{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:45:59Z","timestamp":1768722359593,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T00:00:00Z","timestamp":1588204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T00:00:00Z","timestamp":1588204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s12065-020-00404-w","type":"journal-article","created":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T06:03:42Z","timestamp":1588226622000},"page":"691-698","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":84,"title":["Hybrid encryption framework for securing big data storage in multi-cloud environment"],"prefix":"10.1007","volume":"14","author":[{"given":"G.","family":"Viswanath","sequence":"first","affiliation":[]},{"given":"P. Venkata","family":"Krishna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,30]]},"reference":[{"key":"404_CR1","unstructured":"Canalys 2018. https:\/\/www.canalys.com\/newsroom\/cloud-market-share-q4-2018-and-full-year-2018. Accessed 11 Jan 2019"},{"key":"404_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of \u201cbig data\u201d on cloud computing: review and open research issues. Inf Syst 47:98\u2013115","journal-title":"Inf Syst"},{"key":"404_CR3","doi-asserted-by":"crossref","unstructured":"AlZain, MA., Eric P, Ben S, James AT (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 5490\u20135499","DOI":"10.1109\/HICSS.2012.153"},{"issue":"1","key":"404_CR4","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"key":"404_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.future.2013.06.029","volume":"30","author":"R Li","year":"2014","unstructured":"Li R, Xu Z, Kang W, Yow KC, Xu CZ (2014) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179\u2013190","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"404_CR6","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"404_CR7","doi-asserted-by":"crossref","unstructured":"Somani U, Kanika L, Manish M (2010) Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In: 2010 First international conference on parallel, distributed and grid computing (PDGC 2010). IEEE, pp. 211\u2013216","DOI":"10.1109\/PDGC.2010.5679895"},{"issue":"1","key":"404_CR8","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10586-017-0849-9","volume":"21","author":"P Li","year":"2018","unstructured":"Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2018) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21(1):277\u2013286","journal-title":"Cluster Comput"},{"issue":"11","key":"404_CR9","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","volume":"8","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X, Ren K, Zhang Bo, Xie R (2013) DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans Inf Forensics Secur 8(11):1790\u20131801","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"404_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li M, Shucheng Yu, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"404_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"J-J Yang","year":"2015","unstructured":"Yang J-J, Li J-Q, Niu Yu (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74\u201386","journal-title":"Future Gener Comput Syst"},{"key":"404_CR12","doi-asserted-by":"crossref","unstructured":"Akioka S, Muraoka Y (2010) HPC benchmarks on Amazon EC2, IEEE, pp 1029\u20131034","DOI":"10.1109\/WAINA.2010.166"},{"key":"404_CR13","unstructured":"O\u2019Reilly Media: https:\/\/www.oreilly.com\/ideas\/what-is-big-data"},{"key":"404_CR14","first-page":"611","volume":"16","author":"F Wang","year":"2016","unstructured":"Wang F, Mickens J, Zeldovich N, Vaikuntanathan V (2016) Sieve: cryptographically enforced access control for user data in untrusted clouds. NSDI 16:611\u2013626","journal-title":"NSDI"},{"key":"404_CR15","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1016\/j.procs.2016.07.286","volume":"93","author":"AP Singh","year":"2016","unstructured":"Singh AP, Pasupuleti SK (2016) Optimized public auditing and data dynamics for data storage security in cloud computing. Proc Comput Sci 93:751\u2013759","journal-title":"Proc Comput Sci"},{"issue":"4","key":"404_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.4018\/IJACI.2017100103","volume":"8","author":"H Matallah","year":"2017","unstructured":"Matallah H, Belalem G, Bouamrane K (2017) Towards a new model of storage and access to data in big data and cloud computing. Int J Ambient Comput Intell 8(4):31\u201344","journal-title":"Int J Ambient Comput Intell"},{"key":"404_CR17","doi-asserted-by":"crossref","unstructured":"Manogaran G, Thota C, Lopez D, Sundarasekar R (2017) Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0. Springer, Cham, pp 103\u2013126","DOI":"10.1007\/978-3-319-50660-9_5"},{"key":"404_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.simpat.2016.10.011","volume":"76","author":"A Jak\u00f3bik","year":"2017","unstructured":"Jak\u00f3bik A, Grzonka D, Palmieri F (2017) Non-deterministic security driven meta scheduler for distributed cloud organizations. Simul Model Pract Theory 76:67\u201381","journal-title":"Simul Model Pract Theory"},{"issue":"1","key":"404_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JIOT.2016.2619369","volume":"4","author":"H Cai","year":"2017","unstructured":"Cai H, Boyi Xu, Jiang L, Vasilakos AV (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things J 4(1):75\u201387","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"404_CR20","first-page":"53","volume":"4","author":"IA Althamary","year":"2016","unstructured":"Althamary IA, Alkharobi TM (2016) Secure file sharing in multi-cloud using shamir\u2019s secret sharing scheme. Trans Netw Commun 4(6):53\u201367","journal-title":"Trans Netw Commun"},{"key":"404_CR21","doi-asserted-by":"crossref","unstructured":"Jouini M, Rabai LBA (2019) A security framework for secure cloud computing environments. In: Cloud security: concepts, methodologies, tools, and applications. IGI Global, pp. 249\u2013263","DOI":"10.4018\/978-1-5225-8176-5.ch011"},{"issue":"9","key":"404_CR22","doi-asserted-by":"publisher","first-page":"2320","DOI":"10.1109\/TIFS.2018.2818651","volume":"13","author":"M Du","year":"2018","unstructured":"Du M, Wang Q, He M, Weng J (2018) Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans Inf Forensics Secur 13(9):2320\u20132332","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"404_CR23","doi-asserted-by":"crossref","unstructured":"Kuwakado H, Morii M (2010) Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE international symposium on information theory. IEEE, pp 2682\u20132685","DOI":"10.1109\/ISIT.2010.5513654"},{"issue":"15","key":"404_CR24","first-page":"15","volume":"13","author":"P Mahajan","year":"2013","unstructured":"Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15\u201322","journal-title":"Glob J Comput Sci Technol"},{"issue":"4","key":"404_CR25","first-page":"592","volume":"3","author":"G Devi","year":"2012","unstructured":"Devi G, Kumar MP (2012) Cloud computing: a CRM service based on a separate encryption and decryption using Blowfish Algorithm. Int J Comput Trends Technol 3(4):592\u2013596","journal-title":"Int J Comput Trends Technol"},{"key":"404_CR26","unstructured":"Lu CC, Tseng SY (2002) Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In: Proceedings. The IEEE international conference on application-specific systems, architectures and processors. IEEE, pp 277\u2013285"},{"key":"404_CR27","unstructured":"Rivest RL, Robshaw MJ, Sidney R, Yin YL (1998) The RC6 block cipher. In: First advanced encryption standard (AES) conference"},{"key":"404_CR28","unstructured":"Health Data: https:\/\/healthdata.gov\/search\/type\/dataset. Accessed on 12 Apr 2019"},{"key":"404_CR29","first-page":"216","volume":"10","author":"DS Elminaam","year":"2010","unstructured":"Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10:216\u2013222","journal-title":"IJ Netw Secur"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-020-00404-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-020-00404-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-020-00404-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T06:28:43Z","timestamp":1622442523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-020-00404-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,30]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["404"],"URL":"https:\/\/doi.org\/10.1007\/s12065-020-00404-w","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,30]]},"assertion":[{"value":"13 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}