{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:55:58Z","timestamp":1755600958987},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T00:00:00Z","timestamp":1673568000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T00:00:00Z","timestamp":1673568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Intell Robot Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s41315-022-00268-6","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T03:02:49Z","timestamp":1673578969000},"page":"406-425","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation"],"prefix":"10.1007","volume":"7","author":[{"given":"Yogesh B.","family":"Gurav","sequence":"first","affiliation":[]},{"given":"Bankat M.","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"key":"268_CR1","first-page":"9","volume-title":"Proceedings of the international conference on microelectronics, Computing and communication systems","author":"R Ali","year":"2018","unstructured":"Ali, R., Ak, P.: A secure three-factor remote user authentication scheme using elliptic curve cryptosystem. In: Proceedings of the international conference on microelectronics, Computing and communication systems, pp. 9\u201324. Springer, Singapore (2018a)"},{"issue":"4","key":"268_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3484","volume":"31","author":"R Ali","year":"2018","unstructured":"Ali, R., Pal, A.K.: An efficient three factor\u2013based authentication scheme in multiserver environment using ECC. Int. J. Commun. Syst. 31(4), e3484 (2018b)","journal-title":"Int. J. Commun. Syst."},{"key":"268_CR3","doi-asserted-by":"crossref","unstructured":"Alqahtani, F., Salahaldeen, D., Predrag, T.T., Frederick, T.S.: Information flow control to secure data in the cloud. In: International Conference on Computational Science and Computational Intelligence (CSCI) (2020)","DOI":"10.1109\/CSCI51800.2020.00241"},{"key":"268_CR6","doi-asserted-by":"crossref","unstructured":"Anandkumar, R., Kalpana, R.: A review on chaos-based image encryption using fractal function. Exam Fractal Image Process. Anal. 23\u201337 (2020)","DOI":"10.4018\/978-1-7998-0066-8.ch002"},{"key":"268_CR4","doi-asserted-by":"publisher","first-page":"3713","DOI":"10.1007\/s12652-021-03659-y","volume":"13","author":"R Anandkumar","year":"2022","unstructured":"Anandkumar, R., Kalpana, R.: A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm. J. Ambient. Intell. Humaniz. Comput. 13, 3713\u20133727 (2022)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"268_CR5","doi-asserted-by":"publisher","first-page":"107860","DOI":"10.1016\/j.compeleceng.2022.107860","volume":"100","author":"R Anandkumar","year":"2022","unstructured":"Anandkumar, R., Dinesh, K., Obaid, A.J., Malik, P., Sharma, R., Dumka, A., Singh, R., Khatak, S.: Securing e-Health application of cloud computing using hyperchaotic image encryption framework. Comput. Electr. Eng. 100, 107860 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"268_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.24","author":"T Bauerei\u00df","year":"2017","unstructured":"Bauerei\u00df, T., Gritti, A.P., Popescu, A., Raimondi, F.: CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. IEEE Symp. Secur. Privacy (SP) (2017). https:\/\/doi.org\/10.1109\/SP.2017.24","journal-title":"IEEE Symp. Secur. Privacy (SP)"},{"key":"268_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245","author":"A Bhagyashri","year":"2014","unstructured":"Bhagyashri, A., Gurav, Y.B.: Privacy-preserving public auditing for secure cloud storage. IOSR J. Comput. Eng. (2014). https:\/\/doi.org\/10.1109\/TC.2011.245","journal-title":"IOSR J. Comput. Eng."},{"issue":"10","key":"268_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4834","volume":"34","author":"P Bhuarya","year":"2021","unstructured":"Bhuarya, P., Chandrakar, P., Ali, R., Sharaff, A.: An enhanced authentication scheme for Internet of Things and cloud based on elliptic curve cryptography. Int. J. Commun. Syst. 34(10), e4834 (2021)","journal-title":"Int. J. Commun. Syst."