{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:06:56Z","timestamp":1775070416901,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11276-024-03891-2","type":"journal-article","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T19:04:37Z","timestamp":1737140677000},"page":"2477-2494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Enhancing data security in the cloud using MECC-SIDH enhanced CL-HPAEKS scheme"],"prefix":"10.1007","volume":"31","author":[{"given":"C. P.","family":"Thamil Selvi","sequence":"first","affiliation":[]},{"given":"R.","family":"Lakshmana Kumar","sequence":"additional","affiliation":[]},{"given":"P.","family":"Punitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"issue":"1","key":"3891_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit, F., Alhomdy, S., Al-Ahdal, A. H., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings, 2(1), 91\u201399.","journal-title":"Global Transitions Proceedings"},{"issue":"2","key":"3891_CR2","first-page":"1867","volume":"13","author":"Y Alemami","year":"2023","unstructured":"Alemami, Y., Al-Ghonmein, A. M., Al-Moghrabi, K. G., & Mohamed, M. A. (2023). Cloud data security and various cryptographic algorithms. International Journal of Electrical and Computer Engineering, 13(2), 1867.","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"3891_CR3","doi-asserted-by":"crossref","unstructured":"Amalarethinam, I. G., & Leena, H. M. (2017). Enhanced RSA algorithm with varying key sizes for data security in cloud. In 2017 World congress on computing and communication technologies (WCCCT) (pp. 172\u2013175). IEEE.","DOI":"10.1109\/WCCCT.2016.50"},{"key":"3891_CR4","doi-asserted-by":"crossref","unstructured":"Puri, N. A., Karare, A. R., & Dharmik, R. C. (2014). Deployment of application on Cloud and enhanced data security in cloud computing using ECC algorithm. In 2014 IEEE international conference on advanced communications, control and computing technologies (pp. 1667\u20131671). IEEE.","DOI":"10.1109\/ICACCCT.2014.7019392"},{"issue":"9","key":"3891_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/11422-6766","volume":"67","author":"A Sachdev","year":"2013","unstructured":"Sachdev, A., & Bhansali, M. (2013). Enhancing cloud computing security using AES algorithm. International Journal of Computer Applications, 67(9), 1\u20135.","journal-title":"International Journal of Computer Applications"},{"key":"3891_CR6","doi-asserted-by":"crossref","unstructured":"Shimbre, N., & Deshpande, P. (2015). Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. In 2015 International conference on computing communication control and automation (pp. 35\u201339). IEEE.","DOI":"10.1109\/ICCUBEA.2015.16"},{"issue":"8","key":"3891_CR7","first-page":"11","volume":"5","author":"SK Singh","year":"2016","unstructured":"Singh, S. K., Manjhi, P. K., & Tiwari, R. K. (2016). Data security using RSA algorithm in cloud computing. International Journal of Advanced Research in Computer and Communication Engineering, 5(8), 11\u201316.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"issue":"2","key":"3891_CR8","first-page":"56","volume":"5","author":"N Attar","year":"2016","unstructured":"Attar, N. (2016). Enhancing data security in the cloud using the proposed algorithm. Advanced Computer Science, 5(2), 56\u201362.","journal-title":"Advanced Computer Science"},{"key":"3891_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ijin.2021.03.001","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit, F., Alhomdy, S., & Jagtap, S. (2021). A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. International Journal of Intelligent Networks, 2, 18\u201333.","journal-title":"International Journal of Intelligent Networks"},{"key":"3891_CR10","doi-asserted-by":"crossref","unstructured":"Somani, U., Lakhani, K., & Mundra, M. (2010). Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In 2010 first international conference on parallel, distributed and grid computing (PDGC 2010) (pp. 211\u2013216). IEEE.","DOI":"10.1109\/PDGC.2010.5679895"},{"issue":"9","key":"3891_CR11","doi-asserted-by":"publisher","first-page":"393","DOI":"10.26483\/ijarcs.v8i9.5042","volume":"8","author":"S Sharma","year":"2017","unstructured":"Sharma, S. (2017). Enhance data security in cloud computing using machine learning and hybrid cryptography techniques. International Journal of Advanced Research in Computer Science, 8(9), 393\u2013397.","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"3891_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01403-1","author":"KR Sajay","year":"2019","unstructured":"Sajay, K. R., Babu, S. S., & Vijayalakshmi, Y. (2019). Enhancing the security of cloud data using hybrid encryption algorithm. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-019-01403-1","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3891_CR13","doi-asserted-by":"crossref","unstructured":"Akhil, K. M., Kumar, M. P., & Pushpa, B. R. (2017). Enhanced cloud data security using AES algorithm. In 2017 International conference on intelligent computing and control (I2C2) (pp. 1\u20135). IEEE.","DOI":"10.1109\/I2C2.2017.8321820"},{"key":"3891_CR14","unstructured":"Belguith, S., Jemai, A., & Attia, R. (2015). Enhancing data security in cloud computing using a lightweight cryptographic algorithm. In 11th International conference on autonomic and autonomous systems (pp. 98\u2013103)."},{"issue":"3","key":"3891_CR15","first-page":"60","volume":"2","author":"SR Lenka","year":"2014","unstructured":"Lenka, S. R., & Nayak, B. (2014). Enhancing data security in cloud computing using RSA encryption and MD5 algorithm. International Journal of Computer Science Trends and Technology, 2(3), 60\u201364.","journal-title":"International Journal of Computer Science Trends and Technology"},{"key":"3891_CR16","doi-asserted-by":"crossref","unstructured":"Thangapandiyan, M., Anand, P. R., & Sankaran, K. S. (2018). Enhanced cloud security implementation using modified ECC algorithm. In 2018 International conference on communication and signal processing (ICCSP) (pp. 1019\u20131022). IEEE.","DOI":"10.1109\/ICCSP.2018.8524212"},{"key":"3891_CR17","doi-asserted-by":"crossref","unstructured":"Mahalle, V. S., & Shahade, A. K. (2014). Enhancing the data security in Cloud by implementing hybrid (RSA & AES) encryption algorithm. In 2014 International conference on power, automation and communication (INPAC) (pp. 146\u2013149). IEEE.","DOI":"10.1109\/INPAC.2014.6981152"},{"issue":"3","key":"3891_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10723-022-09619-w","volume":"20","author":"M Ataei Nezhad","year":"2022","unstructured":"Ataei Nezhad, M., Barati, H., & Barati, A. (2022). An authentication-based secure data aggregation method in internet of things. Journal of Grid Computing, 20(3), 29.","journal-title":"Journal of Grid Computing"},{"key":"3891_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104489","volume":"90","author":"H Barati","year":"2022","unstructured":"Barati, H. (2022). A hierarchical key management method for wireless sensor networks. Microprocessors and Microsystems, 90, 104489.","journal-title":"Microprocessors and Microsystems"},{"issue":"6","key":"3891_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5076","volume":"35","author":"P Alimoradi","year":"2022","unstructured":"Alimoradi, P., Barati, A., & Barati, H. (2022). A hierarchical key management and authentication method for wireless sensor networks. International journal of communication systems, 35(6), e5076.","journal-title":"International journal of communication systems"},{"key":"3891_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109997","volume":"236","author":"SA Khah","year":"2023","unstructured":"Khah, S. A., Barati, A., & Barati, H. (2023). A dynamic and multi-level key management method in wireless sensor networks (WSNs). Computer Networks, 236, 109997.","journal-title":"Computer Networks"},{"key":"3891_CR22","doi-asserted-by":"crossref","unstructured":"Zargar, G. R., Barati, H., & Barati, A. (2024). An authentication mechanism based on blockchain for IoT environment. In Cluster computing (pp. 1\u201317).","DOI":"10.1007\/s10586-024-04565-6"},{"key":"3891_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19379-2","author":"L Khajehzadeh","year":"2024","unstructured":"Khajehzadeh, L., Barati, H., & Barati, A. (2024). A lightweight authentication and authorization method in IoT-based medical care. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-024-19379-2","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"3891_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7959","volume":"36","author":"S Doostani","year":"2024","unstructured":"Doostani, S., Barati, H., & Barati, A. (2024). A lightweight hierarchical method for improving security in the internet of things using fuzzy logic. Concurrency and Computation: Practice and Experience, 36(6), e7959.