{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T15:32:35Z","timestamp":1771860755479,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T00:00:00Z","timestamp":1534377600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NWO-MoST Joint Program","award":["2013DFG32630"],"award-info":[{"award-number":["2013DFG32630"]}]},{"DOI":"10.13039\/501100012336","name":"Major State Basic Research Development Program of China","doi-asserted-by":"crossref","award":["2012CB721000G"],"award-info":[{"award-number":["2012CB721000G"]}],"id":[{"id":"10.13039\/501100012336","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Special Program","award":["2017YFF 0204600"],"award-info":[{"award-number":["2017YFF 0204600"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s12065-018-0162-4","type":"journal-article","created":{"date-parts":[[2018,8,16]],"date-time":"2018-08-16T06:24:13Z","timestamp":1534400653000},"page":"101-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector"],"prefix":"10.1007","volume":"11","author":[{"given":"M. M.","family":"Annie Alphonsa","sequence":"first","affiliation":[]},{"given":"P.","family":"Amudhavalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,16]]},"reference":[{"key":"162_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.compbiomed.2016.09.003","volume":"78","author":"A Sahi","year":"2016","unstructured":"Sahi A, Lai D, Li Y (2016) Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput Biol Med 78:1\u20138","journal-title":"Comput Biol Med"},{"issue":"7","key":"162_CR2","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1109\/JSTSP.2015.2427113","volume":"9","author":"J Zhou","year":"2015","unstructured":"Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J Select Top Signal Process 9(7):1332\u20131344","journal-title":"IEEE J Select Top Signal Process"},{"issue":"5","key":"162_CR3","doi-asserted-by":"publisher","first-page":"5156","DOI":"10.1109\/EMB.2007.901787","volume":"26","author":"L Gatzoulis","year":"2007","unstructured":"Gatzoulis L, Iakovidis I (2007) Wearable and portable ehealth systems. IEEE Eng Med Biol Mag 26(5):51\u201356","journal-title":"IEEE Eng Med Biol Mag"},{"issue":"6","key":"162_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi H, Joshi JBD, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24\u201331","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"162_CR5","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gen Comput Syst 28(3):583\u2013592","journal-title":"Future Gen Comput Syst"},{"issue":"2","key":"162_CR6","doi-asserted-by":"publisher","first-page":"5057","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50\u201357","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"162_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MCOM.2014.6766086","volume":"52","author":"K Zhang","year":"2014","unstructured":"Zhang K, Liang X, Shen X, Lu R (2014) Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun Mag 52(3):58\u201365","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"162_CR8","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","volume":"20","author":"X Liu","year":"2016","unstructured":"Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on na\u00efve bayesian classification. IEEE J Biomed Health Inf 20(2):655\u2013668","journal-title":"IEEE J Biomed Health Inf"},{"issue":"23","key":"162_CR9","first-page":"6776","volume":"6","author":"M Barua","year":"2011","unstructured":"Barua M, Liang X, Lu R, Shen X (2011) ESPAC: enabling security and patient-centric access control for ehealth in cloud computing. Int J Secur Netw 6(2\u20133):67\u201376","journal-title":"Int J Secur Netw"},{"issue":"5","key":"162_CR10","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCOM.2012.6194388","volume":"50","author":"H Viswanathan","year":"2012","unstructured":"Viswanathan H, Chen B, Pompili D (2012) Research challenges in computation, communication, and context awareness for ubiquitous healthcare. IEEE Commun Mag 50(5):92\u201399","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"162_CR11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TSC.2014.2363654","volume":"9","author":"SH Lee","year":"2016","unstructured":"Lee SH, Song JH, Kim IK (2016) CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans Serv Comput 9(2):241\u2013249","journal-title":"IEEE Trans Serv Comput"},{"issue":"5","key":"162_CR12","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.jcss.2012.11.008","volume":"79","author":"X Zhang","year":"2013","unstructured":"Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542\u2013555","journal-title":"J Comput Syst