{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:35:28Z","timestamp":1774452928024,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T00:00:00Z","timestamp":1691798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T00:00:00Z","timestamp":1691798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11704-022-2193-3","type":"journal-article","created":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T07:01:36Z","timestamp":1691823696000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography"],"prefix":"10.1007","volume":"18","author":[{"given":"Ashish","family":"Singh","sequence":"first","affiliation":[]},{"given":"Abhinav","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Suyel","family":"Namasudra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,12]]},"reference":[{"issue":"16","key":"2193_CR1","doi-asserted-by":"publisher","first-page":"5937","DOI":"10.3390\/s22165937","volume":"22","author":"A Lakhan","year":"2022","unstructured":"Lakhan A, Mohammed M A, Abdulkareem K H, Jaber M M, Nedoma J, Martinek R, Zmij P. Delay optimal schemes for internet of things applications in heterogeneous edge cloud computing networks. Sensors, 2022, 22(16): 5937","journal-title":"Sensors"},{"key":"2193_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-04137-3_2","volume-title":"Simulation for Industry 4.0","author":"M M Gunal","year":"2019","unstructured":"Gunal M M, Karatas M. Industry 4.0, digitisation in manufacturing, and simulation: a review of the literature. In: Gunal M M, ed. Simulation for Industry 4.0. Cham: Springer, 2019, 19\u201337"},{"issue":"2","key":"2193_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.47852\/bonviewJCCE2022010104","volume":"1","author":"T Mahmood","year":"2022","unstructured":"Mahmood T, Ali Z. Prioritized muirhead mean aggregation operators under the complex single-valued neutrosophic settings and their application in multi-attribute decision-making. Journal of Computational and Cognitive Engineering, 2022, 1(2): 56\u201373","journal-title":"Journal of Computational and Cognitive Engineering"},{"issue":"6","key":"2193_CR4","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MC.2017.179","volume":"50","author":"T Snyder","year":"2017","unstructured":"Snyder T, Byrd G. The internet of everything. Computer, 2017, 50(6): 8\u20139","journal-title":"Computer"},{"key":"2193_CR5","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvt1sgc0","volume-title":"The Internet in Everything","author":"L DeNardis","year":"2020","unstructured":"DeNardis L. The Internet in Everything. New Haven: Yale University Press, 2020"},{"key":"2193_CR6","doi-asserted-by":"publisher","first-page":"116912","DOI":"10.1016\/j.eswa.2022.116912","volume":"200","author":"M Karatas","year":"2022","unstructured":"Karatas M, Eriskin L, Deveci M, Pamucar D, Garg H. Big data for healthcare industry 4.0: Applications, challenges and future perspectives. Expert Systems with Applications, 2022, 200: 116912","journal-title":"Expert Systems with Applications"},{"key":"2193_CR7","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1201\/9781003047315-11","volume-title":"Internet of Energy for Smart Cities","author":"S Tripathi","year":"2021","unstructured":"Tripathi S, De S. Pathway and future of IoE in smart cities: challenges of big data and energy sustainability. In: Jindal A, Kumar N, Aujla G S, eds. Internet of Energy for Smart Cities. Boca Raton: CRC Press, 2021, 277\u2013302"},{"key":"2193_CR8","doi-asserted-by":"crossref","unstructured":"Lakhan A, Mohammed M A, Rashid A N, Kadry S, Abdulkareem K H, Nedoma J, Martinek R, Razzak I. Restricted Boltzmann machine assisted secure serverless edge system for internet of medical things. IEEE Journal of Biomedical and Health Informatics, 2022","DOI":"10.1109\/JBHI.2022.3178660"},{"key":"2193_CR9","unstructured":"Lakhan A, Mohammed M A, Ibrahim D A, Abdulkareem K H. Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment. Journal of King Saud University-Computer and Information Sciences, 2021"},{"key":"2193_CR10","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh A, Chatterjee K. Cloud security issues and challenges: a survey. Journal of Network and Computer Applications, 2017, 79: 88\u2013115","journal-title":"Journal of Network and Computer Applications"},{"key":"2193_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2022.02.008","volume":"188","author":"P Pavithran","year":"2022","unstructured":"Pavithran P, Mathew S, Namasudra S, Srivastava G. A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. Computer Communications, 2022, 188: 1\u201312","journal-title":"Computer Communications"},{"issue":"1","key":"2193_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Cheng L, Boutaba R. Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 2010, 1(1): 7\u201318","journal-title":"Journal of Internet Services and Applications"},{"key":"2193_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.future.2015.09.031","volume":"57","author":"V Chang","year":"2016","unstructured":"Chang V, Kuo Y H, Ramachandran M. Cloud computing adoption framework: a security framework for business clouds. Future Generation Computer Systems, 2016, 57: 24\u201341","journal-title":"Future Generation Computer Systems"},{"key":"2193_CR14","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the 29th Conference on Information Communications. 2010, 534\u2013542","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"2193_CR15","doi-asserted-by":"publisher","first-page":"102835","DOI":"10.1016\/j.jnca.2020.102835","volume":"172","author":"S Namasudra","year":"2020","unstructured":"Namasudra S, Sharma S, Deka G C, Lorenz P. DNA computing and table based data accessing in the cloud environment. Journal of Network and Computer Applications, 2020, 172: 102835","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"2193_CR16","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/COMST.2019.2934468","volume":"21","author":"N Agrawal","year":"2019","unstructured":"Agrawal N, Tapaswi S. Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 2019, 21(4): 3769\u20133795","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2193_CR17","unstructured":"Sirichotedumrong W, Kiya H. Visual security evaluation of learnable image encryption methods against ciphertext-only attacks. In: Proceedings of 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). 2020, 1304\u20131309"},{"issue":"1","key":"2193_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.47852\/bonviewJCCE208918205514","volume":"1","author":"F J Vasko","year":"2022","unstructured":"Vasko F J, Lu Y, McNally B. A simple methodology that efficiently generates all optimal spanning trees for the cable-trench problem. Journal of Computational and Cognitive Engineering, 2022, 1(1): 13\u201320","journal-title":"Journal of Computational and Cognitive Engineering"},{"issue":"3","key":"2193_CR19","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1049\/cit2.12003","volume":"6","author":"A Wani","year":"2021","unstructured":"Wani A, Revathi S, Khaliq R. SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Transactions on Intelligence Technology, 2021, 6(3): 281\u2013290","journal-title":"CAAI Transactions on Intelligence Technology"},{"issue":"3","key":"2193_CR20","doi-asserted-by":"publisher","first-page":"103","DOI":"10.47852\/bonviewJCCE149145205514","volume":"1","author":"Z Chen","year":"2022","unstructured":"Chen Z. Research on internet security situation awareness prediction technology based on improved RBF neural network algorithm. Journal of Computational and Cognitive Engineering, 2022, 1(3): 103\u2013108","journal-title":"Journal of Computational and Cognitive Engineering"},{"issue":"4","key":"2193_CR21","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1049\/cit2.12032","volume":"6","author":"G Mohindru","year":"2021","unstructured":"Mohindru G, Mondal K, Banka H. Different hybrid machine intelligence techniques for handling IoT-based imbalanced data. CAAI Transactions on Intelligence Technology, 2021, 6(4): 405\u2013416","journal-title":"CAAI Transactions on Intelligence Technology"},{"issue":"1","key":"2193_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s13677-017-0098-8","volume":"6","author":"N Rakotondravony","year":"2017","unstructured":"Rakotondravony N, Taubmann B, Mandarawi W, Weish\u00e4upl E, Xu P, Kolosnjaji B, Protsenko M, De Meer H, Reiser H P. Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing, 2017, 6(1): 26","journal-title":"Journal of Cloud Computing"},{"issue":"4","key":"2193_CR23","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1049\/trit.2020.0073","volume":"5","author":"Doreswamy","year":"2020","unstructured":"Doreswamy, Hooshmand M K, Gad I. Feature selection approach using ensemble learning for network anomaly detection. CAAI Transactions on Intelligence Technology, 2020, 5(4): 283\u2013293","journal-title":"CAAI Transactions on Intelligence Technology"},{"key":"2193_CR24","doi-asserted-by":"publisher","DOI":"10.1201\/9781351011419","volume-title":"Advances of DNA Computing in Cryptography","author":"S Namasudra","year":"2018","unstructured":"Namasudra S, Deka G C. Advances of DNA Computing in Cryptography. Boca Raton: CRC Press, 2018"},{"key":"2193_CR25","doi-asserted-by":"publisher","first-page":"2721910","DOI":"10.1155\/2017\/2721910","volume":"2017","author":"S J Sheela","year":"2017","unstructured":"Sheela S J, Suresh K V, Tandur D. A novel audio cryptosystem using chaotic maps and DNA encoding. Journal of Computer Networks and Communications, 2017, 2017: 2721910","journal-title":"Journal of Computer Networks and Communications"},{"issue":"4","key":"2193_CR26","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.jksuci.2016.02.003","volume":"29","author":"B Mondal","year":"2017","unstructured":"Mondal B, Mandal T. A light weight secure image encryption scheme based on chaos & DNA computing. Journal of King Saud University-Computer and Information Sciences, 2017, 29(4): 499\u2013504","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"6736","key":"2193_CR27","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"C T Clelland","year":"1999","unstructured":"Clelland C T, Risca V, Bancroft C. Hiding messages in DNA microdots. Nature, 1999, 399(6736): 533\u2013534","journal-title":"Nature"},{"issue":"1","key":"2193_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A Leier","year":"2000","unstructured":"Leier A, Richter C, Banzhaf W, Rauhe H. Cryptography with DNA binary strands. Biosystems, 2000, 57(1): 13\u201322","journal-title":"Biosystems"},{"issue":"1","key":"2193_CR29","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.biosystems.2005.01.004","volume":"81","author":"K Tanaka","year":"2005","unstructured":"Tanaka K, Okamoto A, Saito I. Public-key system using DNA as a one-way function for key distribution. Biosystems, 2005, 81(1): 25\u201329","journal-title":"Biosystems"},{"issue":"6","key":"2193_CR30","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MCE.2021.3088408","volume":"11","author":"U Ahmed","year":"2022","unstructured":"Ahmed U, Lin J C W, Srivastava G. Privacy-preserving deep reinforcement learning in vehicle Ad Hoc networks. IEEE Consumer Electronics Magazine, 2022, 11(6): 41\u201348","journal-title":"IEEE Consumer Electronics Magazine"},{"issue":"7","key":"2193_CR31","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1109\/JIOT.2020.3032896","volume":"8","author":"J C W Lin","year":"2021","unstructured":"Lin J C W, Srivastava G, Zhang Y, Djenouri Y, Aloqaily M. Privacy-preserving multiobjective sanitization model in 6G IoT environments. IEEE Internet of Things Journal, 2021, 8(7): 5340\u20135349","journal-title":"IEEE Internet of Things Journal"},{"key":"2193_CR32","doi-asserted-by":"crossref","unstructured":"Lakhan A, Mohammed M A, Nedoma J, Martinek R, Tiwari P, Vidyarthi A, Alkhayyat A, Wang W. Federated-learning based privacy preservation and fraud-enabled blockchain IoMT system for healthcare. IEEE Journal of Biomedical and Health Informatics, 2022","DOI":"10.1109\/JBHI.2022.3165945"},{"issue":"4","key":"2193_CR33","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/IJCAC.2019100102","volume":"9","author":"S Kaushik","year":"2019","unstructured":"Kaushik S, Gandhi C. Ensure hierarchal identity based data security in cloud environment. International Journal of Cloud Applications and Computing, 2019, 9(4): 21\u201336","journal-title":"International Journal of Cloud Applications and Computing"},{"issue":"4","key":"2193_CR34","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"L M Kaufman","year":"2009","unstructured":"Kaufman L M. Data security in the world of cloud computing. IEEE Security & Privacy, 2009, 7(4): 61\u201364","journal-title":"IEEE Security & Privacy"},{"issue":"6","key":"2193_CR35","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1016\/j.jnca.2012.07.007","volume":"35","author":"S K Sood","year":"2012","unstructured":"Sood S K. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 2012, 35(6): 1831\u20131838","journal-title":"Journal of Network and Computer Applications"},{"key":"2193_CR36","doi-asserted-by":"crossref","unstructured":"Arockiam L, Monikandan S. Efficient cloud storage confidentiality to ensure data security. In: Proceedings of 2014 International Conference on Computer Communication and Informatics. 