{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T09:43:19Z","timestamp":1765618999088,"version":"3.48.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s13042-025-02785-9","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T03:54:57Z","timestamp":1757562897000},"page":"10541-10567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An intelligent hybrid encryption framework for cloud systems in cybernetics using ISSO and Paillier cryptosystem"],"prefix":"10.1007","volume":"16","author":[{"given":"R. S.","family":"Kanakasabapathi","sequence":"first","affiliation":[]},{"given":"J. E.","family":"Judith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"2785_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100856","volume":"29","author":"S Mohammed","year":"2023","unstructured":"Mohammed S, Nanthini S, Krishna NB, Srinivas IV, Rajagopal M, Kumar MA (2023) A new lightweight data security system for data security in the cloud computing. Meas Sensors 29:100856","journal-title":"Meas Sensors"},{"issue":"2","key":"2785_CR2","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1007\/s40815-021-01104-y","volume":"24","author":"A Mohiyuddin","year":"2022","unstructured":"Mohiyuddin A, Javed AR, Chakraborty C, Rizwan M, Shabbir M, Nebhen J (2022) Secure cloud storage for medical IoT data using adaptive neuro-fuzzy inference system. Int J Fuzzy Syst 24(2):1203\u20131215","journal-title":"Int J Fuzzy Syst"},{"key":"2785_CR3","doi-asserted-by":"publisher","unstructured":"Mostafa RR, Khedr AM, AL, Aghbari Z (2025) A multi-strategy improved electric eel foraging optimization algorithm: continuous and binary variants for solving optimization problems. Int. J. Mach. Learn. & Cyber. https:\/\/doi.org\/10.1007\/s13042-025-02609-w","DOI":"10.1007\/s13042-025-02609-w"},{"key":"2785_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124428","volume":"255","author":"BC Preethi","year":"2024","unstructured":"Preethi BC, Vasanthi R, Sugitha G, Lakshmi SA (2024) Intrusion detection and secure data storage in the cloud were recommend by a multiscale deep bidirectional gated recurrent neural network. Expert Syst Appl 255:124428","journal-title":"Expert Syst Appl"},{"key":"2785_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108426","volume":"104","author":"S Namasudra","year":"2022","unstructured":"Namasudra S (2022) A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure. Comput Electr Eng 104:108426","journal-title":"Comput Electr Eng"},{"issue":"4","key":"2785_CR6","doi-asserted-by":"publisher","first-page":"695","DOI":"10.3390\/sym14040695","volume":"14","author":"MB Qureshi","year":"2022","unstructured":"Qureshi MB, Qureshi MS, Tahir S, Anwar A, Hussain S, Uddin M, Chen CL (2022) Encryption techniques for smart systems data security offloaded to the cloud. Symmetry 14(4):695","journal-title":"Symmetry"},{"key":"2785_CR7","volume":"74","author":"X Li","year":"2023","unstructured":"Li X, Li H, Gao J, Wang R (2023) Privacy preserving via multi-key homomorphic encryption in cloud computing. J Inf Secur Appl 74:103463","journal-title":"J Inf Secur Appl"},{"key":"2785_CR8","doi-asserted-by":"publisher","first-page":"4828","DOI":"10.1016\/j.matpr.2022.03.420","volume":"62","author":"S Ahmad","year":"2022","unstructured":"Ahmad S, Mehfuz S, Beg J (2022) Cloud security framework and key management services collectively for implementing DLP and IRM. Mater Today Proc 62:4828\u20134836","journal-title":"Mater Today Proc"},{"issue":"1","key":"2785_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-022-03832-x","volume":"15","author":"W El-Shafai","year":"2024","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA (2024) Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services. J Ambient Intell Humaniz Comput 15(1):1\u201328","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2785_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109208","volume":"116","author":"S Adelipour","year":"2024","unstructured":"Adelipour S, Haeri M (2024) Private outsourced model predictive control via secure multi-party computation. Comput Electr Eng 116:109208","journal-title":"Comput Electr Eng"},{"key":"2785_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121494","volume":"237","author":"E