{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:23:12Z","timestamp":1772043792206,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T00:00:00Z","timestamp":1679097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T00:00:00Z","timestamp":1679097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11277-023-10323-5","type":"journal-article","created":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T03:02:46Z","timestamp":1679108566000},"page":"1123-1139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Enhancing Data Security of Cloud Based LMS"],"prefix":"10.1007","volume":"130","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7989-3574","authenticated-orcid":false,"given":"Paramita","family":"Chatterjee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0967-455X","authenticated-orcid":false,"given":"Rajesh","family":"Bose","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-1913","authenticated-orcid":false,"given":"Subhasish","family":"Banerjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5447-803X","authenticated-orcid":false,"given":"Sandip","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,18]]},"reference":[{"key":"10323_CR1","doi-asserted-by":"crossref","unstructured":"Maitri, P.V., & Verma, A. (2016). Secure file storage in cloud computing using hybrid cryptography algorithm. In Proceedings of the IEEE WiSPNET 2016 conference (pp.1635\u20131638). IEEE.","DOI":"10.1109\/WiSPNET.2016.7566416"},{"key":"10323_CR2","unstructured":"Dharmakeerthi, T. (2020). A study on secure file storage in cloud computing using cryptography. Sri Lanka Institute of Information Technology. 1\u20134."},{"key":"10323_CR3","doi-asserted-by":"crossref","unstructured":"Vurukonda, N., Thirumala Rao, B. (2016) A study on data storage security issues in cloud computing. In Proceedings of the 2nd international conference on intelligent computing, communication & convergence (ICCC-2016). Procedia Computer Science, ScienceDirect. (Vol. 92, pp.128\u2013135). Elsevier.","DOI":"10.1016\/j.procs.2016.07.335"},{"issue":"4","key":"10323_CR4","first-page":"7490","volume":"8","author":"P Chatterjee","year":"2021","unstructured":"Chatterjee, P., Bose, R., Banerjee, S., & Roy, S. (2021). Enhancing the usability of cloud based LMS architecture in Covid pandemic. NVEO-Natural Volatiles & Essential Oils Journal, 8(4), 7490\u20137511.","journal-title":"NVEO-Natural Volatiles & Essential Oils Journal"},{"key":"10323_CR5","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1186\/s13677-020-00208-4","volume":"9","author":"LM Metcheka","year":"2020","unstructured":"Metcheka, L. M., & Ndoundam, R. (2020). Distributed data hiding in multi-cloudstorage environment. Journal of Cloud Computing: Advances, Systems and Applications, 9, 68.","journal-title":"Journal of Cloud Computing: Advances, Systems and Applications"},{"key":"10323_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit, F., Alhomdy, S., Al-Ahdal, A. H., & Jagtap, S. (2021). A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proceedings., 2, 91\u201399.","journal-title":"Global Transitions Proceedings."},{"key":"10323_CR7","doi-asserted-by":"publisher","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","volume":"8","author":"P Yang","year":"2020","unstructured":"Yang, P., Xiong, N., & Ren, J. (2020). Data security and privacy protectionfor cloud storage: a survey. IEEE Access, 8, 131723\u2013131740. special section on emerging approaches to cyber security.","journal-title":"IEEE Access"},{"issue":"4","key":"10323_CR8","first-page":"3668","volume":"4","author":"W Akeel","year":"2017","unstructured":"Akeel, W., & Hashim, A. (2017). Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology (IRJET), 4(4), 3668\u20133672.","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"issue":"3","key":"10323_CR9","first-page":"294","volume":"8","author":"RB D\u2019Souza","year":"2021","unstructured":"D\u2019Souza, R. B., & Ruby, D. (2021). Secure file storage on cloud using enhanced hybrid cryptography. International Research Journal of Engineering and Technology (IRJET), 8(3), 294\u2013298.","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"issue":"2","key":"10323_CR10","first-page":"16","volume":"9","author":"S Kanatt","year":"2020","unstructured":"Kanatt, S., Jadhav, A., & Talwar, P. (2020). Review of secure file storage on cloud using hybrid cryptography. International Journal of Engineering Research & Technology (IJERT), 9(2), 16\u201320.","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"issue":"6","key":"10323_CR11","doi-asserted-by":"publisher","first-page":"665","DOI":"10.35940\/ijrte.F7227.038620","volume":"8","author":"V Poduval","year":"2020","unstructured":"Poduval, V., Koul, A., Rebello, D., Bhat, K., & Wahul, R. M. (2020). Cloud based secure storage of files using hybrid cryptography and image steganography. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 665\u2013667.","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"issue":"3","key":"10323_CR12","first-page":"191","volume":"9","author":"DS Ibrahim","year":"2019","unstructured":"Ibrahim, D. S. (2019). Enhancing cloud computing security using cryptography & steganography. Iraqi Journal of Information Technology, 9(3), 191\u2013224.","journal-title":"Iraqi Journal of Information Technology"},{"issue":"6610678","key":"10323_CR13","first-page":"1","volume":"2021","author":"M Fateh","year":"2021","unstructured":"Fateh, M., Rezvani, M., & Irani, Y. (2021). A new method of coding for steganography based on lsb matching revisited. Hindawi Security and Communication Networks, 2021(6610678), 1\u201315.","journal-title":"Hindawi Security and Communication Networks"},{"issue":"12","key":"10323_CR14","first-page":"906","volume":"8","author":"K Amarendra","year":"2019","unstructured":"Amarendra, K., Mandhala, V. N., Chetan Gupta, B., Sudheshna, G. G., & Anusha, V. V. (2019). Image steganography using LSB. International Journal of Scientific & Technology Research, 8(12), 906\u2013909.","journal-title":"International Journal of Scientific & Technology Research"},{"issue":"1","key":"10323_CR15","doi-asserted-by":"publisher","first-page":"645","DOI":"10.14569\/IJACSA.2020.0110179","volume":"11","author":"A Albalawi","year":"2020","unstructured":"Albalawi, A., & Hamza, N. (2020). A survey on cloud data security using image steganography. International Journal of Advanced Computer Science and Applications, 11(1), 645\u2013649.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"7","key":"10323_CR16","first-page":"334","volume":"8","author":"U Kumar","year":"2020","unstructured":"Kumar, U., & Prakash, J. (2020). Secure file storage on cloud using hybrid cryptography algorithm. International Journal of Creative Research Thoughts, 8(7), 334\u2013340.","journal-title":"International Journal of Creative Research Thoughts"},{"key":"10323_CR17","unstructured":"Cataltas, O., & Tutuncu, K. (2017). Improvement of LSB based image steganography. In Proceedings of research world international conference, Rome (pp. 36\u201340)."},{"key":"10323_CR18","doi-asserted-by":"crossref","unstructured":"Gabriel, A.J., Adetunmbi, A.O., & Obaila, P. (2020). A two-layer image-steganography systemfor covert communication over enterprise network. Proceedings of ICCSA 2020, LNCS 12254 (pp. 459\u2013470), Springer Nature.","DOI":"10.1007\/978-3-030-58817-5_34"},{"issue":"8","key":"10323_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5120\/7649-0743","volume":"49","author":"DC Verma","year":"2012","unstructured":"Verma, D. C., Mohapatra, A. K., & Usmani, K. (2012). Light weight encryption technique for group communication in cloud computing environment. International Journal of Computer Applications, 49(8), 36\u201341.","journal-title":"International Journal of Computer Applications"},{"issue":"12","key":"10323_CR20","first-page":"1531","volume":"5","author":"KV Gulhane","year":"2016","unstructured":"Gulhane, K. V., & Dalvi, G. D. (2016). Low Latency for file encryption and decryption using BRA algorithm for secure transmission of data. International Journal of Science and Research, 5(12), 1531\u20131535.","journal-title":"International Journal of Science and