},{"key":"268_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/SIBCON.2015.7147170","author":"I Bolodurina","year":"2015","unstructured":"Bolodurina, I., Parfenov, D., Shukhman, A.: Approach to the effective controlling cloud computing resources in data centers for providing multimedia services. Int. Sib. Conf. Control Commun. (SIBCON) (2015). https:\/\/doi.org\/10.1109\/SIBCON.2015.7147170","journal-title":"Int. Sib. Conf. Control Commun. (SIBCON)"},{"key":"268_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC.2015.7380915","author":"D Candotti","year":"2015","unstructured":"Candotti, D., Steel, M.D.W., West, A.C.: Charting the course for Tasmania\u2019s energy cloud roadmap IEEE PES Asia-Pacific power and energy engineering conference (APPEEC). IEEE PES Asia-Pacific Power Energy Eng. Conf. (APPEEC) (2015). https:\/\/doi.org\/10.1109\/APPEEC.2015.7380915","journal-title":"IEEE PES Asia-Pacific Power Energy Eng. Conf. (APPEEC)"},{"key":"268_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.future.2021.08.008","volume":"126","author":"A Cuzzocrea","year":"2022","unstructured":"Cuzzocrea, A., Panagiotis, K., Akrivi, V.: Effective and efficient skyline query processing over attribute-order-preserving-free encrypted data in cloud-enabled databases. Future Gener. Comput. Syst. 126, 237\u2013251 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"268_CR13","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.engappai.2019.08.025","volume":"86","author":"S Hamid","year":"2019","unstructured":"Hamid, S., Moosavi, S.H., Bardsiri, V.K.: Poor and rich optimization algorithm: a new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 86, 165\u2013181 (2019)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"8","key":"268_CR14","doi-asserted-by":"publisher","first-page":"e4729","DOI":"10.1002\/cpe.4729","volume":"31","author":"A Khurshid","year":"2019","unstructured":"Khurshid, A., Khan, A.N., Khan, F.G., Ali, M., Shuja, J., Khan, A.U.: Secure-CamFlow: a device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. 31(8), e4729 (2019)","journal-title":"Concurr. Comput."},{"key":"268_CR15","doi-asserted-by":"publisher","first-page":"52018","DOI":"10.1109\/ACCESS.2020.2980739","volume":"8","author":"MA Khan","year":"2020","unstructured":"Khan, M.A., Quasim, M.T., Alghamdi, N.S., Khan, M.Y.: A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data. IEEE Access 8, 52018\u201352027 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2980739","journal-title":"IEEE Access"},{"key":"268_CR16","doi-asserted-by":"crossref","unstructured":"Mane, P.S., Gurav, Y.B.: A survey on information flow control for secure cloud computing. Int. J. Innov. Res. Comput. Commun. Eng 11, 76\u201389 (2015)","DOI":"10.1109\/TNSM.2013.122313.130423"},{"key":"268_CR17","unstructured":"Mane, P.S., Gurav, Y.B.: Secure cloud computing using decentralized information flow control. Int. Adv. Res. J. Sci. Eng. Technol 3, 167\u2013170 (2016)"},{"key":"268_CR18","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s11277-019-06540-6","volume":"108","author":"H Naeem","year":"2019","unstructured":"Naeem, H.: Detection of malicious activities in internet of things environment based on binary visualization and machine intelligence. Wirel. Pers. Commun. 108, 2609\u20132629 (2019)","journal-title":"Wirel. Pers. Commun."},{"key":"268_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.71","author":"TFJ Pasquier","year":"2015","unstructured":"Pasquier, T.F.J., Powles, J.E.: Expressing and enforcing location requirements in the cloud using information flow control. IEEE Int. Conf. Cloud Eng. (2015). https:\/\/doi.org\/10.1109\/IC2E.2015.71","journal-title":"IEEE Int. Conf. Cloud Eng."},{"issue":"3","key":"268_CR20","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TCC.2015.2489211","volume":"5","author":"TFJ Pasquier","year":"2017","unstructured":"Pasquier, T.F.J., Singh, J., Eyers, D., Bacon, J.: Camflow: managed data-sharing for cloud services. IEEE Trans. Cloud Comput. 5(3), 472\u2013484 (2017). https:\/\/doi.org\/10.1109\/TCC.2015.2489211","journal-title":"IEEE Trans. Cloud Comput."},{"key":"268_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.19","author":"TFJ Pasquier","year":"2019","unstructured":"Pasquier, T.F.J., Singh, J., Bacon, J., Eyers, D.: Information flow audit for PaaS clouds. IEEE Int. Conf. Cloud Eng. (ICE) (2019). https:\/\/doi.org\/10.1109\/IC2E.2016.19","journal-title":"IEEE Int. Conf. Cloud Eng. (ICE)"},{"key":"268_CR22","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s00382-020-05520-y","volume":"56","author":"S Patra","year":"2021","unstructured":"Patra, S., Kalapureddy, M.C.R.: Cloud radar observations of multi-scale variability of cloud vertical structure associated with Indian summer monsoon over a tropical location. Clim. Dyn. 56, 1055\u20131081 (2021)","journal-title":"Clim. Dyn."