{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:23:59Z","timestamp":1772025839974,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T00:00:00Z","timestamp":1517184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T00:00:00Z","timestamp":1517184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-018-5334-0","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T11:25:24Z","timestamp":1517225124000},"page":"3159-3170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RETRACTED ARTICLE: Data Analysis and Processing of Massive Network Traffic Based on Cloud Computing and Research on Its Key Algorithms"],"prefix":"10.1007","volume":"102","author":[{"given":"Ying","family":"Zou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,29]]},"reference":[{"issue":"2","key":"5334_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MITP.2013.26","volume":"15","author":"I Bojanova","year":"2013","unstructured":"Bojanova, I., Zhang, J., & Voas, J. (2013). Cloud computing. It Professional,15(2), 12\u201314.","journal-title":"It Professional"},{"issue":"6","key":"5334_CR2","first-page":"50","volume":"53","author":"SP Nist","year":"2015","unstructured":"Nist, S. P. (2015). A NIST definition of cloud computing. Communications of the ACM,53(6), 50.","journal-title":"Communications of the ACM"},{"issue":"C","key":"5334_CR3","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., Donato, W. D., & Persico, V. (2016). Integration of Cloud computing and Internet of Things. Future Generation Computer Systems,56(C), 684\u2013700.","journal-title":"Future Generation Computer Systems"},{"issue":"s1\u20136","key":"5334_CR4","first-page":"238","volume":"7","author":"J Sen","year":"2016","unstructured":"Sen, J. (2016). Security and privacy issues in cloud computing. International Journal of Grid & Distributed Computing,7(s1\u20136), 238\u2013252.","journal-title":"International Journal of Grid & Distributed Computing"},{"issue":"4","key":"5334_CR5","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","volume":"29","author":"SK Garg","year":"2013","unstructured":"Garg, S. K., Buyya, R., et al. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems,29(4), 1012\u20131023.","journal-title":"Future Generation Computer Systems"},{"issue":"3\u20134","key":"5334_CR6","first-page":"109","volume":"5","author":"J Shi","year":"2013","unstructured":"Shi, J., Li, H., & Zhou, L. (2013). The technical security issues in cloud computing. International Journal of Information and Communication Technology,5(3\u20134), 109\u2013116.","journal-title":"International Journal of Information and Communication Technology"},{"issue":"1","key":"5334_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D. G., Fern\u00e1ndez-Medina, E., et al. (2013). An analysis of security issues for cloud computing. Journal of Internet Services & Applications,4(1), 5.","journal-title":"Journal of Internet Services & Applications"},{"issue":"7","key":"5334_CR8","first-page":"1","volume":"4","author":"J Li","year":"2014","unstructured":"Li, J., Wang, Q., Wang, C., et al. (2014). Fuzzy Keyword Search over Encrypted Data in Cloud Computing. International Journal of Engineering Research and Applications,4(7), 1\u20135.","journal-title":"International Journal of Engineering Research and Applications"},{"issue":"C","key":"5334_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem, I. A. T., Yaqoob, I., Anuar, N. B., et al. (2015). The rise of \u201cbig data\u201d on cloud computing: Review and open research issues. Information Systems,47(C), 98\u2013115.","journal-title":"Information Systems"},{"issue":"9","key":"5334_CR10","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., & Jia, X. (2013). An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. IEEE Transactions on Parallel and Distributed Systems,24(9), 1717\u20131726.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"5334_CR11","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"Z Xiao","year":"2013","unstructured":"Xiao, Z., & Xiao, Y. (2013). Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials,15(2), 843\u2013859.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"5334_CR12","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1016\/j.future.2012.08.003","volume":"29","author":"AN Khan","year":"2013","unstructured":"Khan, A. N., Kiah, M. L. M., Khan, S. U., et al. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems,29(5), 1278\u20131299.","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"5334_CR13","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1016\/j.jbi.2013.07.001","volume":"46","author":"A O\u2019Driscoll","year":"2013","unstructured":"O\u2019Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). \u2018Big data\u2019, Hadoop and cloud computing in genomics. Journal of Biomedical Informatics,46(5), 774\u2013781.","journal-title":"Journal of Biomedical Informatics"},{"issue":"5","key":"5334_CR14","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","volume":"33","author":"P Gupta","year":"2013","unstructured":"Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management,33(5), 861\u2013874.","journal-title":"International Journal of Information Management"},{"issue":"11","key":"5334_CR15","first-page":"1","volume":"215","author":"J Melorose","year":"2015","unstructured":"Melorose, J., Perroy, R., & Careas, S. (2015). Hadoop definitive guide. O\u2019reilly Media Inc Gravenstein Highway North,215(11), 1\u20134.","journal-title":"O\u2019reilly Media Inc Gravenstein Highway North"}],"updated-by":[{"DOI":"10.1007\/s11277-022-10137-x","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T00:00:00Z","timestamp":1670889600000},"record-id":"42559"},{"DOI":"10.1007\/s11277-022-10137-x","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T00:00:00Z","timestamp":1670889600000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-018-5334-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5334-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5334-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T14:12:31Z","timestamp":1678457551000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-018-5334-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,29]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5334"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5334-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,29]]},"assertion":[{"value":"29 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11277-022-10137-x","URL":"https:\/\/doi.org\/10.1007\/s11277-022-10137-x","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}