Gokcay","year":"2024","unstructured":"Gokcay E, Tora H (2024) A novel data encryption method using an interlaced chaotic transform. Expert Syst Appl 237:121494","journal-title":"Expert Syst Appl"},{"key":"2785_CR12","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.matpr.2021.04.303","volume":"81","author":"V Krishnasamy","year":"2023","unstructured":"Krishnasamy V, Venkatachalam S (2023) An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using index-level boundary pattern convergent encryption algorithm. Mater Today Proc 81:931\u2013936","journal-title":"Mater Today Proc"},{"key":"2785_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2023.100027","volume":"2","author":"A Shahnawaz","year":"2024","unstructured":"Shahnawaz A, Shabana M (2024) Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Security Appl 2:100027","journal-title":"Cyber Security Appl"},{"issue":"4","key":"2785_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.3390\/bdcc6040101","volume":"6","author":"MN Ramachandra","year":"2022","unstructured":"Ramachandra MN, Srinivasa Rao M, Lai WC, Parameshachari BD, Ananda Babu J, Hemalatha KL (2022) An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data Cogn Comput 6(4):101","journal-title":"Big Data Cogn Comput"},{"key":"2785_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2022.102651","volume":"121","author":"S Sasikumar","year":"2022","unstructured":"Sasikumar S, Sundar K, Jayakumar C, Obaidat MS, Stephan T, Hsiao KF (2022) Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment. Simul Model Pract Theory 121:102651","journal-title":"Simul Model Pract Theory"},{"key":"2785_CR16","volume":"73","author":"S Gadde","year":"2023","unstructured":"Gadde S, Amutharaj J, Usha S (2023) A security model to protect the isolation of medical data in the cloud using hybrid cryptography. J Inf Secur Appl 73:103412","journal-title":"J Inf Secur Appl"},{"key":"2785_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100870","volume":"29","author":"BR Rao","year":"2023","unstructured":"Rao BR, Sujatha B (2023) A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security. Meas Sensors 29:100870","journal-title":"Meas Sensors"},{"issue":"1","key":"2785_CR18","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1186\/s13677-023-00425-7","volume":"12","author":"C Rupa","year":"2023","unstructured":"Rupa C, Greeshmanth SMA (2023) Novel secure data protection scheme using Martino homomorphic encryption. J Cloud Comput 12(1):47","journal-title":"J Cloud Comput"},{"issue":"1","key":"2785_CR19","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1186\/s13677-022-00336-z","volume":"11","author":"R Priyadarshini","year":"2022","unstructured":"Priyadarshini R, Quadir MA, Rajendran N, Neelanarayanan V, Sabireen H (2022) An enhanced encryption-based security framework in the CPS cloud. J Cloud Comput 11(1):64","journal-title":"J Cloud Comput"},{"issue":"4","key":"2785_CR20","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s10619-021-07352-z","volume":"40","author":"P Shanmugapriya","year":"2022","unstructured":"Shanmugapriya P (2022) DLFPM-SSO-PE: privacy-preserving and security of intermediate data in cloud storage. Distrib Parallel Databases 40(4):815\u2013833","journal-title":"Distrib Parallel Databases"},{"issue":"3","key":"2785_CR21","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1007\/s13198-023-01896-2","volume":"14","author":"UR Saxena","year":"2023","unstructured":"Saxena UR, Alam T (2023) Role-based access using partial homomorphic encryption for securing cloud data. Int J Syst Assur Eng Manag 14(3):950\u2013966","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"5","key":"2785_CR22","doi-asserted-by":"publisher","first-page":"605","DOI":"10.3390\/sym16050605","volume":"16","author":"SW Zahra","year":"2024","unstructured":"Zahra SW, Nadeem M, Arshad A, Riaz S, Ahmed W, Abu Bakr M, Alabrah A (2024) Emergence of novel WEDEx-Kerberotic cryptographic framework to strengthen the cloud data security against malicious attacks. Symmetry 16(5):605","journal-title":"Symmetry"},{"key":"2785_CR23","doi-asserted-by":"crossref","unstructured":"Chandramohan D, Vengattaraman T, Rajaguru D, Baskaran R, Dhavachelvan P (2013) A novel framework to prevent privacy breach in cloud data storage area service. In:\u00a02013 international conference on green high performance computing (ICGHPC). IEEE.