},{"key":"268_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2018.8524164","author":"A Phatak","year":"2018","unstructured":"Phatak, A., Kadikar, R., Vijayan, K., Amutha, B.: Performance analysis of firewall based on SDN and open flow. Int. Conf. Commun. Signal. Process. (ICCSP) (2018). https:\/\/doi.org\/10.1109\/ICCSP.2018.8524164","journal-title":"Int. Conf. Commun. Signal. Process. (ICCSP)"},{"key":"268_CR24","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s10586-019-02972-8","volume":"23","author":"A Shahidinejad","year":"2020","unstructured":"Shahidinejad, A., Ghobaei-Arani, M., Esmaeili, L.: An elastic controller using colored petri nets in cloud computing environment. Clust. Comput. 23, 1045\u20131071 (2020)","journal-title":"Clust. Comput."},{"key":"268_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.122313.130423","author":"AK Shrinath","year":"2017","unstructured":"Shrinath, A.K.: Information flow control for secure cloud computing. Imp. J. Interdiscip. Res. (2017). https:\/\/doi.org\/10.1109\/TNSM.2013.122313.130423","journal-title":"Imp. J. Interdiscip. Res."},{"issue":"4","key":"268_CR26","first-page":"1","volume":"15","author":"C Skandylas","year":"2021","unstructured":"Skandylas, C., Khakpour, N., Andersson, J.: AT-DIFC+: toward adaptive and trust-aware decentralized information flow control. ACM Trans. Auton. Adapt. Syst. (TAAS) 15(4), 1\u201335 (2021)","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"268_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.21","author":"N Solanki","year":"2016","unstructured":"Solanki, N., Zhu, W., Yen, I., Bastani, F., Rezvani, E.: Multi-tenant access and information flow control for SaaS. IEEE Int. Conf. Web Serv. (ICWS) (2016). https:\/\/doi.org\/10.1109\/ICWS.2016.21","journal-title":"IEEE Int. Conf. Web Serv. (ICWS)"},{"key":"268_CR28","unstructured":"Somavanshi, N.R., Gurav, Y.B.: Survey of decentralized information flow controlfor relational database-IFDB. Int. J. Eng. Res. Ind. Appl 8, 27\u201336 (2015)"},{"key":"268_CR29","unstructured":"Somavanshi, N.R., Gurav, Y.B.: Security in cloud computing environment by decentralized information flow control. Int. J. Innov. Res. Comput. Commun. Eng 4(6), 1\u20133 (2016)"},{"key":"268_CR30","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s10619-018-7228-2","volume":"36","author":"N Xi","year":"2019","unstructured":"Xi, N., Ma, J., Sun, C., Di, Lu., Shen, Y.: Information flow control on encrypted data for service composition among multiple clouds. Distrib. Parallel Databases 36, 511\u2013527 (2019)","journal-title":"Distrib. Parallel Databases"},{"key":"268_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/WECONF.2019.8840125","author":"TM Zaw","year":"2019","unstructured":"Zaw, T.M., Thant, M., Bezzateev, S.V.: Database security with AES encryption, elliptic curve encryption and signature. Wave Electr. Appl. Inf. Telecommun. Syst. (WECONF) (2019). https:\/\/doi.org\/10.1109\/WECONF.2019.8840125","journal-title":"Wave Electr. Appl. Inf. Telecommun. Syst. (WECONF)"},{"key":"268_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051061","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Zhi, Y., Xuehui, D., Wenfa, L., Xingyuan, C., Lei, S.: Tenant-led ciphertext information flow control for cloud virtual machines. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2021.3051061","journal-title":"IEEE Access"},{"key":"268_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASIT50869.2020.9368768","author":"L Zhou","year":"2020","unstructured":"Zhou, L., Zhang, H., Zhang, K., Wang, B., Shen, D., Wang, Y.: Advances in applying cloud computing techniques for air traffic systems. IEEE Int. Conf. Civil Aviat. Saf. Inf. Technol. (2020). https:\/\/doi.org\/10.1109\/ICCASIT50869.2020.9368768","journal-title":"IEEE Int. Conf. Civil Aviat. Saf. Inf. Technol."}],"container-title":["International Journal of Intelligent Robotics and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41315-022-00268-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41315-022-00268-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41315-022-00268-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T04:33:22Z","timestamp":1685507602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41315-022-00268-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,13]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["268"],"URL":"https:\/\/doi.org\/10.1007\/s41315-022-00268-6","relation":{},"ISSN":["2366-5971","2366-598X"],"issn-type":[{"value":"2366-5971","type":"print"},{"value":"2366-598X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,13]]},"assertion":[{"value":"9 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}