Sci"},{"issue":"22","key":"162_CR13","doi-asserted-by":"publisher","first-page":"4280","DOI":"10.1016\/j.ins.2008.06.026","volume":"178","author":"A Azadeh","year":"2008","unstructured":"Azadeh A, Fam IM, Khoshnoud M, Nikafrouz M (2008) Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery. Inf Sci 178(22):4280\u20134300,","journal-title":"Inf Sci"},{"key":"162_CR14","first-page":"130141","volume":"284","author":"K Zhang","year":"2014","unstructured":"Zhang K, Liang X, Baura M, Lu R, (Sherman)Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130\u2013141","journal-title":"Inf Sci"},{"key":"162_CR15","doi-asserted-by":"publisher","first-page":"136148","DOI":"10.1016\/j.comnet.2015.06.014","volume":"88","author":"W Wang","year":"2015","unstructured":"Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136\u2013148","journal-title":"Comput Netw"},{"key":"162_CR16","doi-asserted-by":"crossref","unstructured":"Iakovidis I (1998) Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe. Int J Med Inf 52(1\u20133):105\u2013115","DOI":"10.1016\/S1386-5056(98)00129-4"},{"issue":"9","key":"162_CR17","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621\u20131631","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"162_CR18","first-page":"110","volume":"2014","author":"H Li","year":"2014","unstructured":"Li H, Xiong L, Ohno-Machado L, Jiang X (2014) Privacy preserving RBF kernel support vector machine. BioMed Res Int 2014:1\u201310","journal-title":"BioMed Res Int"},{"key":"162_CR19","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: 2010 Proceedings IEEE INFOCOM, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462161"},{"key":"162_CR20","unstructured":"Shi E, Chan T, Rieffel E, Chow R, Song D (2011) Privacy-preserving aggregation of time-series data. In: Proceedings of NDSS"},{"key":"162_CR21","doi-asserted-by":"crossref","unstructured":"Shi J, Zhang R, Liu Y, Zhang Y (2010) PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: 2010 Proceedings IEEE INFOCOM, San Diego, CA, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462147"},{"issue":"1","key":"162_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aej.2016.09.003","volume":"57","author":"BSS Kumar","year":"2018","unstructured":"Kumar BSS, Manjunath AS, Christopher S (2018) Improved entropy encoding for high efficient video coding standard. Alexandria Eng J 57(1):1\u20139","journal-title":"Alexandria Eng J"},{"key":"162_CR23","unstructured":"Kota PN, Gaikwad AN (2017) Optimized scrambling sequence to reduce papr in space frequency block codes based MIMO-OFDM system. J Adv Res Dyn Control Syst:502\u2013525"},{"issue":"4","key":"162_CR24","doi-asserted-by":"publisher","first-page":"274","DOI":"10.22266\/ijies2017.0831.29","volume":"10","author":"K Bhatnagar","year":"2017","unstructured":"Bhatnagar K, Gupta S (2017) Extending the neural model to study the impact of effective area of optical fiber on laser intensity. Int J Intell Eng Syst 10(4):274\u2013283","journal-title":"Int J Intell Eng Syst"},{"issue":"3","key":"162_CR25","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1080\/03772063.2015.1009403","volume":"61","author":"GN Balaji","year":"2015","unstructured":"Balaji GN, Subashini TS, Chidambaram N (2015) Detection of heart muscle damage from automated analysis of echocardiogram video. IETE J Res 61(3):236\u2013243","journal-title":"IETE J Res"},{"key":"162_CR26","doi-asserted-by":"crossref","unstructured":"Bramhe SS, Dalal A, Tajne D, Marotkar D (2015) Glass shaped antenna with defected ground structure for cognitive radio application. In: International conference on computing communication control and automation, Pune, pp 330\u2013333","DOI":"10.1109\/ICCUBEA.2015.69"},{"key":"162_CR27","doi-asserted-by":"publisher","first-page":"235248","DOI":"10.1016\/j.jnca.2012.09.001","volume":"36","author":"A Waqar","year":"2013","unstructured":"Waqar A, Raza A, Abbas H, Khan MK (2013) A framework for preservation of cloudusers\u2019data privacy using dynamic reconstruction of metadata. J Netw Comput Appl 36:235\u2013248","journal-title":"J Netw Comput Appl"},{"key":"162_CR28","unstructured":"Nallakumar MR, Sengottaiyan N, MohamedArif M (2014) Cloud computing and methods for privacy preservation: a survey. IJARCET 3(11)"},{"key":"162_CR29","unstructured":"Yarrapragada KSSR, Krishna BB Impact of tamanu oil-diesel blend on combustion, performance and emissions of diesel engine and its prediction methodology. J Braz Soc Mech Sci Eng:1\u201315"},{"key":"162_CR30","unstructured":"Sreedharan N, Preetha N, Ganesan B, Raveendran R, Sarala P, Dennis B, Rajakumar Boothalingam R (2018) Grey Wolf optimisation-based feature selection and classification for