\u00a0pp. 1\u20134.","DOI":"10.1109\/ICGHPC.2013.6533903"},{"issue":"2","key":"2785_CR24","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2022","unstructured":"Gupta R, Gupta I, Singh AK, Saxena D, Lee CN (2022) An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst J 17(2):2445\u20132454","journal-title":"IEEE Syst J"},{"issue":"4","key":"2785_CR25","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LNET.2022.3200724","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Makkar A, Singh AK (2022) Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Netw Lett 4(4):174\u2013178","journal-title":"IEEE Netw Lett"},{"issue":"4","key":"2785_CR26","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Singh AK (2022) Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Networking Lett 4(4):217\u2013221","journal-title":"IEEE Networking Lett"},{"issue":"3","key":"2785_CR27","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta R, Singh AK (2022) A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. New Gener Comput 40(3):737\u2013764","journal-title":"New Gener Comput"},{"issue":"23","key":"2785_CR28","doi-asserted-by":"publisher","first-page":"33127","DOI":"10.1007\/s11042-021-11751-w","volume":"81","author":"AK Singh","year":"2022","unstructured":"Singh AK, Gupta R (2022) A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimedia Tools Appl 81(23):33127\u201333150","journal-title":"Multimedia Tools Appl"},{"key":"2785_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2024.119944","volume":"223","author":"I Ahmed","year":"2024","unstructured":"Ahmed I, Rehan M, Basit A, Malik SH, Ahmed W, Hong KS (2024) Adaptive salp swarm algorithm for sustainable economic and environmental dispatch under renewable energy sources. Renew Energy 223:119944","journal-title":"Renew Energy"},{"key":"2785_CR30","doi-asserted-by":"publisher","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"JW Lee","year":"2022","unstructured":"Lee JW, Kang H, Lee Y, Choi W, Eom J, Deryabin M, Lee E, Lee J, Yoo D, Kim YS, No JS (2022) Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10:30039\u201330054","journal-title":"IEEE Access"},{"key":"2785_CR31","unstructured":"Kanakasabapathi RS, Judith JE (2023) An augmented salp-swarm optimization based on Paillier federated multi-layer perceptron (Pf-mlp) and homomorphic encryption standard (Hes) techniques for data security in cloud systems."},{"key":"2785_CR32","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.future.2024.04.039","volume":"158","author":"J Li","year":"2024","unstructured":"Li J, Yan M, Peng J, Huang H, Abd El-Latif AA (2024) A lattice-based efficient certificateless public key encryption for big data security in clouds. Future Gener Comput Syst 158:255\u2013266","journal-title":"Future Gener Comput Syst"},{"key":"2785_CR33","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.isprsjprs.2022.12.023","volume":"196","author":"S Monji-Azad","year":"2023","unstructured":"Monji-Azad S, Hesser J, L\u00f6w N (2023) A review of non-rigid transformations and learning-based 3D point cloud registration methods. ISPRS J Photogramm Remote Sens 196:58\u201372","journal-title":"ISPRS J Photogramm Remote Sens"},{"key":"2785_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103163","volume":"128","author":"Y Wang","year":"2023","unstructured":"Wang Y, Chen L, Wu G, Yu K, Lu T (2023) Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing. Comput Secur 128:103163","journal-title":"Comput Secur"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02785-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02785-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02785-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T09:40:35Z","timestamp":1765618835000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02785-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":34,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["2785"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02785-9","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"15 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}