2014, 1\u20135","DOI":"10.1109\/ICCCI.2014.6921762"},{"key":"2193_CR37","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2016.05.138","volume":"87","author":"G Manogaran","year":"2016","unstructured":"Manogaran G, Thota C, Kumar M V. MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Computer Science, 2016, 87: 128\u2013133","journal-title":"Procedia Computer Science"},{"issue":"5","key":"2193_CR38","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s00778-017-0470-9","volume":"26","author":"V Attasena","year":"2017","unstructured":"Attasena V, Darmont J, Harbi N. Secret sharing for cloud data security: a survey. The VLDB Journal, 2017, 26(5): 657\u2013681","journal-title":"The VLDB Journal"},{"key":"2193_CR39","doi-asserted-by":"crossref","unstructured":"Akhil K M, Kumar M P, Pushpa B R. Enhanced cloud data security using AES algorithm. In: Proceedings of 2017 International Conference on Intelligent Computing and Control (I2C2). 2017, 1\u20135","DOI":"10.1109\/I2C2.2017.8321820"},{"issue":"4","key":"2193_CR40","first-page":"143","volume":"1","author":"P Kalpana","year":"2012","unstructured":"Kalpana P, Singaraju S. Data security in cloud computing using RSA algorithm. International Journal of Research in Computer & Communication Technology, 2012, 1(4): 143\u2013146","journal-title":"International Journal of Research in Computer & Communication Technology"},{"key":"2193_CR41","doi-asserted-by":"crossref","unstructured":"Sugumaran M, Murugan B B, Kamalraj D. An architecture for data security in cloud computing. In: Proceedings of 2014 World Congress on Computing and Communication Technologies. 2014, 252\u2013255","DOI":"10.1109\/WCCCT.2014.53"},{"issue":"1","key":"2193_CR42","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TCC.2015.2453981","volume":"6","author":"A Almutairi","year":"2015","unstructured":"Almutairi A, Sarfraz M I, Ghafoor A. Risk-aware management of virtual resources in access controlled service-oriented cloud datacenters. IEEE Transactions on Cloud Computing, 2015, 6(1): 168\u2013181","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"2","key":"2193_CR43","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TCC.2015.2513388","volume":"7","author":"Y Xie","year":"2019","unstructured":"Xie Y, Wen H, Wu B, Jiang Y, Meng J. A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Transactions on Cloud Computing, 2019, 7(2): 383\u2013391","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"3","key":"2193_CR44","first-page":"324","volume":"50","author":"M Lu","year":"2007","unstructured":"Lu M, Lai X, Xiao G, Qin L. Symmetric-key cryptosystem with DNA technology. Science in China Series F: Information Sciences, 2007, 50(3): 324\u2013333","journal-title":"Science in China Series F: Information Sciences"},{"key":"2193_CR45","doi-asserted-by":"crossref","unstructured":"Murugan A, Thilagavathy R. Cloud storage security scheme using DNA computing with Morse code and zigzag pattern. In: Proceedings of 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI). 2017, 2263\u20132268","DOI":"10.1109\/ICPCSI.2017.8392120"},{"issue":"6","key":"2193_CR46","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1109\/TIFS.2016.2646639","volume":"12","author":"Q Alam","year":"2017","unstructured":"Alam Q, Malik S U R, Akhunzada A, Choo K K R, Tabbasum S, Alam M. A cross tenant access control (CTAC) model for cloud computing: formal specification and verification. IEEE Transactions on Information Forensics and Security, 2017, 12(6): 1259\u20131268","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2193_CR47","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TNANO.2019.2904842","volume":"18","author":"Y Wang","year":"2019","unstructured":"Wang Y, Han Q, Cui G, Sun J. Hiding messages based on DNA sequence and recombinant DNA technique. IEEE Transactions on Nanotechnology, 2019, 18: 299\u2013307","journal-title":"IEEE Transactions on Nanotechnology"},{"key":"2193_CR48","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah A H, Isnin I F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Optics and Lasers in Engineering, 2014, 56: 83\u201393","journal-title":"Optics and Lasers in Engineering"},{"key":"2193_CR49","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","volume":"177","author":"A Alghafis","year":"2020","unstructured":"Alghafis A, Firdousi F, Khan M, Batool S I, Amin M. An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Mathematics and Computers in Simulation, 2020, 177: 441\u2013466","journal-title":"Mathematics and Computers in Simulation"},{"issue":"3","key":"2193_CR50","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1007\/s00500-019-04041-z","volume":"24","author":"A Elhadad","year":"2020","unstructured":"Elhadad A. Data sharing using proxy re-encryption based on DNA