{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:57:03Z","timestamp":1757627823628,"version":"3.44.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T00:00:00Z","timestamp":1756339200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T00:00:00Z","timestamp":1756339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04285-7","type":"journal-article","created":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:31:39Z","timestamp":1756384299000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Data Anonymization Approach Based on Enhanced Starfish Optimization and Levy Flight for Social Networks"],"prefix":"10.1007","volume":"6","author":[{"given":"K.","family":"Sivasankari","sequence":"first","affiliation":[]},{"given":"K. M.","family":"Uma Maheswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,28]]},"reference":[{"issue":"5","key":"4285_CR1","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1007\/s40747-021-00409-7","volume":"7","author":"AK Jain","year":"2021","unstructured":"Jain AK, Sahoo SR, Kaubiyal J. Online social networks security and privacy: comprehensive review and analysis. Complex Intell Syst. 2021;7(5):2157\u201377.","journal-title":"Complex Intell Syst"},{"key":"4285_CR2","unstructured":"Sakhar A, Ganar S. Anonymization: a method to protect sensitive data in cloud. Int J Sci Eng Res. 2013;4(5)."},{"issue":"4","key":"4285_CR3","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TCSS.2019.2928324","volume":"6","author":"M Siddula","year":"2019","unstructured":"Siddula M, Li Y, Cheng X, Tian Z, Cai Z. Anonymization in online social networks based on enhanced equi-cardinal clustering. IEEE Trans Comput Social Syst. 2019;6(4):809\u201320.","journal-title":"IEEE Trans Comput Social Syst"},{"key":"4285_CR4","doi-asserted-by":"publisher","first-page":"112968","DOI":"10.1016\/j.eswa.2019.112968","volume":"141","author":"RK Langari","year":"2020","unstructured":"Langari RK, Sardar S, Mousavi SAA, Radfar R. Combined fuzzy clustering and firefly algorithm for privacy preserving in social networks. Expert Syst Appl. 2020;141:112968.","journal-title":"Expert Syst Appl"},{"key":"4285_CR5","doi-asserted-by":"publisher","first-page":"89427","DOI":"10.1109\/ACCESS.2019.2927308","volume":"7","author":"L Sun","year":"2019","unstructured":"Sun L, Bao S, Ci S, Zheng X, Guo L, Luo Y. Differential privacy-preserving density peaks clustering based on shared near neighbors similarity. IEEE Access. 2019;7:89427\u201340.","journal-title":"IEEE Access"},{"key":"4285_CR6","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10462-016-9484-8","volume":"47","author":"Casas-Roma","year":"2017","unstructured":"Casas-Roma. Jordi, Jordi Herrera-Joancomart\u00ed, and vicen\u00e7torra. A survey of graph-modification techniques for privacy-preserving on networks. Artif Intell Rev. 2017;47:341\u201366.","journal-title":"Artif Intell Rev"},{"key":"4285_CR7","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.phpro.2012.05.093","volume":"33","author":"Z FeiFei","year":"2012","unstructured":"FeiFei Z, LiFeng D, Kun W, Yang L. Study on privacy protection algorithm based on k-anonymity. Physics Procedia. 2012;33:483\u201390.","journal-title":"Physics Procedia"},{"key":"4285_CR8","doi-asserted-by":"crossref","unstructured":"Yan Y, Herman EA, Mahmood A, Feng T, Xie P. A weighted k-member clustering algorithm for k-anonymization. Computing 2021:1\u201323.","DOI":"10.1007\/s00607-021-00922-0"},{"issue":"6","key":"4285_CR9","first-page":"1062","volume":"19","author":"S Ni","year":"2017","unstructured":"Ni S, Xie M, Qian Q. Clustering based K-anonymity algorithm for privacy preservation. Int J Netw Secur. 2017;19(6):1062\u201371.","journal-title":"Int J Netw Secur"},{"issue":"3","key":"4285_CR10","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1504\/IJAAC.2021.114923","volume":"15","author":"AK Das","year":"2021","unstructured":"Das AK, Tabassum A, Sadaf S, Sinha D. K-anonymity scheme for privacy preservation in location-based services on IoT environment. Int J Autom Control. 2021;15(3):340\u201362.","journal-title":"Int J Autom Control"},{"key":"4285_CR11","doi-asserted-by":"crossref","unstructured":"Kiran A, Khan M, Babu JC, Kumar BS. 2023. An enhanced privacy preservation method using data anonymization with oppositional fruit fly technique.","DOI":"10.21203\/rs.3.rs-2768099\/v1"},{"key":"4285_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.comcom.2020.04.057","volume":"158","author":"KM Prabha","year":"2020","unstructured":"Prabha KM, Saraswathi PV. Suppressed K-Anonymity multi-factor authentication based Schmidt-Samoa cryptography for privacy preserved data access in cloud computing. Comput Commun. 2020;158:85\u201394.","journal-title":"Comput Commun"},{"key":"4285_CR13","doi-asserted-by":"crossref","unstructured":"Jain P, Gyanchandani M, Khare N. Improved k-anonymize and l-diverse approach for privacy preserving big data publishing using MPSEC dataset. Comput Inform. 2020;39(3):537 -67","DOI":"10.31577\/cai_2020_3_537"},{"issue":"15","key":"4285_CR14","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1080\/08839514.2021.1987709","volume":"35","author":"J UshaLawrance","year":"2021","unstructured":"UshaLawrance J, NayahiJesudhasan JV. Privacy preserving parallel clustering based anonymization for big data using mapreduce framework. Appl Artif Intell. 2021;35(15):1587\u2013620.","journal-title":"Appl Artif Intell"},{"key":"4285_CR15","doi-asserted-by":"crossref","unstructured":"Avaghade SB, Patil SS. 2015, September. Privacy preserving for spatio-temporal data publishing ensuring location diversity using K-Anonymity technique. In 2015 16. Anonymity: architecture and algor ithms. IEEE Transactions on Mobile Computing, 7(1), pp.1-18.19.","DOI":"10.1109\/IC4.2015.7375509"},{"issue":"1","key":"4285_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2007","unstructured":"Gedik B, Liu L. Protecting location privacy with personalized K-Anonymity: architecture and algorithms. IEEE Trans Mob Comput. 2007;7(1):1\u201318.","journal-title":"IEEE Trans Mob Comput"},{"issue":"5","key":"4285_CR17","doi-asserted-by":"publisher","first-page":"3641","DOI":"10.1007\/s00521-024-10694-1","volume":"37","author":"C Zhong","year":"2025","unstructured":"Zhong C, Li G, Meng Z, Li H, Yildiz AR, Mirjalili S. Starfish optimization algorithm (SFOA): a bio-inspired metaheuristic algorithm for global optimization compared with 100 optimizers. Neural Comput Appl. 2025;37(5):3641\u201383.","journal-title":"Neural Comput Appl"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04285-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04285-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04285-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:03:54Z","timestamp":1757480634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04285-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,28]]},"references-count":17,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4285"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04285-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2025,8,28]]},"assertion":[{"value":"14 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"778"}}