{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T05:01:22Z","timestamp":1773032482974,"version":"3.50.1"},"reference-count":51,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":232,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Software"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns. Existing models often struggle to achieve an optimal balance between these factors, particularly in dynamic cloud environments. This research introduces a comprehensive approach that optimizes trust\u2010based job allocation in cloud services while addressing privacy issues. Our proposed hybrid model integrates k\u2010anonymity techniques for privacy preservation, coupled with a firefly\u2010Levenberg (Fireberg) optimization to bolster trust generation. It also employs the time\u2010aware modified best fit decreasing (T\u2010MBFD) allocation policy to make resource allocation time\u2010sensitive. This strategic allocation approach enhances cloud computing system performance and scalability. Simulations using a dataset of 95,000 records demonstrate that our model achieves an impressive 96% accuracy, surpassing existing literature by 5%\u201314%. The results highlight the model\u2019s ability to provide robust privacy protection while ensuring efficient resource allocation. The proposed hybrid model promises cloud service users high\u2010quality, secure, and efficient job allocations, thereby improving customer satisfaction and trust. This research makes significant contributions to fortifying the reliability and appeal of cloud services in an evolving digital landscape.<\/jats:p>","DOI":"10.1049\/sfw2\/3296533","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:05:25Z","timestamp":1755774325000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Elevating Cloud Security With Advanced Trust Evaluation and Optimization of Hybrid Fireberg Technique"],"prefix":"10.1049","volume":"2025","author":[{"given":"Himani","family":"Saini","sequence":"first","affiliation":[]},{"given":"Gopal","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Amrinder","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Saini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7656-3374","authenticated-orcid":false,"given":"Niyaz Ahmad","family":"Wani","sequence":"additional","affiliation":[]},{"given":"Vikram","family":"Chopra","sequence":"additional","affiliation":[]},{"given":"Rashiq Rafiq","family":"Marie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4649-2376","authenticated-orcid":false,"given":"Tehseen","family":"Mazhar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6081-2559","authenticated-orcid":false,"given":"Mamoon M.","family":"Saeed","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"crossref","unstructured":"Al-HajS. Al-ShaerE. andRamasamyH. G. V. Security-Aware Resource Allocation in Clouds 2013 Proceedings - IEEE 10th International Conference on Services Computing SCC 2013 400\u2013407 https:\/\/doi.org\/10.1109\/SCC.2013.36 2-s2.0-84891951882.","DOI":"10.1109\/SCC.2013.36"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.10.004"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.019"},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"AgrawalD. DasS. andAbbadiA. El Big Data and Cloud Computing: Current State and Future Opportunities ACM International Conference Proceeding Series 2011 530\u2013533 https:\/\/doi.org\/10.1145\/1951365.","DOI":"10.1145\/1951365.1951432"},{"key":"e_1_2_11_5_2","unstructured":"Geeks for Geeks 7 Most Common Cloud Computing Challenges - GeeksforGeeks Geeks for Geeks 2023 22."},{"key":"e_1_2_11_6_2","unstructured":"McKeeverG. Why Data Security and Privacy in the Digital Age Are Crucial Security Boulevard 2023 22."},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00697-7"},{"key":"e_1_2_11_8_2","first-page":"107925","article-title":"A Survey of Cloud Computing Security Management","volume":"9","author":"Li J.","year":"2021","journal-title":"IEEE Access"},{"key":"e_1_2_11_9_2","first-page":"1075","article-title":"Privacy-Preserving Data Sharing in Cloud Computing Environments: Taxonomy and Open Challenges","volume":"8","author":"Dwork C.","year":"2020","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_2_11_10_2","first-page":"684","article-title":"Privacy-Preserving Computation in Cloud Computing","volume":"7","author":"Zhao Y.","year":"2019","journal-title":"IEEE Access"},{"key":"e_1_2_11_11_2","article-title":"D2D Big Data Privacy-Preserving Framework Based on (a, k)-Anonymity Model","volume":"2019","author":"Wang J.","year":"2019","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102224"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10222877"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2360516"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-03999-0"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00922-2"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00623-1"},{"key":"e_1_2_11_18_2","article-title":"CA-MLBS: Content-Aware Machine Learning Based Load Balancing Scheduler in the Cloud Environment","author":"Adil M.","year":"2022","journal-title":"Expert Systems"},{"key":"e_1_2_11_19_2","doi-asserted-by":"crossref","unstructured":"ZivkovicM. BacaninN. ArandjelovicJ. StrumbergerI. andVenkatachalamK. Firefly Algorithm and Deep Neural Network Approach for Intrusion Detection in Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2021 Springer 1\u201312.","DOI":"10.1007\/978-981-19-4831-2_1"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/math10132272"},{"key":"e_1_2_11_21_2","first-page":"1","article-title":"A Trusted De-Swinging k-Anonymity Scheme for Location Privacy Protection","volume":"11","author":"Yang M.","year":"2022","journal-title":"Journal of Cloud Computing"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11751-w"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"GodhrawalaH.andSridaranR. Improving Architectural Reusability for Resource Allocation Framework in Futuristic Cloud Computing Using Decision Tree Based Multi-Objective Automated Approach 2023 Advancements in Smart Computing and Information Security: First International Conference ASCIS. 2022 Revised Selected Papers Part I 2022 Rajkot India 397\u2013415.","DOI":"10.1007\/978-3-031-23092-9_32"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.31026\/j.eng.2023.01.03"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23031554"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140214"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3073062"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3137326"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.05.015"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1002\/CPE.7831"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym17040503"},{"key":"e_1_2_11_32_2","unstructured":"formula-of-euclidean-distance-1624039148.png (667\u00d7744 2023 Available:https:\/\/d138zd1ktt9iqe.cloudfront.net\/media\/seo_landing_files\/formula-of-euclidean-distance-1624039148.png."},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3281728"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3218894"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111519"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04367-x"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04266-x"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16008-2"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3195318"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10908-x"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48573-2_64"},{"key":"e_1_2_11_42_2","first-page":"46","article-title":"Modified Levenberg-Marquardt Method for Neural Networks Training","volume":"6","author":"Suratgar A. A.","year":"2005","journal-title":"World Academy of Science, Engineering and Technology"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02141-6"},{"key":"e_1_2_11_44_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2016.9.7.16"},{"key":"e_1_2_11_45_2","unstructured":"SainiH.andSinghG. Comparative Analysis of Privacy Preservation Mechanism: Assessing Trustworthy Cloud Services with a Hybrid Framework and Swarm Intelligence International Journal on Recent and Innovation Trends in Computing and Communication 2024."},{"key":"e_1_2_11_46_2","doi-asserted-by":"publisher","DOI":"10.22247\/ijcna\/2023\/223690"},{"key":"e_1_2_11_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01759-y"},{"key":"e_1_2_11_48_2","article-title":"IEEE Networking Letters","volume":"4","author":"Gupta R.","year":"2023","journal-title":"Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications"},{"key":"e_1_2_11_49_2","article-title":"A Hybrid Machine Learning Model With Self-Improved Optimization Algorithm for Trust and Privacy Preservation in Cloud Environment","volume":"13","author":"Saini H.","year":"2024","journal-title":"Journal of Cloud Computing"},{"key":"e_1_2_11_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3215248"},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3520665"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/sfw2\/3296533","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/sfw2\/3296533","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/sfw2\/3296533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T04:09:48Z","timestamp":1773029388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/sfw2\/3296533"}},"subtitle":[],"editor":[{"given":"Mohammed","family":"Al-Khalidi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/sfw2\/3296533"],"URL":"https:\/\/doi.org\/10.1049\/sfw2\/3296533","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3296533"}}