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"3891_CR25","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2024.2384490","author":"MS Kumar","year":"2024","unstructured":"Kumar, M. S., Purusothaman, T., & Kumar, R. L. (2024). Secure and reliable intrusion detection scheme for software-defined networking using LFTS-RNN and PC-JTFOA. IETE Journal of Research. https:\/\/doi.org\/10.1080\/03772063.2024.2384490","journal-title":"IETE Journal of Research"},{"key":"3891_CR26","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843024500011","author":"P Punitha","year":"2024","unstructured":"Punitha, P., Lakshmana Kumar, R., Revathi, S., Premalatha, R., & Aiswarya, R. S. (2024). Secured framework with a hash function-enabled keyword search in cloud storage services. International Journal of Cooperative Information Systems. https:\/\/doi.org\/10.1142\/S0218843024500011","journal-title":"International Journal of Cooperative Information Systems"},{"issue":"2","key":"3891_CR27","doi-asserted-by":"publisher","first-page":"3245","DOI":"10.3233\/JIFS-233361","volume":"46","author":"R Lakshmana Kumar","year":"2024","unstructured":"Lakshmana Kumar, R., Jayanthi, S., Muthu, B. A., & Sivaparthipan, C. B. (2024). An automatic anomaly application detection system in mobile devices using FL-HTR-DBN and SKLD-SED K means algorithms. Journal of Intelligent and Fuzzy Systems, 46(2), 3245\u20133258.","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"3891_CR28","doi-asserted-by":"crossref","unstructured":"Raipurkar, K. V., & Deorankar, A. V. (2016). Improve data security in cloud environment by using LDAP and two-way encryption algorithm. In 2016 Symposium on colossal data analysis and networking (CDAN) (pp. 1\u20134). IEEE.","DOI":"10.1109\/CDAN.2016.7570934"},{"key":"3891_CR29","doi-asserted-by":"crossref","unstructured":"Goyal, V., & Kant, C. (2018). An effective hybrid encryption algorithm for ensuring cloud data security. In Big data analytics: Proceedings of CSI 2015 (pp. 195\u2013210). Springer Singapore.","DOI":"10.1007\/978-981-10-6620-7_20"},{"issue":"4","key":"3891_CR30","doi-asserted-by":"publisher","first-page":"288","DOI":"10.22247\/ijcna\/2021\/209697","volume":"8","author":"SS Tyagi","year":"2021","unstructured":"Tyagi, S. S. (2021). Enhancing security of cloud data through encryption with AES and Fernet algorithm through convolutional-neural-networks (CNN). International Journal of Computer Networks and Applications, 8(4), 288\u2013299.","journal-title":"International Journal of Computer Networks and Applications"},{"issue":"9","key":"3891_CR31","first-page":"18","volume":"2","author":"VR Pancholi","year":"2016","unstructured":"Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18\u201321.","journal-title":"International Journal for Innovative Research in Science and Technology"},{"key":"3891_CR32","doi-asserted-by":"crossref","unstructured":"Abbas, M. S., Mahdi, S. S., & Hussien, S. A. (2020, April). Security improvement of cloud data using hybrid cryptography and steganography. In 2020 International conference on computer science and software engineering (CSASE) (pp. 123\u2013127). IEEE.","DOI":"10.1109\/CSASE48920.2020.9142072"},{"issue":"4","key":"3891_CR33","doi-asserted-by":"publisher","first-page":"199","DOI":"10.4236\/jis.2019.104012","volume":"10","author":"MA Hossain","year":"2019","unstructured":"Hossain, M. A., Ullah, A., Khan, N. I., & Alam, M. F. (2019). Design and development of a novel symmetric algorithm for enhancing data security in cloud computing. Journal of Information Security, 10(4), 199\u2013236.","journal-title":"Journal of Information Security"},{"key":"3891_CR34","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijin.2022.04.001","volume":"3","author":"F Thabit","year":"2022","unstructured":"Thabit, F., Can, O., Alhomdy, S., Al-Gaphari, G. H., & Jagtap, S. (2022). A novel effective lightweight homomorphic cryptographic algorithm for data security in cloud computing. International Journal of intelligent networks, 3, 16\u201330.","journal-title":"International Journal of intelligent networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03891-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-024-03891-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03891-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T05:11:45Z","timestamp":1742188305000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-024-03891-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["3891"],"URL":"https:\/\/doi.org\/10.1007\/s11276-024-03891-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,17]]},"assertion":[{"value":"11 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}