for cloud-based E-healthcare services. Peer-to-peer Networking and Applications, 14(5), 3043\u20133057. https:\/\/doi.org\/10.1007\/s12083-021-01162-x","journal-title":"Peer-to-peer Networking and Applications"},{"key":"3843_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6629449","author":"M Soleymani","year":"2021","unstructured":"Soleymani, M., Abapour, N., Taghizadeh, E., Siadat, S., & Karkehabadi, R. (2021). Fuzzy rule-based trust managemen model for the security of cloud computing. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2021\/6629449","journal-title":"Mathematical Problems in Engineering"},{"issue":"4","key":"3843_CR19","doi-asserted-by":"publisher","first-page":"3281","DOI":"10.1007\/s11277-021-08876-4","volume":"121","author":"AK Jaithunbi","year":"2021","unstructured":"Jaithunbi, A. K., Sabena, S., & SaiRamesh, L. (2021). Trust evaluation of public cloud service providers using genetic algorithm with intelligent rules. Wireless Personal Communications, 121(4), 3281\u20133295. https:\/\/doi.org\/10.1007\/s11277-021-08876-4","journal-title":"Wireless Personal Communications"},{"key":"3843_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-030-80821-1_5","volume-title":"Artificial Intelligence for Cloud and Edge Computing","author":"O Alabi","year":"2022","unstructured":"Alabi, O., Gabriel, A. J., Thompson, A., & Alese, B. K. (2022). Privacy and trust models for cloud-based EHRs using multilevel cryptography and artificial intelligence. Artificial Intelligence for Cloud and Edge Computing (pp. 91\u2013113). Cham: Springer."},{"key":"3843_CR21","doi-asserted-by":"publisher","unstructured":"Thejas, G. S., Pramod, T. C., Iyengar, S. S., & Sunitha, N. R. (2017). Intelligent access control: A self-adaptable trust-based access control (SATBAC) framework using game theory strategy. In: International Symposium on Sensor Networks, Systems and Security, Springer, Cham, pp 97\u2013111. https:\/\/doi.org\/10.1007\/978-3-319-75683-7_7.","DOI":"10.1007\/978-3-319-75683-7_7"},{"key":"3843_CR22","doi-asserted-by":"publisher","unstructured":"Gwak, B., Cho, J. H., Lee, D., & Son, H. (2018). Taras: Trust-aware role-based access control system in public internet-of-things. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), IEEE, pp 74\u201385. https:\/\/doi.org\/10.1109\/trustcom\/bigdatase.2018.00022.","DOI":"10.1109\/trustcom\/bigdatase.2018.00022"},{"key":"3843_CR23","doi-asserted-by":"publisher","unstructured":"Huang, L., Xiong, Z., & Wang, G. (2016). A trust-role access control model facing cloud computing. In: 2016 35th Chinese Control Conference (CCC), IEEE, pp 5239\u20135242. https:\/\/doi.org\/10.1109\/chicc.2016.7554170.","DOI":"10.1109\/chicc.2016.7554170"},{"issue":"01","key":"3843_CR24","first-page":"11","volume":"01","author":"A Agasthian","year":"2023","unstructured":"Agasthian, A., Pamula, R., & Kumaraswamidhas, L. A. (2023). Integration of monitoring and security based deep learning network for wind turbine system. International Journal of System Design and Computing, 01(01), 11\u201317.","journal-title":"International Journal of System Design and Computing"},{"key":"3843_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.comnet.2019.01.028","volume":"151","author":"E Fenil","year":"2019","unstructured":"Fenil, E., Manogaran, G., Vivekananda, G. N., Thanjaivadivel, T., Jeeva, S., & Ahilan, A. J. C. N. (2019). Real time violence detection framework for football stadium comprising of big data analysis and deep learning through bidirectional LSTM. Computer Networks, 151, 191\u2013200. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.028","journal-title":"Computer Networks"},{"issue":"01","key":"3843_CR26","first-page":"01","volume":"02","author":"K Paul Joshua","year":"2024","unstructured":"Paul Joshua, K., & Jenice Prabhu, A. (2024). efficient data search and retrieval in cloud assisted Iot environment. International Journal of Data Science and Artificial Intelligence, 02(01), 01\u201306.","journal-title":"International Journal of Data Science and Artificial Intelligence"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03843-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-024-03843-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03843-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T21:48:03Z","timestamp":1739569683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-024-03843-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,15]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["3843"],"URL":"https:\/\/doi.org\/10.1007\/s11276-024-03843-w","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,15]]},"assertion":[{"value":"15 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper has no conflict of interest for publishing.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"My research guide reviewed and ethically approved this manuscript for publishing in this Journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"I certify that I have explained the nature and purpose of this study to the above-named individual, and I have discussed the potential benefits of this study participation. The questions the individual had about this study have been answered, and we will always be available to address future questions.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}