Research"},{"issue":"1","key":"10323_CR21","first-page":"18","volume":"4","author":"M Ismail","year":"2016","unstructured":"Ismail, M., & Yusuf, B. (2016). Ensuring data storage security in cloud computing with advanced encryption standard (AES) and authentication scheme (AS). International Journal of Information System and Engineering, 4(1), 18\u201339.","journal-title":"International Journal of Information System and Engineering"},{"issue":"1","key":"10323_CR22","first-page":"104","volume":"5","author":"DV Anjali","year":"2016","unstructured":"Anjali, D. V., & Chandrashekara, S. N. (2016). Design and implementation of secure cloud storage system using hybrid cryptography algorithms with role based access control model. International Journal of Engineering and Technical Research, 5(1), 104\u2013107.","journal-title":"International Journal of Engineering and Technical Research"},{"issue":"3","key":"10323_CR23","first-page":"345","volume":"6","author":"KK Jebaseeli","year":"2019","unstructured":"Jebaseeli, K. K., & Rani, V. G. (2019). Security incursion and cryptography quick fix for data accumulated in cloud storage. Journal of Emerging Technologies and Innovative Research, 6(3), 345\u2013350.","journal-title":"Journal of Emerging Technologies and Innovative Research"},{"key":"10323_CR24","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2018","unstructured":"Zheng, Q., Wang, X., Khan, M. K., Zhang, W., Gupta, B. B., & Guo, W. (2018). A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access, 6, 711\u2013722. Special section on recent advances in computational intelligence paradigmsfor security and privacy for fog and mobile edge computing.","journal-title":"IEEE Access"},{"key":"10323_CR25","doi-asserted-by":"publisher","first-page":"742","DOI":"10.3390\/sym13050742","volume":"13","author":"R Sivan","year":"2021","unstructured":"Sivan, R., & Zukerman, Z. A. (2021). Security and privacy in cloud-based E-health system. Symmetry, 13, 742.","journal-title":"Symmetry"},{"key":"10323_CR26","doi-asserted-by":"crossref","unstructured":"Shen, J., Deng, X., & Xu, Z. (2019). Multi-security-level cloud storagesystem based on improved proxyre-encryption. EURASIP Journal on Wireless Communications and Networking. 1\u201312.","DOI":"10.1186\/s13638-019-1614-y"},{"issue":"07","key":"10323_CR27","first-page":"34894","volume":"8","author":"GB Tarekegn","year":"2016","unstructured":"Tarekegn, G. B., Abadi Maru, G., & Liyew, H. Z. (2016). Privacy and security issues in cloud computing. International Journal of Current Research, 8(07), 34894\u201334898.","journal-title":"International Journal of Current Research"},{"key":"10323_CR28","doi-asserted-by":"crossref","unstructured":"Wang, R. (2017). Research on data security technology based on cloud storage. In Proceedings of the 13th global congress on manufacturing and management, GCMM 2016, Procedia Engineering (Vol. 174, pp. 1340\u20131355). Elsevier.","DOI":"10.1016\/j.proeng.2017.01.286"},{"issue":"III","key":"10323_CR29","first-page":"1","volume":"3","author":"A Sirohi","year":"2015","unstructured":"Sirohi, A. (2015). A secure and adaptable cloud data encryption system using cryptography: A review. International Journal for Research in Applied Science & Engineering Technology, 3(III), 1\u20138.","journal-title":"International Journal for Research in Applied Science & Engineering Technology"},{"issue":"20","key":"10323_CR30","first-page":"14799","volume":"13","author":"S Malviya","year":"2018","unstructured":"Malviya, S., & Dave, S. (2018). Secure Data sharing scheme using cryptographic algorithm for cloud storage. International Journal of Applied Engineering Research, 13(20), 14799\u201314805.","journal-title":"International Journal of Applied Engineering Research"},{"issue":"6","key":"10323_CR31","doi-asserted-by":"crossref","first-page":"87","DOI":"10.26438\/ijcse\/v7i6.941946","volume":"7","author":"PM Reddy","year":"2019","unstructured":"Reddy, P. M. (2019). Hybrid crypto system for cloud storage security using MECC and Native bayes classifer A review. International Journal of Computer Sciences and Engineering, 7(6), 