{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:28:40Z","timestamp":1768422520156,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04682-y","type":"journal-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T11:46:13Z","timestamp":1768391173000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Cloud Data Security with Attribute-Based Encryption and Enhanced Nature-Inspired Algorithms"],"prefix":"10.1007","volume":"7","author":[{"given":"T.","family":"Ramesh","sequence":"first","affiliation":[]},{"given":"T.","family":"Nadana Ravishankar","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Kalpana","sequence":"additional","affiliation":[]},{"given":"T. P.","family":"Anish","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"issue":"6","key":"4682_CR1","doi-asserted-by":"publisher","first-page":"5329","DOI":"10.1109\/JIOT.2020.2976740","volume":"7","author":"J Cao","year":"2020","unstructured":"Cao J, Yan Z, Ma R, Zhang Y, Fu Y, Li H. Lsaa: a lightweight and secure access authentication scheme for both ue and mmtc devices in 5g networks. IEEE Internet Things J. 2020;7(6):5329\u201344.","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"4682_CR2","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1109\/JSAC.2020.3020677","volume":"39","author":"D Wu","year":"2020","unstructured":"Wu D, Han X, Yang Z, Wang R. Exploiting transfer learning for emotion recognition under cloud-edge-client collaborations. IEEE J Sel Areas Commun. 2020;39(2):479\u201390.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"4682_CR3","first-page":"819","volume":"8","author":"Y Yang","year":"2018","unstructured":"Yang Y, Liu X, Zheng X, Rong C, Guo W. Efficient traceable authorization search system for secure cloud storage. IEEE Trans Cloud Comput. 2018;8(3):819\u201332.","journal-title":"IEEE Trans Cloud Comput"},{"key":"4682_CR4","doi-asserted-by":"publisher","first-page":"75090","DOI":"10.1109\/ACCESS.2019.2920998","volume":"7","author":"J Xiong","year":"2019","unstructured":"Xiong J, Zhang Y, Tang S, Liu X, Yao Z. Secure encrypted data with authorized deduplication in cloud. IEEE Access. 2019;7:75090\u2013104.","journal-title":"IEEE Access"},{"key":"4682_CR5","doi-asserted-by":"publisher","first-page":"64611","DOI":"10.1109\/ACCESS.2018.2877981","volume":"6","author":"Z Ying","year":"2018","unstructured":"Ying Z, Jang W, Cao S, Liu X, Cui J. A lightweight cloud sharing phr system with access policy updating. IEEE Access. 2018;6:64611\u201321.","journal-title":"IEEE Access"},{"issue":"4","key":"4682_CR6","first-page":"1667","volume":"18","author":"Y Miao","year":"2019","unstructured":"Miao Y, Deng RH, Liu X, Choo K-KR, Wu H, Li H. Multi-authority attribute-based keyword search over encrypted cloud data. IEEE Trans Dependable Secure Comput. 2019;18(4):1667\u201380.","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"12","key":"4682_CR7","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1002\/cpe.1698","volume":"23","author":"G Wang","year":"2011","unstructured":"Wang G, Liu Q, Wu J. Achieving fine-grained access control for secure data sharing on cloud servers. Concurr Comput Pract Exp. 2011;23(12):1443\u201364.","journal-title":"Concurr Comput Pract Exp"},{"key":"4682_CR8","doi-asserted-by":"crossref","unstructured":"Huang X, Susilo W, Mu Y, Zhang F. Short designated verifier signature scheme and its identity-based variant 2008","DOI":"10.1016\/j.ins.2007.07.005"},{"key":"4682_CR9","doi-asserted-by":"publisher","first-page":"20428","DOI":"10.1109\/ACCESS.2017.2756070","volume":"5","author":"H Zhu","year":"2017","unstructured":"Zhu H, Wang L, Ahmad H, Niu X. Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access. 2017;5:20428\u201339.","journal-title":"IEEE Access"},{"key":"4682_CR10","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, 2005:457\u2013473. Springer","DOI":"10.1007\/11426639_27"},{"key":"4682_CR11","doi-asserted-by":"crossref","unstructured":"Kandias M, Virvilis N, Gritzalis D. The insider threat in cloud computing. In: Critical Information Infrastructure Security: 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers 6, 2013:93\u2013103. Springer","DOI":"10.1007\/978-3-642-41476-3_8"},{"key":"4682_CR12","doi-asserted-by":"publisher","unstructured":"Ajagbe S, Florez H, Awotunde B. AESRSA: A New Cryptography Key for Electronic Health Record Security. Lecture Notes in Networks and Systems, 2022;529:237\u2013251. Springer, https:\/\/doi.org\/10.1007\/978-3-031-19647-8_17","DOI":"10.1007\/978-3-031-19647-8_17"},{"issue":"1","key":"4682_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s42979-023-02448-y","volume":"5","author":"SA Ajagbe","year":"2023","unstructured":"Ajagbe SA, Awotunde JB, Florez H. Ensuring intrusion detection for iot services through an improved cnn. SN Comput Sci. 2023;5(1):49. https:\/\/doi.org\/10.1007\/s42979-023-02448-y.","journal-title":"SN Comput Sci"},{"key":"4682_CR14","doi-asserted-by":"publisher","first-page":"200180","DOI":"10.1109\/ACCESS.2020.3035468","volume":"8","author":"X Liu","year":"2020","unstructured":"Liu X, Yang X, Luo Y, Wang L, Zhang Q. Anonymous electronic health record sharing scheme based on decentralized hierarchical attribute-based encryption in cloud environment. IEEE Access. 