{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:24:27Z","timestamp":1771856667207,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T00:00:00Z","timestamp":1592611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T00:00:00Z","timestamp":1592611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07613-7","type":"journal-article","created":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T09:02:33Z","timestamp":1592643753000},"page":"1107-1135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA"],"prefix":"10.1007","volume":"115","author":[{"given":"Balasubramanian","family":"Prabhu Kavin","sequence":"first","affiliation":[]},{"given":"Sannasi","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"U.","family":"Kanimozhi","sequence":"additional","affiliation":[]},{"given":"Arputharaj","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,20]]},"reference":[{"issue":"1","key":"7613_CR1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/69.485637","volume":"8","author":"E Bertino","year":"1996","unstructured":"Bertino, E., Bettini, C., Ferrari, E., & Samarati, P. (1996). A temporal access control mechanism for database systems. IEEE Transactions on Knowledge and Data Engineering, 8(1), 67\u201380.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"9","key":"7613_CR2","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1109\/71.722223","volume":"9","author":"M Naor","year":"1998","unstructured":"Naor, M., & Wool, A. (1998). Access control and signatures via quorum secret sharing. IEEE Transactions on Parallel and Distributed Systems, 9(9), 909\u2013922.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"5","key":"7613_CR3","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1109\/TC.2016.2629510","volume":"66","author":"S Patranabis","year":"2017","unstructured":"Patranabis, S., Shrivastava, Y., & Mukhopadhyay, D. (2017). Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE Transactions on Computers, 66(5), 891\u2013904.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"7613_CR4","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1109\/TDSC.2008.12","volume":"6","author":"G Qijun","year":"2009","unstructured":"Qijun, G., Liu, P., Lee, W.-C., & Chu, C.-H. (2009). KTR: An efficient key management scheme for secure data access control in wireless broadcast services. IEEE Transactions on Dependable and Secure Computing, 6(3), 188\u2013201.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"7613_CR5","doi-asserted-by":"crossref","first-page":"1353","DOI":"10.1109\/TMM.2013.2250493","volume":"15","author":"Zhiguo Wan","year":"2013","unstructured":"Wan, Zhiguo, Liu, J., Zhang, R., & Deng, R. H. (2013). A collusion-resistant conditional access system for flexible-pay-per-channel pay-TV broadcasting. IEEE Transactions on Multimedia, 15(6), 1353\u20131364.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"7613_CR6","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1109\/TIFS.2015.2493983","volume":"11","author":"JK Liu","year":"2016","unstructured":"Liu, J. K., Au, M. H., Huang, X., Lu, R., & Li, J. (2016). Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security, 11(3), 484\u2013497.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"7613_CR7","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/TST.2016.7399282","volume":"21","author":"X Ye","year":"2016","unstructured":"Ye, X. (2016). Privacy preserving and delegated access control for cloud applications. Tsinghua Science and Technology, 21(1), 40\u201354.","journal-title":"Tsinghua Science and Technology"},{"issue":"4","key":"7613_CR8","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Li, J., et al. (2016). Hierarchical and shared access control. IEEE Transactions on Information Forensics and Security, 11(4), 850\u2013865.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7613_CR9","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.comnet.2019.01.032","volume":"151","author":"BP Kavin","year":"2019","unstructured":"Kavin, B. P., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT based applications. Computer Networks, 151, 181\u2013190.","journal-title":"Computer Networks"},{"issue":"4","key":"7613_CR10","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s40009-018-0658-6","volume":"41","author":"S Muthurajkumar","year":"2018","unstructured":"Muthurajkumar, S., Vijayalakshmi, M., Kannan, A., & Ganapathy, S. (2018). Optimal and energy efficient scheduling techniques for resource management in public cloud networks. National Academy Science Letters, 41(4), 219\u2013223.","journal-title":"National Academy Science Letters"},{"key":"7613_CR11","doi-asserted-by":"crossref","unstructured":"Kavin, B. P., Ganapathy, S., & Karman, A. (2018). An intelligent task scheduling approach for cloud using IPSO and A* search algorithm. In 2018 eleventh international conference on contemporary computing (IC3) (pp. 1\u20135).","DOI":"10.1109\/IC3.2018.8530545"},{"issue":"4","key":"7613_CR12","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1504\/IJCNDS.2018.092147","volume":"20","author":"K Thangaramya","year":"2018","unstructured":"Thangaramya, K., Ganapathy, S., Sairamesh, L., Kulothungan, K., & Arputharaj, K. (2018). Data anonymisation of vertically partitioned data using map reduce techniques on cloud. International Journal of Communication Networks and Distributed Systems, 20(4), 519\u2013531.","journal-title":"International Journal of Communication Networks and Distributed Systems"},{"issue":"Sp-14","key":"7613_CR13","first-page":"2764","volume":"9","author":"S