{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:31:01Z","timestamp":1750311061131,"version":"3.37.3"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:00:00Z","timestamp":1723075200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:00:00Z","timestamp":1723075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03101-y","type":"journal-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T07:02:33Z","timestamp":1723100553000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7148-3893","authenticated-orcid":false,"given":"Basappa B.","family":"Kodada","sequence":"first","affiliation":[]},{"given":"Demian Antony","family":"D\u2019Mello","sequence":"additional","affiliation":[]},{"given":"D. K. Santhosh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,8]]},"reference":[{"key":"3101_CR1","volume-title":"The digitization of the world from edge to core","author":"DRJGJ Rydning","year":"2018","unstructured":"Rydning DRJGJ, Reinsel J, Gantz J. The digitization of the world from edge to core. Framingham: International Data Corporation; 2018."},{"key":"3101_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/9780429184185","volume-title":"Formal methods in computer science","author":"J Wang","year":"2019","unstructured":"Wang J. Formal methods in computer science. CRC Press; 2019."},{"key":"3101_CR3","doi-asserted-by":"crossref","unstructured":"Armknecht F, Bohli J-M, Karame GO, Youssef F. Transparent data deduplication in the cloud. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015. pp. 886\u2013900.","DOI":"10.1145\/2810103.2813630"},{"issue":"4","key":"3101_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2078861.2078864","volume":"7","author":"T Meyer Dutch","year":"2012","unstructured":"Meyer Dutch T, Bolosky WJ. A study of practical deduplication. ACM Trans Storage (ToS). 2012;7(4):1\u201320.","journal-title":"ACM Trans. Storage (ToS)."},{"key":"3101_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-319-53817-4_10","volume-title":"Guide to big data applications","author":"F Rashid","year":"2018","unstructured":"Rashid F, Miri A. Deduplication practices for multimedia data in the cloud. In: Guide to big data applications. Springer; 2018. p. 245\u201371."},{"key":"3101_CR6","doi-asserted-by":"crossref","unstructured":"Zhou Y, Feng D, Xia W, Fu M, Huang F, Zhang Y, Li C. Secdep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management. In 2015 31st Symposium on Mass Storage Systems and Technologies (MSST). IEEE; 2015. pp. 1\u201314.","DOI":"10.1109\/MSST.2015.7208297"},{"issue":"5","key":"3101_CR7","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1007\/s11227-017-2210-8","volume":"74","author":"K Ravneet","year":"2018","unstructured":"Ravneet K, Inderveer C, Jhilik B. Data deduplication techniques for efficient cloud storage management: a systematic review. J Supercomput. 2018;74(5):2035\u201385.","journal-title":"J Supercomput"},{"issue":"4","key":"3101_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017428","volume":"49","author":"S Youngjoo","year":"2017","unstructured":"Youngjoo S, Dongyoung K, Junbeom H. A survey of secure data deduplication schemes for cloud storage systems. ACM Comput Surv (CSUR). 2017;49(4):1\u201338.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"3101_CR9","doi-asserted-by":"crossref","unstructured":"Bellare M, Keelveedhi S, Ristenpart T. Message-locked encryption and secure deduplication. In: Annual international conference on the theory and applications of cryptographic techniques. Springer; 2013. pp. 296\u2013312.","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"3101_CR10","doi-asserted-by":"crossref","unstructured":"Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M. Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd international conference on distributed computing systems. IEEE; 2002. pp. 617\u2013624.","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"3101_CR11","doi-asserted-by":"crossref","unstructured":"Abubaker S, Wu K. Dafa-a lightweight des augmented finite automaton cryptosystem. In: International Conference on Security and Privacy in Communication Systems. Springer; 2012. pp. 1\u201318.","DOI":"10.1007\/978-3-642-36883-7_1"},{"key":"3101_CR12","doi-asserted-by":"crossref","unstructured":"Kumar NS, Rajya Lakshmi GV, Balamurugan B. Enhanced attribute based encryption for cloud computing. In: International Conference on Information and Communication Technologies, vol. 46. Procedia Computer Science; 2015. pp. 689\u201396.","DOI":"10.1016\/j.procs.2015.02.127"},{"key":"3101_CR13","doi-asserted-by":"crossref","unstructured":"Saroj SK, Chauhan SK, Sharma AK, Vats S. Threshold cryptography based data security in cloud computing. In: 2015 IEEE International Conference on Computational Intelligence & Communication Technology. IEEE; 2015. pp. 202\u2013207.","DOI":"10.1109\/CICT.2015.149"},{"issue":"2\u20134","key":"3101_CR14","first-page":"217","volume":"6","author":"K El Makkaoui","year":"2019","unstructured":"El Makkaoui K, Beni-Hssane A, Ezzati A. Multiprime cloud-rsa: a fast homomorphic encryption scheme for data confidentiality protection in clouds. Int J Intell Enterp. 