{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:30Z","timestamp":1740122670675,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11277-021-09104-9","type":"journal-article","created":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T03:26:35Z","timestamp":1631676395000},"page":"3633-3647","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CCSC\u2014DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment"],"prefix":"10.1007","volume":"122","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4251-198X","authenticated-orcid":false,"given":"L.","family":"Prabahar","sequence":"first","affiliation":[]},{"given":"R.","family":"Sukumar","sequence":"additional","affiliation":[]},{"given":"R.","family":"SureshBabu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,15]]},"reference":[{"key":"9104_CR1","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/tifs.2016.2646913","volume":"12","author":"Y Wang","year":"2016","unstructured":"Wang, Y., et al. (2016). Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Transactions on Information Forensics and Security, 12, 940\u2013952. https:\/\/doi.org\/10.1109\/tifs.2016.2646913","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9104_CR2","doi-asserted-by":"publisher","unstructured":"T. C. Nguyen, et al., \"Novel data integrity verification schemes in cloud storage,\" in Computer and Information Science, ed: Springer, 2015, pp. 115\u2013125. https:\/\/doi.org\/10.1007\/978-3-319-10509-3_9","DOI":"10.1007\/978-3-319-10509-3_9"},{"key":"9104_CR3","doi-asserted-by":"publisher","unstructured":"M. Ramanan and P. Vivekanandan, (2018) \"Efficient data integrity and data replication in cloud using stochastic diffusion method,\" Cluster Computing, pp. 1\u20138,. https:\/\/doi.org\/10.1007\/s10586-018-2480-9","DOI":"10.1007\/s10586-018-2480-9"},{"key":"9104_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/tdsc.2017.2662216","volume":"16","author":"Y Li","year":"2017","unstructured":"Li, Y., et al. (2017). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing, 16, 72\u201383. https:\/\/doi.org\/10.1109\/tdsc.2017.2662216","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9104_CR5","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/tpds.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., et al. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25, 222\u2013233. https:\/\/doi.org\/10.1109\/tpds.2013.45","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9104_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., et al. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur), 51, 79. https:\/\/doi.org\/10.1145\/3214303","journal-title":"ACM Computing Surveys (Csur)"},{"key":"9104_CR7","doi-asserted-by":"publisher","unstructured":"F. De Santis et al., (2017)\"ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications,\" In Proceedings of the conference on design, automation & test in Europe, pp. 692\u2013697. https:\/\/doi.org\/10.23919\/date.2017.7927078","DOI":"10.23919\/date.2017.7927078"},{"key":"9104_CR8","doi-asserted-by":"publisher","unstructured":"A. Taparia et al., (2017) \"Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison,\" In 2017 International conference on wireless communications, signal processing and networking (WiSPNET), pp. 722\u2013726. https:\/\/doi.org\/10.1109\/wispnet.2017.8299856","DOI":"10.1109\/wispnet.2017.8299856"},{"key":"9104_CR9","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/mcc.2016.94","volume":"3","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., et al. (2016). Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Computing, 3, 44\u201352. https:\/\/doi.org\/10.1109\/mcc.2016.94","journal-title":"IEEE Cloud Computing"},{"key":"9104_CR10","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/tifs.2016.2520886","volume":"11","author":"H Wang","year":"2016","unstructured":"Wang, H., et al. (2016). Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transactions on Information Forensics and Security, 11, 1165\u20131176. https:\/\/doi.org\/10.1109\/tifs.2016.2520886","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9104_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jisa.2014.10.004","volume":"20","author":"M Thangavel","year":"2015","unstructured":"Thangavel, M., et al. (2015). An enhanced and secured RSA key generation scheme (ESRKGS). Journal of information security and applications, 20, 3\u201310. https:\/\/doi.org\/10.1016\/j.jisa.2014.10.004","journal-title":"Journal of information security and applications"},{"key":"9104_CR12","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1109\/tifs.2015.2449264","volume":"10","author":"S Lin","year":"2015","unstructured":"Lin, S., et al. (2015). Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security, 10, 2119\u20132130. https:\/\/doi.org\/10.1109\/tifs.2015.2449264","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9104_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3596205","volume":"2017","author":"J Li","year":"2017","unstructured":"Li, J., et al. (2017). Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Security and Communication Networks, 2017, 1\u201311. https:\/\/doi.org\/10.1155\/2017\/3596205","journal-title":"Security and Communication Networks"},{"key":"9104_CR14","doi-asserted-by":"publisher","unstructured":"D. Puthal et al., (2015) \"A dynamic key length based approach for real-time security verification of big sensing data stream,\" In International conference on web information systems engineering, pp. 93\u2013108. https:\/\/doi.org\/10.1007\/978-3-319-26187-4_7","DOI":"10.1007\/978-3-319-26187-4_7"},{"key":"9104_CR15","doi-asserted-by":"publisher","unstructured":"L. Krithikashree et al., (2018) \"Audit cloud: Ensuring data integrity for mobile devices in cloud storage,\" In 2018 9th International conference on Computing, communication and networking technologies (ICCCNT), pp. 1\u20135. https:\/\/doi.org\/10.1109\/icccnt.2018.8493963","DOI":"10.1109\/icccnt.2018.8493963"},{"key":"9104_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","volume":"64","author":"SK Pasupuleti","year":"2016","unstructured":"Pasupuleti, S. K., et al. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12\u201322. https:\/\/doi.org\/10.1016\/j.jnca.2015.11.023","journal-title":"Journal of Network and Computer Applications"},{"key":"9104_CR17","doi-asserted-by":"publisher","DOI":"10.32628\/cseit195111","author":"K Kaviya","year":"2019","unstructured":"Kaviya, K., et al. (2019). \u201cEvolving cryptographic approach for enhancing security of resource constrained mobile device outsourced data in cloud computing.\u201d International Journal of Scientific Research in Computer Science Engineering and Information Technology. https:\/\/doi.org\/10.32628\/cseit195111","journal-title":"International Journal of Scientific Research in Computer Science Engineering and Information Technology"},{"key":"9104_CR18","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.cose.2016.11.003","volume":"65","author":"M Yi","year":"2017","unstructured":"Yi, M., et al. (2017). Efficient integrity verification of replicated data in cloud computing system. Computers & security, 65, 202\u2013212. https:\/\/doi.org\/10.1016\/j.cose.2016.11.003","journal-title":"Computers & security"},{"key":"9104_CR19","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/tifs.2021.3102413","volume":"12","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., et al. (2016). Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Transactions on Information Forensics and Security, 12, 676\u2013688. https:\/\/doi.org\/10.1109\/tifs.2021.3102413","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9104_CR20","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/tifs.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu, Y., et al. (2016). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12, 767\u2013778. https:\/\/doi.org\/10.1109\/tifs.2016.2615853","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9104_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2017.2701347","author":"A Fu","year":"2017","unstructured":"Fu, A., et al. (2017). NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data. https:\/\/doi.org\/10.1109\/tbdata.2017.2701347","journal-title":"IEEE Transactions on Big Data"},{"key":"9104_CR22","doi-asserted-by":"publisher","first-page":"485","DOI":"10.14569\/ijacsa.2016.070464","volume":"7","author":"S Aldossary","year":"2016","unstructured":"Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7, 485\u2013498. https:\/\/doi.org\/10.14569\/ijacsa.2016.070464","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"9104_CR23","doi-asserted-by":"publisher","first-page":"30487","DOI":"10.1109\/access.2019.2900300","volume":"7","author":"A Bhattacharjya","year":"2019","unstructured":"Bhattacharjya, A., et al. (2019). A lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack. IEEE Access, 7, 30487\u201330506. https:\/\/doi.org\/10.1109\/access.2019.2900300","journal-title":"IEEE Access"},{"key":"9104_CR24","doi-asserted-by":"publisher","first-page":"50658","DOI":"10.1109\/access.2019.2906290","volume":"7","author":"K He","year":"2019","unstructured":"He, K., et al. (2019). A new encrypted data switching protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access, 7, 50658\u201350668. https:\/\/doi.org\/10.1109\/access.2019.2906290","journal-title":"IEEE Access"},{"key":"9104_CR25","doi-asserted-by":"crossref","unstructured":"Subramanian E., & Tamilselvan, L. (2020). Elliptic curve Diffie\u2013Hellman cryptosystem in big data cloud security. Cluster Computing, 1\u201311.","DOI":"10.1007\/s10586-020-03069-3"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09104-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09104-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09104-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T12:25:38Z","timestamp":1643631938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09104-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["9104"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09104-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,9,15]]},"assertion":[{"value":"5 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}