2020;8:200180\u201393.","journal-title":"IEEE Access"},{"issue":"2","key":"4682_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TCC.2015.2513388","volume":"7","author":"Y Xie","year":"2019","unstructured":"Xie Y, Wen H, Wu B, Jiang Y, Meng J. A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Trans Cloud Comput. 2019;7(2):383\u201391. https:\/\/doi.org\/10.1109\/TCC.2015.2513388.","journal-title":"IEEE Trans Cloud Comput"},{"issue":"11","key":"4682_CR16","doi-asserted-by":"publisher","first-page":"2927","DOI":"10.1109\/TIFS.2019.2911166","volume":"14","author":"Y Xue","year":"2019","unstructured":"Xue Y, Xue K, Gai N, Hong J, Wei DS, Hong P. An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans Inf Forensics Secur. 2019;14(11):2927\u201342.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"4682_CR17","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.1109\/JSYST.2018.2865221","volume":"13","author":"H Xiong","year":"2018","unstructured":"Xiong H, Zhang H, Sun J. Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Syst J. 2018;13(3):2739\u201350.","journal-title":"IEEE Syst J"},{"key":"4682_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931917","author":"J Liu","year":"2019","unstructured":"Liu J, Tang H, Sun R, Du X, Guizani M. Lightweight and privacy-preserving medical services access for healthcare cloud. IEEE Access. 2019. https:\/\/doi.org\/10.1109\/ACCESS.2019.2931917.","journal-title":"IEEE Access"},{"issue":"5","key":"4682_CR19","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s42979-025-03950-1","volume":"6","author":"VST Gollapalli","year":"2025","unstructured":"Gollapalli VST, Jadon R, Budda R, Srinivasan K, Chauhan GS, Awotunde JB. Adaptive hellinger distance cs and gelu-rnn: advanced solutions for feature optimization and cloud threat detection. SN Comput Sci. 2025;6(5):515. https:\/\/doi.org\/10.1007\/s42979-025-03950-1.","journal-title":"SN Comput Sci"},{"key":"4682_CR20","doi-asserted-by":"publisher","first-page":"110185","DOI":"10.1016\/j.asoc.2023.110185","volume":"139","author":"R Khamkar","year":"2023","unstructured":"Khamkar R, Das P, Namasudra S. Sceomoo: a novel subspace clustering approach using evolutionary algorithm, off-spring generation and multi-objective optimization. Appl Soft Comput. 2023;139:110185. https:\/\/doi.org\/10.1016\/j.asoc.2023.110185.","journal-title":"Appl Soft Comput"},{"key":"4682_CR21","doi-asserted-by":"publisher","unstructured":"Sharma P, Namasudra S, Lorenz P. Blockchain-based cloud storage system with enhanced optimization and integrity preservation. In: ICC 2023 - IEEE International Conference on Communications, 2023: 3744\u20133749. https:\/\/doi.org\/10.1109\/ICC45041.2023.10279598","DOI":"10.1109\/ICC45041.2023.10279598"},{"issue":"2","key":"4682_CR22","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TCC.2017.2649685","volume":"6","author":"R Li","year":"2017","unstructured":"Li R, Shen C, He H, Gu X, Xu Z, Xu C-Z. A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans Cloud Comput. 2017;6(2):344\u201357.","journal-title":"IEEE Trans Cloud Comput"},{"issue":"2","key":"4682_CR23","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/JIOT.2019.2953082","volume":"7","author":"J Hao","year":"2019","unstructured":"Hao J, Liu J, Wu W, Tang F, Xian M. Secure and fine-grained self-controlled outsourced data deletion in cloud-based iot. IEEE Internet Things J. 2019;7(2):1140\u201353.","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"4682_CR24","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TSC.2018.2850344","volume":"14","author":"Q Huang","year":"2018","unstructured":"Huang Q, Yang Y, Fu J. Secure data group sharing and dissemination with attribute and time conditions in public cloud. IEEE Trans Serv Comput. 2018;14(4):1013\u201325.","journal-title":"IEEE Trans Serv Comput"},{"key":"4682_CR25","doi-asserted-by":"publisher","first-page":"88026","DOI":"10.1109\/ACCESS.2020.2993148","volume":"8","author":"Y Fan","year":"2020","unstructured":"Fan Y, Shao J, Sun G, Shao X. A self-adaption butterfly optimization algorithm for numerical optimization problems. IEEE Access. 