2019;6(2\u20134):217\u201329.","journal-title":"Int J Intell Enterp"},{"issue":"1","key":"3101_CR15","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1504\/IJCC.2019.097893","volume":"8","author":"JR Gudeme","year":"2019","unstructured":"Gudeme JR, Pasupuleti SK, Kandukuri R. Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues. Int J Cloud Comput. 2019;8(1):20\u201349.","journal-title":"Int J Cloud Comput"},{"key":"3101_CR16","doi-asserted-by":"crossref","unstructured":"Juels A, Kaliski\u00a0Jr BS. Pors: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security. 2007; pp. 584\u2013597.","DOI":"10.1145\/1315245.1315317"},{"issue":"4","key":"3101_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699909","volume":"17","author":"C Chris Erway","year":"2015","unstructured":"Chris Erway C, K\u00fcp\u00e7\u00fc A, Papamanthou C, Tamassia R. Dynamic provable data possession. ACM Trans Inf Syst Secur (TISSEC). 2015;17(4):1\u201329.","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"issue":"9","key":"3101_CR18","first-page":"1717","volume":"24","author":"Y Kan","year":"2012","unstructured":"Kan Y, Xiaohua J. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst. 2012;24(9):1717\u201326.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3101_CR19","doi-asserted-by":"crossref","unstructured":"Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: European symposium on research in computer security. Springer; 2009. pp. 355\u2013370.","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"3101_CR20","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security; 2007. pp. 598\u2013609.","DOI":"10.1145\/1315245.1315318"},{"issue":"1","key":"3101_CR21","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-015-9216-2","volume":"30","author":"C David","year":"2017","unstructured":"David C, Alptekin K, Daniel W. Dynamic proofs of retrievability via oblivious ram. J Cryptol. 2017;30(1):22\u201357.","journal-title":"J Cryptol"},{"key":"3101_CR22","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.comcom.2020.02.037","volume":"154","author":"D Jay","year":"2020","unstructured":"Jay D, Parvez F, Vijay L, Akka Z, Manoj G, Mauro C. Spark: Secure pseudorandom key-based encryption for deduplicated storage. Comput Commun. 2020;154:148\u201359.","journal-title":"Comput Commun"},{"key":"3101_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101666","volume":"102","author":"Z Xiaoyu","year":"2020","unstructured":"Xiaoyu Z, Yuyang Z, Yalan Y, Fagen L. A cloud data deduplication scheme based on certificateless proxy re-encryption. J Syst Archit. 2020;102: 101666.","journal-title":"J Syst Archit"},{"key":"3101_CR24","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1016\/j.procs.2020.04.240","volume":"171","author":"CM Geeta","year":"2020","unstructured":"Geeta CM, Shreyas Raju RG, Raghavendra S, Rajkumar B, Venugopal KR, Iyengar SS, Patnaik LM. Sdvadc: Secure deduplication and virtual auditing of data in cloud. Procedia Comput Sci. 2020;171:2225\u201334.","journal-title":"Procedia Comput Sci"},{"key":"3101_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102664","volume":"162","author":"C Guo","year":"2020","unstructured":"Guo C, Jiang X, Choo K-KR, Jie Y. R-dedup: Secure client-side deduplication for encrypted data without involving a third-party entity. J Netw Comput Appl. 2020;162: 102664.","journal-title":"J Netw Comput Appl"},{"key":"3101_CR26","volume":"51","author":"T Guohua","year":"2020","unstructured":"Guohua T, Hua M, Ying X, Zhenhua L. Randomized deduplication with ownership management and data sharing in cloud storage. J Inf Secur Appl. 2020;51: 102432.","journal-title":"J Inf Secur Appl"},{"key":"3101_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101730","volume":"91","author":"X Liang","year":"2020","unstructured":"Liang X, Yan Z, Deng RH. Game theoretical study on client-controlled cloud data deduplication. Comput Secur. 2020;91: 101730.","journal-title":"Comput Secur"},{"key":"3101_CR28","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ins.2020.07.005","volume":"541","author":"H Yuan","year":"2020","unstructured":"Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W. Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci. 2020;541:409\u201325.","journal-title":"Inf Sci"},{"key":"3101_CR29","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jpdc.2020.01.002","volume":"139","author":"S Saharan","year":"2020","unstructured":"Saharan S, Somani G, Gupta G, Verma R, Gaur MS, Buyya R. Quickdedup: Efficient vm deduplication in cloud computing environments. J Parallel Distrib Comput. 2020;139:18\u201331.","journal-title":"J Parallel Distrib Comput"},{"issue":"6","key":"3101_CR30","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1049\/ise2.12066","volume":"16","author":"H Ke","year":"2022","unstructured":"Ke H, Xiaosong Z, Yi M, Fatemeh R, Xiaoming H, Yongcheng G. Blockchain-based deduplication with arbitration and incentives. IET Inf Secur. 2022;16(6):401\u201316.","journal-title":"IET Inf Secur"},{"issue":"3","key":"3101_CR31","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1504\/IJHPCN.2019.102129","volume":"14","author":"M Hua","year":"2019","unstructured":"Hua M, Linchao Z, Zhenhua L, Enting D. Secure deduplication of encrypted data in online and offline environments. Int J High Perform Comput Netw. 2019;14(3):294\u2013303.","journal-title":"Int J High Perform Comput Netw"},{"issue":"6","key":"3101_CR32","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1504\/IJES.2019.103995","volume":"11","author":"H Huixia","year":"2019","unstructured":"Huixia H, Tao J, Shichong T, Xiaoling T. Efficient public integrity auditing with secure deduplication in cloud computing. Int J Embed Syst. 2019;11(6):764\u201377.","journal-title":"Int J Embed Syst"},{"issue":"3\u20134","key":"3101_CR33","first-page":"281","volume":"14","author":"RD Mote","year":"2019","unstructured":"Mote RD, Pawar AV. Privacy preservation using hybrid cloud environment and map-reduce for data deduplication. Int J Adv Intell Paradig. 2019;14(3\u20134):281\u201396.","journal-title":"Int J Adv Intell Paradig"},{"issue":"1","key":"3101_CR34","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/TSC.2019.2948007","volume":"15","author":"H Yuan","year":"2019","unstructured":"Yuan H, Chen X, Li J, Jiang T, Wang J, Deng R. Secure cloud data deduplication with efficient re-encryption. IEEE Trans Serv Comput. 2019;15(1):442\u201356.","journal-title":"IEEE Trans Serv Comput"},{"key":"3101_CR35","doi-asserted-by":"publisher","first-page":"160482","DOI":"10.1109\/ACCESS.2019.2950750","volume":"7","author":"W Jiaojiao","year":"2019","unstructured":"Jiaojiao W, Yanping L, Tianyin W, Yong D. Cpda: A confidentiality-preserving deduplication cloud storage with public cloud auditing. IEEE Access. 2019;7:160482\u201397.","journal-title":"IEEE Access"},{"key":"3101_CR36","doi-asserted-by":"crossref","unstructured":"Miri A, Rashid F. Secure textual data deduplication scheme based on data encoding and compression. In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE; 2019. pp. 0207\u20130211.","DOI":"10.1109\/IEMCON.2019.8936222"},{"key":"3101_CR37","doi-asserted-by":"crossref","unstructured":"Geeta CM, Lakshmi GM, Raju RGS, Raghavendra S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM. Stldas: Secure two level deduplication and auditing of shared data in cloud. In 2019 IEEE Region 10 Symposium (TENSYMP). IEEE; 2019. pp. 698\u2013703.","DOI":"10.1109\/TENSYMP46218.2019.8971331"},{"key":"3101_CR38","doi-asserted-by":"crossref","unstructured":"Zhang Y, Xu C, Cheng N, Shen X. Secure encrypted data deduplication for cloud storage against compromised key servers. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019. pp. 1\u20136.","DOI":"10.1109\/GLOBECOM38437.2019.9013792"},{"key":"3101_CR39","doi-asserted-by":"crossref","unstructured":"Islam T, Mistareehi H, Manivannan D. Secres: A secure and reliable storage scheme for cloud with client-side data deduplication. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE; 2019. pp. 1\u20136.","DOI":"10.1109\/GLOBECOM38437.2019.9013469"},{"issue":"6","key":"3101_CR40","doi-asserted-by":"publisher","first-page":"2753","DOI":"10.1002\/int.22400","volume":"36","author":"M Meixia","year":"2021","unstructured":"Meixia M, Guohua T, Willy S. New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. Int J Intell Syst. 2021;36(6):2753\u201366.","journal-title":"Int J Intell Syst"},{"key":"3101_CR41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816239","volume-title":"Switching and finite automata theory","author":"Z Kohavi","year":"2009","unstructured":"Kohavi Z, Jha NK. Switching and finite automata theory. Cambridge University Press; 2009."},{"key":"3101_CR42","volume-title":"Finite automata and application to cryptography","author":"R Tao","year":"2008","unstructured":"Tao R. Finite automata and application to cryptography. Springer; 2008."