Padmanabhan","year":"2017","unstructured":"Padmanabhan, S., Sumathi, V., & Ganapathy, S. (2017). Cloud based POS system for secured smart shopping CART using RFID. Journal of Advanced Research in Dynamical and Control Systems, 9(Sp-14), 2764\u20132777.","journal-title":"Journal of Advanced Research in Dynamical and Control Systems"},{"key":"7613_CR14","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.procs.2015.02.098","volume":"46","author":"S Muthurajkumar","year":"2015","unstructured":"Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2015). Secured temporal log management techniques for cloud. Procedia Computer Science, 46, 589\u2013595.","journal-title":"Procedia Computer Science"},{"key":"7613_CR15","doi-asserted-by":"crossref","unstructured":"Muthurajkumar, S., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2015). Agent based intelligent approach for the malware detection for infected cloud data storage files. In 2015 seventh international conference on advanced computing (ICoAC) (pp. 1\u20135).","DOI":"10.1109\/ICoAC.2015.7562810"},{"issue":"2","key":"7613_CR16","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TDSC.2016.2550437","volume":"15","author":"B Li","year":"2018","unstructured":"Li, B., Huang, D., Wang, Z., & Zhu, Y. (2018). Attribute-based access control for ICN naming scheme. IEEE Transactions on Dependable and Secure Computing, 15(2), 194\u2013206.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"13","key":"7613_CR17","doi-asserted-by":"crossref","first-page":"5389","DOI":"10.1109\/JSEN.2016.2554625","volume":"16","author":"F Li","year":"2016","unstructured":"Li, F., & Hong, J. (2016). Efficient certificateless access control for wireless body area networks. IEEE Sensors Journal, 16(13), 5389\u20135396.","journal-title":"IEEE Sensors Journal"},{"key":"7613_CR18","doi-asserted-by":"crossref","first-page":"8967","DOI":"10.1109\/ACCESS.2016.2632132","volume":"6","author":"F Khan","year":"2016","unstructured":"Khan, F., Li, H., & Zhang, L. (2016). Owner specified excessive access control for attribute based encryption. IEEE Access, 6, 8967\u20138976.","journal-title":"IEEE Access"},{"key":"7613_CR19","doi-asserted-by":"crossref","unstructured":"Niu, X. (2017). Fine-grained access control scheme based on cloud storage. In 2017 international conference on computer network, electronic and automation (pp. 512\u2013515).","DOI":"10.1109\/ICCNEA.2017.48"},{"key":"7613_CR20","doi-asserted-by":"crossref","first-page":"9114","DOI":"10.1109\/ACCESS.2018.2800288","volume":"6","author":"K Seol","year":"2018","unstructured":"Seol, K., Kim, Y.-G., Lee, E., Seo, Y.-D., & Baik, D.-K. (2018). Privacy-preserving attribute-based access control model for XML-based electronic health record system. IEEE Access, 6, 9114\u20139128.","journal-title":"IEEE Access"},{"key":"7613_CR21","doi-asserted-by":"crossref","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","volume":"6","author":"S Ding","year":"2018","unstructured":"Ding, S., Li, C., & Li, H. (2018). A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 6, 27336\u201327345.","journal-title":"IEEE Access"},{"key":"7613_CR22","first-page":"1063","volume":"2018","author":"Y-H Chen","year":"2018","unstructured":"Chen, Y.-H., & Huang, P.-C. (2018). Collaborative access control of cloud storage systems. IEEE International Conference on Applied System Innovation, 2018, 1063\u20131064.","journal-title":"IEEE International Conference on Applied System Innovation"},{"key":"7613_CR23","doi-asserted-by":"crossref","first-page":"38437","DOI":"10.1109\/ACCESS.2018.2851611","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437\u201338450.","journal-title":"IEEE Access"},{"key":"7613_CR24","unstructured":"Sakthidasan, K., Vasudevan, N., Prakash, V. R., & Kumara Guru Diderot, P. (2019). Access control based efficient hybrid security mechanisms for cloud storage. In International conference on communication and signal processing (pp. 0564\u20130567)."},{"key":"7613_CR25","doi-asserted-by":"crossref","unstructured":"Sukmana, M. I. H., Torkura, K. A., Graupner, H., Cheng, F., & Meinel, C. (2019). Unified cloud access control model for cloud storage broker. In International conference on information networking (ICOIN 2019) (pp. 60\u201365).","DOI":"10.1109\/ICOIN.2019.8717982"},{"key":"7613_CR26","doi-asserted-by":"crossref","unstructured":"Bin, S., & Haopu, Y. (2019). Research of fine grit access control based on time in cloud computing. In 3rd information technology, networking, electronic and automation control conference (ITNEC 2019) (pp. 1897\u20131902).","DOI":"10.1109\/ITNEC.2019.8729464"},{"key":"7613_CR27","doi-asserted-by":"crossref","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad, K., Hamza, R., & Yan, H. (2019). Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access, 7, 86384\u201386393.","journal-title":"IEEE Access"},{"issue":"4","key":"7613_CR28","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/TCC.2015.2440247","volume":"5","author":"W Teng","year":"2017","unstructured":"Teng, W., Yang, G., Xiang, Y., Zhang, T., & Wang, D. (2017). Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Transactions on Cloud Computing, 5(4), 617\u2013627.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"10","key":"7613_CR29","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","volume":"10","author":"S Lin","year":"2015","unstructured":"Lin, S., Zhang, R., Ma, H., & Wang, M. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10(10), 2119\u20132130.