{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:05:01Z","timestamp":1750997101603,"version":"3.41.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13198-025-02805-5","type":"journal-article","created":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T04:03:37Z","timestamp":1748145817000},"page":"2066-2077","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of cloud-based security model with multiple CSPs"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8424-0831","authenticated-orcid":false,"given":"Megha","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Sakshi","family":"Sobti","sequence":"additional","affiliation":[]},{"given":"Kshipra","family":"Jain","sequence":"additional","affiliation":[]},{"given":"N.","family":"Gobi","sequence":"additional","affiliation":[]},{"given":"Nitish","family":"Vashisht","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"issue":"9","key":"2805_CR1","first-page":"379","volume":"16","author":"S Achar","year":"2022","unstructured":"Achar S (2022) Cloud computing security for multi-cloud service providers: controls and techniques in our modern threat landscape. Int J Comput Syst Eng 16(9):379\u2013384","journal-title":"Int J Comput Syst Eng"},{"issue":"1","key":"2805_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.54692\/ijeci.2023.0701125","volume":"7","author":"H Akbar","year":"2023","unstructured":"Akbar H, Zubair M, Malik MS (2023) The security issues and challenges in cloud computing. Int J Electron Crime Investig 7(1):13\u201332. https:\/\/doi.org\/10.54692\/ijeci.2023.0701125","journal-title":"Int J Electron Crime Investig"},{"issue":"10","key":"2805_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9734\/JERR\/2023\/v25i10995","volume":"25","author":"B Cinar","year":"2023","unstructured":"Cinar B (2023) The role of cloud service brokers: enhancing security and compliance in multi-cloud environments. J Eng Res Rep 25(10):1\u201311. https:\/\/doi.org\/10.9734\/JERR\/2023\/v25i10995","journal-title":"J Eng Res Rep"},{"key":"2805_CR4","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.020213","author":"DS David","year":"2022","unstructured":"David DS, Anam M, Kaliappan C, Selvi S, Sharma DK, Dadheech P, Sengan S (2022) Cloud security service for identifying unauthorized user behaviour. Comput Mater Continua. https:\/\/doi.org\/10.32604\/cmc.2022.020213","journal-title":"Comput Mater Continua"},{"issue":"1","key":"2805_CR5","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1515\/comp-2020-0214","volume":"11","author":"W Elmasry","year":"2021","unstructured":"Elmasry W, Akbulut A, Zaim AH (2021) A design of an integrated cloud-based intrusion detection system with third-party cloud service. Open Comput Sci 11(1):365\u2013379. https:\/\/doi.org\/10.1515\/comp-2020-0214","journal-title":"Open Comput Sci"},{"key":"2805_CR6","doi-asserted-by":"publisher","unstructured":"Guptha A, Murali H, Subbulakshmi T (2021) A comparative analysis of security services in major cloud service providers. In: 2021 5th international conference on intelligent computing and control systems (ICICCS). IEEE, pp 129\u2013136. https:\/\/doi.org\/10.1109\/ICICCS51141.2021.9432189","DOI":"10.1109\/ICICCS51141.2021.9432189"},{"key":"2805_CR7","doi-asserted-by":"publisher","unstructured":"Jabber SA, Hashem S, Jafer S (2023) Secure cloud computing by a dual-layer encryption mechanism. https:\/\/doi.org\/10.20944\/preprints202312.0615.v1","DOI":"10.20944\/preprints202312.0615.v1"},{"key":"2805_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-024-02551-0","author":"S Kaur","year":"2024","unstructured":"Kaur S, Khare MD, Bhatt M, Haripriya V, Kumar A, Singla A (2024) Multi-cloud security model: establishment of inter-server communication for authentication integrity. Int J Syst Assur Eng Manag. https:\/\/doi.org\/10.1007\/s13198-024-02551-0","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"8","key":"2805_CR9","doi-asserted-by":"publisher","first-page":"10307","DOI":"10.1007\/s13369-021-06512-8","volume":"47","author":"S Mandal","year":"2022","unstructured":"Mandal S, Khan DA (2022) Cloud-CoCoSo: cloud model-based combined compromised solution model for trusted cloud service provider selection. Arab J Sci Eng 47(8):10307\u201310332. https:\/\/doi.org\/10.1007\/s13369-021-06512-8","journal-title":"Arab J Sci Eng"},{"key":"2805_CR10","first-page":"51","volume":"12","author":"N Mohammad","year":"2021","unstructured":"Mohammad N (2021) Enhancing security and privacy in multi-cloud environments: a comprehensive study on encryption techniques and access control mechanisms. Int J Comput Eng Technol (IJCET) 12:51\u201363","journal-title":"Int J Comput Eng Technol (IJCET)"},{"issue":"19","key":"2805_CR11","doi-asserted-by":"publisher","first-page":"10871","DOI":"10.3390\/app131910871","volume":"13","author":"AM Mostafa","year":"2023","unstructured":"Mostafa AM, Ezz M, Elbashir MK, Alruily M, Hamouda E, Alsarhani M, Said W (2023) Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication. Appl Sci 13(19):10871. https:\/\/doi.org\/10.3390\/app131910871","journal-title":"Appl Sci"},{"key":"2805_CR12","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1007\/s12065-020-00555-w","volume":"14","author":"S Pachala","year":"2021","unstructured":"Pachala S, Rupa C, Sumalatha L (2021) An improved security and privacy management system for data in multi-cloud environments using a hybrid approach. Evol Intell 14:1117\u20131133. https:\/\/doi.org\/10.1007\/s12065-020-00555-w","journal-title":"Evol Intell"},{"key":"2805_CR13","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.018993","author":"NR Paul","year":"2021","unstructured":"Paul NR, Raj DP (2021) Enhanced trust based access control for multi-cloud environment. Comput Mater Continua. https:\/\/doi.org\/10.32604\/cmc.2021.018993","journal-title":"Comput Mater Continua"},{"issue":"4","key":"2805_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.3390\/bdcc6040101","volume":"6","author":"MN Ramachandra","year":"2022","unstructured":"Ramachandra MN, Srinivasa Rao M, Lai WC, Parameshachari BD, Ananda Babu J, Hemalatha KL (2022) An efficient and secure big data storage in cloud environment by using triple data encryption standard. Big Data Cogn Comput 6(4):101. https:\/\/doi.org\/10.3390\/bdcc6040101","journal-title":"Big Data Cogn Comput"},{"key":"2805_CR15","doi-asserted-by":"publisher","unstructured":"Ramamurthy A, Saurabh S, Gharote M, Lodha S (2020) Selection of cloud service providers for hosting web applications in a multi-cloud environment. In: 2020 IEEE international conference on services computing (SCC). IEEE, pp 202\u2013209. https:\/\/doi.org\/10.1109\/SCC49832.2020.00034","DOI":"10.1109\/SCC49832.2020.00034"},{"key":"2805_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/4943225","volume":"2022","author":"DK Saini","year":"2022","unstructured":"Saini DK, Kumar K, Gupta P (2022) Security issues in IoT and cloud computing servicmodels with suggested solutions. Secur Commun Netw 2022:1\u20139. https:\/\/doi.org\/10.1155\/2022\/4943225","journal-title":"Secur Commun Netw"},{"issue":"4","key":"2805_CR17","first-page":"929","volume":"21","author":"R Senthilkumar","year":"2020","unstructured":"Senthilkumar R, Geetha BG (2020) Asymmetric key blum-goldwasser cryptography for cloud services communication security. J Internet Technol 21(4):929\u2013939","journal-title":"J Internet Technol"},{"key":"2805_CR18","doi-asserted-by":"crossref","unstructured":"Seth D, Nerella H, Najana M, Tabbassum A (2024) Navigating the multi-cloud maze: benefits, challenges, and future trends. Int J Glob Innov Solut (IJGIS)","DOI":"10.21428\/e90189c8.8c704fe4"},{"key":"2805_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6629449","volume":"2021","author":"M Soleymani","year":"2021","unstructured":"Soleymani M, Abapour N, Taghizadeh E, Siadat S, Karkehabadi R (2021) Fuzzy rule-based trust management model for the security of cloud computing. Math Probl Eng 2021:1\u201314. https:\/\/doi.org\/10.1155\/2021\/6629449","journal-title":"Math Probl Eng"},{"key":"2805_CR20","doi-asserted-by":"publisher","unstructured":"Vijayaraj A, Murugan VP, Sudhir R, Sree R (2024) Enhancing security for dual access control for cloud based data storage and sharing. In: 2024 international conference on computing and data science (ICCDS). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCDS60734.2024.10560374","DOI":"10.1109\/ICCDS60734.2024.10560374"},{"key":"2805_CR21","doi-asserted-by":"publisher","unstructured":"Waseem M, Ahmad A, Liang P, Akbar MA, Khan AA, Ahmad I, Set\u00e4l\u00e4 M, Mikkonen T (2024) Containerization in multi-cloud environment: roles, strategies, challenges, and solutions for effective implementation. https:\/\/doi.org\/10.48550\/arXiv.2403.12980. arXiv:2403.12980","DOI":"10.48550\/arXiv.2403.12980"},{"key":"2805_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-022-00617-9","author":"S Zhao","year":"2023","unstructured":"Zhao S, Miao J, Zhao J, Naghshbandi N (2023) A comprehensive and systematic review of the banking systems based on pay-as-you-go payment fashion and cloud computing in the pandemic era. Inf Syst e-Bus Manag. https:\/\/doi.org\/10.1007\/s10257-022-00617-9","journal-title":"Inf Syst e-Bus Manag"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02805-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02805-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02805-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T08:45:44Z","timestamp":1750927544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02805-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,25]]},"references-count":22,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2805"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02805-5","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2025,5,25]]},"assertion":[{"value":"30 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}