},{"key":"3101_CR43","doi-asserted-by":"crossref","unstructured":"Carton O, Guillon B, Reiter F. Counter machines and distributed automata. In: International Workshop on Cellular Automata and Discrete Complex Systems. Springer; 2018. pp. 13\u201328.","DOI":"10.1007\/978-3-319-92675-9_2"},{"key":"3101_CR44","first-page":"45","volume-title":"Cellular automata: theory and experiment","author":"H Gutowitz","year":"1991","unstructured":"Gutowitz H. Cellular automata: theory and experiment. MIT press; 1991. p. 45."},{"key":"3101_CR45","unstructured":"Amorim I, Machiavelo A, Reis R. On linear finite automata and cryptography. Technical report, Technical Report Series: DCC-2011-11, Version 1.0, 2011."},{"key":"3101_CR46","doi-asserted-by":"crossref","unstructured":"Wolfram S. Cryptography with cellular automata. In: Conference on the Theory and Application of Cryptographic Techniques. Springer; 1985. pp. 429\u2013432.","DOI":"10.1007\/3-540-39799-X_32"},{"issue":"12","key":"3101_CR47","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S Nandi","year":"1994","unstructured":"Nandi S, Kar BK, Chaudhuri PP. Theory and applications of cellular automata in cryptography. IEEE Trans Comput. 1994;43(12):1346\u201357.","journal-title":"IEEE Trans Comput"},{"key":"3101_CR48","doi-asserted-by":"publisher","DOI":"10.31436\/ijpcc.v2i1.31","author":"G Khaleel","year":"2016","unstructured":"Khaleel G, Turaev S, Tamrin MIM, et al. A new block cipher based on finite automata systems. Int J Perceptive Cogn Comput. 2016. https:\/\/doi.org\/10.31436\/ijpcc.v2i1.31.","journal-title":"Int J Perceptive Cogn Comput"},{"issue":"1","key":"3101_CR49","first-page":"1","volume":"27","author":"G Khaleel","year":"2016","unstructured":"Khaleel G, Turaev S, Al-Shaikhli I, Tamrin MIM. An overview of cryptosystems based on finite automata. J Adv Rev Sci Res. 2016;27(1):1\u20137.","journal-title":"J Adv Rev Sci Res"},{"key":"3101_CR50","doi-asserted-by":"crossref","unstructured":"Gysin M. A one-key cryptosystem based on a finite nonlinear automaton. In: International Conference on Cryptography: Policy and Algorithms. Springer; 1995. pp. 165\u2013173.","DOI":"10.1007\/BFb0032356"},{"key":"3101_CR51","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.future.2019.04.046","volume":"101","author":"F Yongkai","year":"2019","unstructured":"Yongkai F, Xiaodong L, Wei L, Gang T, Priyadarsi N. A secure privacy preserving deduplication scheme for cloud computing. Future Gener Comput Syst. 2019;101:127\u201335.","journal-title":"Future Gener Comput Syst"},{"issue":"1\u20132","key":"3101_CR52","first-page":"143","volume":"226","author":"T Renji","year":"1999","unstructured":"Renji T, Shihua C. On finite automaton public-key cryptosystem. Theor Comput Sci. 1999;226(1\u20132):143\u201372.","journal-title":"Theor Comput Sci"},{"key":"3101_CR53","unstructured":"Walker J, Fourmilab. ENT - A Pseudorandom Number Sequence Test Program, 2020. https:\/\/www.fourmilab.ch\/random\/. Accessed 20 Aug 2020."},{"key":"3101_CR54","unstructured":"Abubaker S. Probabilistic, lightweight cryptosystems based on finite automata. A PhD thesis, 2011."},{"issue":"916","key":"3101_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2022.02.033","volume":"19","author":"P Thorncharoensri","year":"2022","unstructured":"Thorncharoensri P, Susilo W, Chow YW. Privacy-preserving file sharing on cloud storage with certificateless signcryption. Theor Comput Sci. 2022;19(916):1\u201321.","journal-title":"Theor Comput Sci"},{"issue":"131","key":"3101_CR56","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.future.2022.01.018","volume":"1","author":"J Lei","year":"2022","unstructured":"Lei J, Wu Q, Xu J. Privacy and security-aware workflow scheduling in a hybrid cloud. Future Gener Comput Syst. 2022;1(131):269\u201378.","journal-title":"Future Gener Comput Syst"},{"issue":"184","key":"3101_CR57","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.comcom.2021.12.005","volume":"15","author":"B Xie","year":"2022","unstructured":"Xie B, Xiang T, Liao X. Access-oblivious and privacy-preserving k nearest neighbors classification in dual clouds. Comput Commun. 2022;15(184):12\u201323.","journal-title":"Comput Commun"},{"issue":"19","key":"3101_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100543","volume":"1","author":"DC Valadares","year":"2022","unstructured":"Valadares DC, Will NC, Spohn MA, de Souza Santos DF, Perkusich A, Gorgonio KC. Confidential computing in cloud\/fog-based Internet of Things scenarios. Internet Things. 