facial emotion recognition. IET Biometr"},{"key":"162_CR31","unstructured":"Sarkar A, Murugan TS (2017) Cluster head selection for energy efficient and delay-less routing in wireless sensor network. Wirel Netw:1\u201318"},{"issue":"3","key":"162_CR32","first-page":"28","volume":"112","author":"AM Wagh","year":"2015","unstructured":"Wagh AM, Todmal SR (2015) Eyelids, eyelashes detection algorithm and hough transform method for noise removal in iris recognition. Int J Comput Appl 112(3):28\u201331","journal-title":"Int J Comput Appl"},{"issue":"4","key":"162_CR33","doi-asserted-by":"publisher","first-page":"042019","DOI":"10.1088\/1757-899X\/263\/4\/042019","volume":"263","author":"M Iyapparaja","year":"2017","unstructured":"Iyapparaja M, Tiwari M (2017) Security policy speculation of user uploaded images on content sharing sites. IOP Conf Ser Mater Sci Eng 263(4):042019","journal-title":"IOP Conf Ser Mater Sci Eng"},{"issue":"2","key":"162_CR34","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.jksues.2015.12.002","volume":"29","author":"D Chandramohan","year":"2017","unstructured":"Chandramohan D, Vengattaraman T, Dhavachelvan P (2017) A secure data privacy preservation for on-demand cloud service. J King Saud Univ Eng Sci 29(2):144\u2013150","journal-title":"J King Saud Univ Eng Sci"},{"issue":"3","key":"162_CR35","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130\u20132145","journal-title":"IEEE Internet Things J"},{"key":"162_CR36","first-page":"5157","volume":"39","author":"Y Liu","year":"2016","unstructured":"Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Rep 39:51\u201357","journal-title":"J Vis Commun Image Rep"},{"issue":"7","key":"162_CR37","doi-asserted-by":"publisher","first-page":"6335","DOI":"10.1016\/j.eswa.2011.12.017","volume":"39","author":"B Wu","year":"2012","unstructured":"Wu B, Qian C, Ni W, Fan S (2012) The improvement of glowworm swarm optimization for continuous optimization problems. Expert Syst Appl 39(7):6335\u20136342","journal-title":"Expert Syst Appl"},{"issue":"1","key":"162_CR38","doi-asserted-by":"publisher","first-page":"205222","DOI":"10.1016\/j.cam.2004.07.034","volume":"184","author":"J McCall","year":"2005","unstructured":"McCall J (2005) Genetic algorithms for modelling and optimisation. J Comput Appl Math 184(1):205\u2013222","journal-title":"J Comput Appl Math"},{"issue":"1","key":"162_CR39","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asoc.2007.05.007","volume":"8","author":"D Karaboga","year":"2008","unstructured":"Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8(1):687\u2013697","journal-title":"Appl Soft Comput"},{"key":"162_CR40","doi-asserted-by":"publisher","first-page":"182202","DOI":"10.1016\/j.ins.2014.09.053","volume":"294","author":"MR Tanweer","year":"2015","unstructured":"Tanweer MR, Suresh S, Sundararajan N (2015) Self regulating particle swarm optimization algorithm. Inf Sci 294:182\u2013202","journal-title":"Inf Sci"},{"key":"162_CR41","doi-asserted-by":"publisher","first-page":"3446","DOI":"10.1016\/j.swevo.2013.06.001","volume":"13","author":"I Fister","year":"2013","unstructured":"Fister I, Fister I Jr, Yang XS, Brest J (2013) A comprehensive review of firefly algorithms. Swarm Evolut Comput 13:34\u201346","journal-title":"Swarm Evolut Comput"},{"key":"162_CR42","doi-asserted-by":"publisher","first-page":"412424","DOI":"10.1016\/j.compeleceng.2018.04.014","volume":"68","author":"D Gupta","year":"2018","unstructured":"Gupta D, Sundaram S, Khanna A, Hassanien AE, de Albuquerque VHC (2018) Improved diagnosis of Parkinson\u2019s disease using optimized crow search algorithm. Comput Electr Eng 68:412\u2013424","journal-title":"Comput Electr Eng"},{"issue":"5","key":"162_CR43","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TEVC.2009.2011992","volume":"13","author":"S He","year":"2009","unstructured":"He S, Wu QH, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973\u2013990","journal-title":"IEEE Trans Evol Comput"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-018-0162-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-018-0162-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-018-0162-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T10:40:11Z","timestamp":1751798411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-018-0162-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,16]]},"references-count":43,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["162"],"URL":"https:\/\/doi.org\/10.1007\/s12065-018-0162-4","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,16]]},"assertion":[{"value":"22 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}