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"7613_CR30","doi-asserted-by":"crossref","first-page":"1992","DOI":"10.1109\/TC.2015.2462840","volume":"65","author":"JK Liu","year":"2016","unstructured":"Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2016). Two-factor data security protection mechanism for cloud storage system. IEEE Transactions on Computers, 65(6), 1992\u20132004.","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"7613_CR31","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1109\/TCC.2015.2481416","volume":"6","author":"A Chatterjee","year":"2018","unstructured":"Chatterjee, A., & Sengupta, I. (2018). Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Transactions on Cloud Computing, 6(1), 287\u2013300.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"5","key":"7613_CR32","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2017","unstructured":"Li, J., Lin, X., Zhang, Y., & Han, J. (2017). KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Transactions on Services Computing, 10(5), 715\u2013725.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"4","key":"7613_CR33","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TCC.2016.2545668","volume":"6","author":"J Wei","year":"2018","unstructured":"Wei, J., Liu, W., & Xuexian, H. (2018). Secure data sharing in cloud computing using revocable-storage identity-based encryption. IEEE Transactions on Cloud Computing, 6(4), 1136\u20131148.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"7613_CR34","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1109\/ACCESS.2017.2665586","volume":"5","author":"B Lang","year":"2017","unstructured":"Lang, B., Wang, J., & Liu, Y. (2017). Achieving flexible and self-contained data protection in cloud computing. IEEE Access, 5, 1510\u20131523.","journal-title":"IEEE Access"},{"key":"7613_CR35","doi-asserted-by":"crossref","first-page":"29023","DOI":"10.1109\/ACCESS.2018.2890565","volume":"7","author":"Z Li","year":"2019","unstructured":"Li, Z., Li, W., Jin, Z., Zhang, H., & Wen, Q. (2019). An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access, 7, 29023\u201329037.","journal-title":"IEEE Access"},{"key":"7613_CR36","doi-asserted-by":"crossref","first-page":"36218","DOI":"10.1109\/ACCESS.2019.2905346","volume":"7","author":"J Fu","year":"2019","unstructured":"Fu, J., & Wang, N. (2019). A practical attribute-based document collection hierarchical encryption scheme in cloud computing. IEEE Access, 7, 36218\u201336232.","journal-title":"IEEE Access"},{"key":"7613_CR37","first-page":"80","volume":"18","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80\u201389.","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"7613_CR38","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jisa.2018.01.004","volume":"39","author":"Y Yan","year":"2018","unstructured":"Yan, Y., Lei, W., Gao, G., Wang, H., & Wenyu, X. (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. Journal of Information Security and Applications, 39, 10\u201318.","journal-title":"Journal of Information Security and Applications"},{"key":"7613_CR39","unstructured":"Daniel, R. M., Rajsingh, E. B., & Silas, S. A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography. Journal of King Saud University\u2014Computer and Information Sciences. (in press)."},{"key":"7613_CR40","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.ins.2017.09.033","volume":"422","author":"L Ferretti","year":"2018","unstructured":"Ferretti, L., Marchetti, M., Andreolini, M., & Colajanni, M. (2018). A symmetric cryptographic scheme for data integrity verification in cloud databases. Information Sciences, 422, 497\u2013515.","journal-title":"Information Sciences"},{"key":"7613_CR41","first-page":"96","volume":"454\u2013455","author":"O Hyunok","year":"2018","unstructured":"Hyunok, O., Kim, J., & Shin, J. S. (2018). Forward-secure ID based digital signature scheme with forward-secure private key generator. Information Sciences, 454\u2013455, 96\u2013109.","journal-title":"Information Sciences"},{"key":"7613_CR42","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.pmcj.2019.03.004","volume":"56","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Zhao, J., Mua, L., Tang, Y., & Xu, C. (2019). Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber\u2013physical systems. Pervasive and Mobile Computing, 56, 18\u201328.","journal-title":"Pervasive and Mobile Computing"},{"key":"7613_CR43","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.future.2019.01.054","volume":"96","author":"Y Fan","year":"2019","unstructured":"Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems, 96, 376\u2013385.","journal-title":"Future Generation Computer Systems"},{"key":"7613_CR44","volume-title":"Cryptography and network security principles and practices","author":"W Stallings","year":"2006","unstructured":"Stallings, W. (2006). Cryptography and network security principles and practices (4th ed.). London: Pearson Education.","edition":"4"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07613-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07613-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07613-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:34:04Z","timestamp":1696268044000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07613-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,20]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7613"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07613-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,20]]},"assertion":[{"value":"20 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}