2020;8:88026\u201341. https:\/\/doi.org\/10.1109\/ACCESS.2020.2993148.","journal-title":"IEEE Access"},{"key":"4682_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s41019-017-0046-0","volume":"3","author":"N Singh","year":"2018","unstructured":"Singh N, Singh AK. Data privacy protection mechanisms in cloud. Data Sci Eng. 2018;3:24\u201339. https:\/\/doi.org\/10.1007\/s41019-017-0046-0.","journal-title":"Data Sci Eng"},{"issue":"2","key":"4682_CR27","doi-asserted-by":"publisher","first-page":"1788","DOI":"10.1109\/JSYST.2019.2918022","volume":"14","author":"H Yan","year":"2019","unstructured":"Yan H, Li J, Zhang Y. Remote data checking with a designated verifier in cloud storage. IEEE Syst J. 2019;14(2):1788\u201397.","journal-title":"IEEE Syst J"},{"issue":"6","key":"4682_CR28","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/TSG.2017.2697430","volume":"9","author":"MR Sarker","year":"2018","unstructured":"Sarker MR, Wang J, Li Z, Ren K. Security and cloud outsourcing framework for economic dispatch. IEEE Trans Smart Grid. 2018;9(6):5810\u20139. https:\/\/doi.org\/10.1109\/TSG.2017.2697430.","journal-title":"IEEE Trans Smart Grid"},{"issue":"1","key":"4682_CR29","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/JIOT.2018.2854714","volume":"6","author":"H Tao","year":"2018","unstructured":"Tao H, Bhuiyan MZA, Abdalla AN, Hassan MM, Zain JM, Hayajneh T. Secured data collection with hardware-based ciphers for Iot-based healthcare. IEEE Internet Things J. 2018;6(1):410\u201320.","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"4682_CR30","doi-asserted-by":"publisher","first-page":"2605","DOI":"10.1109\/TPDS.2020.2998462","volume":"31","author":"F Chen","year":"2020","unstructured":"Chen F, Meng F, Xiang T, Dai H, Li J, Qin J. Towards usable cloud storage auditing. IEEE Trans Parallel Distrib Syst. 2020;31(11):2605\u201317.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4682_CR31","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0076-1","author":"A Razaque","year":"2017","unstructured":"Razaque A, Rizvi SS. Privacy preserving model: a new scheme for auditing cloud stakeholders. J Cloud Comput. 2017. https:\/\/doi.org\/10.1186\/s13677-017-0076-1.","journal-title":"J Cloud Comput"},{"key":"4682_CR32","doi-asserted-by":"publisher","first-page":"118285","DOI":"10.1109\/ACCESS.2020.3004433","volume":"8","author":"F Shahid","year":"2020","unstructured":"Shahid F, Ashraf H, Ghani A, Ghayyur SAK, Shamshirband S, Salwana E. Psds-proficient security over distributed storage: a method for data transmission in cloud. IEEE Access. 2020;8:118285\u201398.","journal-title":"IEEE Access"},{"issue":"10","key":"4682_CR33","doi-asserted-by":"publisher","first-page":"8119","DOI":"10.1109\/JIOT.2020.3042433","volume":"8","author":"W-Z Zhang","year":"2020","unstructured":"Zhang W-Z, Elgendy IA, Hammad M, Iliyasu AM, Du X, Guizani M, et al. Secure and optimized load balancing for multitier Iot and edge-cloud computing systems. IEEE Internet Things J. 2020;8(10):8119\u201332.","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"4682_CR34","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/JBHI.2020.2973467","volume":"24","author":"H Qiu","year":"2020","unstructured":"Qiu H, Qiu M, Liu M, Memmi G. Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE J Biomed Health Inform. 2020;24(9):2499\u2013505.","journal-title":"IEEE J Biomed Health Inform"},{"issue":"10","key":"4682_CR35","doi-asserted-by":"publisher","first-page":"3019","DOI":"10.1007\/s00521-017-2903-1","volume":"30","author":"Y Feng","year":"2018","unstructured":"Feng Y, Wang G-G, Li W, Li N. Multi-strategy monarch butterfly optimization algorithm for discounted $$\\{$$0-1$$\\}$$ knapsack problem. Neural Comput Appl. 2018;30(10):3019\u201336.","journal-title":"Neural Comput Appl"},{"issue":"10","key":"4682_CR36","doi-asserted-by":"publisher","first-page":"10650","DOI":"10.1109\/JIOT.2020.3006523","volume":"7","author":"M Kumar","year":"2020","unstructured":"Kumar M, Chand S. A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability. IEEE Internet Things J. 2020;7(10):10650\u20139.","journal-title":"IEEE Internet Things J"},{"key":"4682_CR37","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s00500-018-3102-4","volume":"23","author":"S Arora","year":"2019","unstructured":"Arora S, Singh S. Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput. 2019;23:715\u201334.","journal-title":"Soft Comput"},{"key":"4682_CR38","unstructured":"Digital Corpora: Digital Corpora 2009 M57-patents scenario. https:\/\/digitalcorpora.org\/corpora\/scenarios\/m57-patents-scenario. Accessed: April 08, 2024"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04682-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04682-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04682-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T11:46:15Z","timestamp":1768391175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04682-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["4682"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04682-y","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"assertion":[{"value":"22 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declare(s) that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"110"}}