2022;1(19): 100543.","journal-title":"Internet Things"},{"issue":"4","key":"3101_CR59","doi-asserted-by":"publisher","first-page":"2198","DOI":"10.1109\/TDSC.2021.3050517","volume":"19","author":"J Shen","year":"2021","unstructured":"Shen J, Yang H, Vijayakumar P, Kumar N. A privacy-preserving and untraceable group data sharing scheme in cloud computing. IEEE Trans Dependable Secur Comput. 2021;19(4):2198\u2013210.","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"6","key":"3101_CR60","first-page":"2787","volume":"18","author":"C Ge","year":"2020","unstructured":"Ge C, Susilo W, Liu Z, Xia J, Szalachowski P, Fang L. Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans Dependable Secur Comput. 2020;18(6):2787\u2013800.","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"3101_CR61","doi-asserted-by":"publisher","first-page":"45206","DOI":"10.1109\/ACCESS.2023.3272484","volume":"11","author":"M Zhuo","year":"2023","unstructured":"Zhuo M, Zhang J. Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-based IoD Systems. IEEE Access. 2023;11:45206\u201321.","journal-title":"IEEE Access"},{"issue":"3","key":"3101_CR62","first-page":"2165","volume":"16","author":"Q Huang","year":"2022","unstructured":"Huang Q, Wang C, Chen L. Secure and fine-grained flow control for subscription-based data services in cloud-edge computing. IEEE Trans Serv Comput. 2022;16(3):2165\u201377.","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"3101_CR63","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TII.2018.2824815","volume":"15","author":"S Roy","year":"2018","unstructured":"Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inform. 2018;15(1):457\u201368.","journal-title":"IEEE Trans Ind Inform"},{"issue":"37","key":"3101_CR64","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1016\/j.matpr.2020.08.542","volume":"1","author":"M Sangeetha","year":"2021","unstructured":"Sangeetha M, Vijayakarthik P, Dhanasekaran S, Murugan BS. Fine grained access control using H-KCABE in cloud storage. Mater Today Proc. 2021;1(37):2735\u20137.","journal-title":"Mater Today Proc"},{"key":"3101_CR65","unstructured":"Kodada BB, D\u2019Mello DA, DK SK. FSAaCIT: Finite State Automata based One-Key Cryptosystem and Chunk-based Indexing Technique for Secure Data De-duplication in Cloud Computing. https:\/\/www.techrxiv.org\/ndownloader\/files\/36651519\/1"},{"issue":"1","key":"3101_CR66","first-page":"591","volume":"19","author":"Y Xue","year":"2020","unstructured":"Xue Y, et al. Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Trans Dependable Secure Comput. 2020;19(1):591\u2013606.","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"3101_CR67","first-page":"680","volume":"20","author":"Y Xixun","year":"2022","unstructured":"Xixun Y, et al. Veridedup: A verifiable cloud data deduplication scheme with integrity and duplication proof. IEEE Trans Dependable Secur Comput. 2022;20(1):680\u201394.","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"2","key":"3101_CR68","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s42979-023-02539-w","volume":"5","author":"A Mondal","year":"2024","unstructured":"Mondal A, Chatterjee PS. CloudSec: a lightweight and agile approach to secure medical image transmission in the cloud computing environment. SN Comput Sci 2024; 5(2):237.","journal-title":"SN Comput Sci"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03101-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03101-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03101-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T12:18:04Z","timestamp":1732623484000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03101-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,8]]},"references-count":68,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["3101"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03101-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2024,8,8]]},"assertion":[{"value":"23 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"On behalf of all authors, the corresponding author states that there is no potential Conflict of interest, whether financial or non-financial.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors also clarify that neither human nor animal participants were engaged in this research work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\\or Animal Participants"}},{"value":"The authors wish to clarify that the manuscript is not currently being reviewed or considered for publication by any peer-reviewed journal. However, the results presented in this manuscript are available in the TechRxiv preprint server [] powered by IEEE which was submitted by the authors to obtain feedback and comments from the scientific community.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"774"}}