computing. Soft Computing, 2020, 24(3): 2101\u20132108","journal-title":"Soft Computing"},{"issue":"4","key":"2193_CR51","doi-asserted-by":"publisher","first-page":"2289","DOI":"10.1109\/TSC.2020.3046471","volume":"15","author":"S Namasudra","year":"2020","unstructured":"Namasudra S. Fast and secure data accessing by using DNA computing for the cloud environment. IEEE Transactions on Services Computing, 2020, 15(4): 2289\u20132300","journal-title":"IEEE Transactions on Services Computing"},{"key":"2193_CR52","doi-asserted-by":"publisher","first-page":"104207","DOI":"10.1016\/j.biosystems.2020.104207","volume":"197","author":"M I Reddy","year":"2020","unstructured":"Reddy M I, Kumar A P S, Reddy K S. A secured cryptographic system based on DNA and a hybrid key generation approach. Biosystems, 2020, 197: 104207","journal-title":"Biosystems"},{"key":"2193_CR53","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","volume":"49","author":"C Liu","year":"2015","unstructured":"Liu C, Yang C, Zhang X, Chen J. External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Generation Computer Systems, 2015, 49: 58\u201367","journal-title":"Future Generation Computer Systems"},{"key":"2193_CR54","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1016\/j.future.2018.03.005","volume":"86","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Abdelaziz A, Salama A S, Riad A M, Muhammad K, Sangaiah A K. A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems, 2018, 86: 1383\u20131394","journal-title":"Future Generation Computer Systems"},{"key":"2193_CR55","doi-asserted-by":"publisher","first-page":"101971","DOI":"10.1016\/j.sysarc.2020.101971","volume":"114","author":"T Wang","year":"2021","unstructured":"Wang T, Mei Y, Liu X, Wang J, Dai H N, Wang Z. Edge-based auditing method for data security in resource-constrained internet of things. Journal of Systems Architecture, 2021, 114: 101971","journal-title":"Journal of Systems Architecture"},{"key":"2193_CR56","doi-asserted-by":"publisher","first-page":"100225","DOI":"10.1016\/j.bdr.2021.100225","volume":"25","author":"P Sarosh","year":"2021","unstructured":"Sarosh P, Parah S A, Bhat G M, Muhammad K. A security management framework for big data in smart healthcare. Big Data Research, 2021, 25: 100225","journal-title":"Big Data Research"},{"issue":"3","key":"2193_CR57","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.1109\/JIOT.2021.3096637","volume":"9","author":"W Yu","year":"2022","unstructured":"Yu W, Liu Y, Dillon T, Rahayu W, Mostafa F. An integrated framework for health state monitoring in a smart factory employing IoT and big data techniques. IEEE Internet of Things Journal, 2022, 9(3): 2443\u20132454","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"2193_CR58","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.1109\/TII.2021.3103547","volume":"18","author":"T Wang","year":"2022","unstructured":"Wang T, Yang Q, Shen X, Gadekallu T R, Wang W, Dev K. A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Transactions on Industrial Informatics, 2022, 18(7): 4981\u20134989","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2193_CR59","unstructured":"Forouzan B A, Mukhopadhyay D. Cryptography and Network Security (Sie). McGraw-Hill Education, 2011"},{"key":"2193_CR60","doi-asserted-by":"publisher","unstructured":"Pavithran P, Mathew S, Namasudra S, Singh A. Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. Cluster Computing, 2022: https:\/\/doi.org\/10.1007\/s10586-022-03653-9","DOI":"10.1007\/s10586-022-03653-9"},{"key":"2193_CR61","doi-asserted-by":"crossref","unstructured":"Aieh A, Sen A, Dash S R, Dehuri S. Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie Hellman key sharing technique. In: Proceedings of the 3rd International Conference on Computer, Communication, Control and Information Technology (C3IT). 2015, 1\u20136","DOI":"10.1109\/C3IT.2015.7060130"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-2193-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-022-2193-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-2193-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:14:42Z","timestamp":1743045282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-022-2193-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,12]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["2193"],"URL":"https:\/\/doi.org\/10.1007\/s11704-022-2193-3","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,12]]},"assertion":[{"value":"4 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"181801"}}