87\u201390.","journal-title":"International Journal of Computer Sciences and Engineering"},{"key":"10323_CR32","doi-asserted-by":"crossref","unstructured":"Tawalbeh, L., Darwazeh, N. S., Al-Qassas, R. S., & AlDosari, F. (2015). A secure cloud computing model based on data classification. In Proceedings of the first international workshop on mobile cloud computing systems, management, and security (MCSMS-2015) (Vol. 52, pp.1153\u20131158). Elsevier.","DOI":"10.1016\/j.procs.2015.05.150"},{"issue":"5","key":"10323_CR33","first-page":"786","volume":"4","author":"K Handa","year":"2015","unstructured":"Handa, K., & Singh, U. (2015). Data security in cloud computing using encryption and steganography. International Journal of Computer Science and Mobile Computing, 4(5), 786\u2013791.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"10323_CR34","unstructured":"Kasapbasi, M. C., & Elmasry, W. (2018). New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check. Indian Academy of Sciences, 1\u201314."},{"issue":"4","key":"10323_CR35","first-page":"3668","volume":"4","author":"W Akeel","year":"2017","unstructured":"Akeel, W., & Hashim, A. (2017). Using steganography for secure data storage in cloud computing. International Research Journal of Engineering and Technology, 4(4), 3668\u20133672.","journal-title":"International Research Journal of Engineering and Technology"},{"issue":"1","key":"10323_CR36","first-page":"426","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh, A. K., Singh, J., & Singh, H. V. (2015). Steganography in images using LSB technique. International Journal of Latest Trends in Engineering and Technology, 5(1), 426\u2013430.","journal-title":"International Journal of Latest Trends in Engineering and Technology"},{"issue":"5","key":"10323_CR37","first-page":"919","volume":"3","author":"K Karuna Jyothi","year":"2018","unstructured":"Karuna Jyothi, K., & Indira Reddy, B. (2018). Study on virtual private network (VPN), VPN\u2019s protocols and security. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(5), 919\u2013932.","journal-title":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology"},{"key":"10323_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Chandel, S., Sun, J., Yan, S., Yu, Y., & Zang, J. (2018). VPN: a boon or trap? A comparative study of MPLs, IPSec, and SSL virtual private networks. In Proceedings of the 2018 2nd international conference on computing methodologies and communication (ICCMC), (IEEE), Erode, India (pp. 510\u2013515).","DOI":"10.1109\/ICCMC.2018.8487653"},{"key":"10323_CR39","doi-asserted-by":"crossref","unstructured":"Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M. A., & Paxson, V. (2016). An analysis of the privacy and security risks of android VPN permission-enabled apps. In Proceedings of the 2016 internet measurement conference, Santa Monica, CA, USA, (ACM) (pp. 349\u2013364).","DOI":"10.1145\/2987443.2987471"},{"issue":"2","key":"10323_CR40","doi-asserted-by":"publisher","first-page":"2362","DOI":"10.30534\/ijatcse\/2020\/221922020","volume":"9","author":"B Mukhopadhyay","year":"2020","unstructured":"Mukhopadhyay, B., Bose, R., & Roy, S. (2020). A novel approach to load balancing and cloud computing security using SSL in IaaS environment. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 2362\u20132370.","journal-title":"International Journal of Advanced Trends in Computer Science and Engineering"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10323-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10323-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10323-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:47:54Z","timestamp":1744210074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10323-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,18]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10323"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10323-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,18]]},"assertion":[{"value":"25 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No research grant.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}