{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:36:23Z","timestamp":1773412583428,"version":"3.50.1"},"reference-count":54,"publisher":"Emerald","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,12]]},"abstract":"<jats:sec>\n                    <jats:title>Purpose<\/jats:title>\n                    <jats:p>As cloud computing enterprise users migrate their business data to the cloud, they relinquish control over their data. How to update cloud computing data security management strategy is a serious challenge for cloud computing enterprise users. From the perspective of cloud computing enterprise users, the influence of data value fluctuation on data security management strategy in cloud computing environments necessitates further exploration.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Design\/methodology\/approach<\/jats:title>\n                    <jats:p>The detection model about incremental update of data value is built and the updating model about cloud computing data security management strategy is also built by the idea of K-nearest neighbors (KNN). To verify the application effectiveness of the model, the data sets containing two-year operating login logs is used for the application analysis, which come from an enterprise\u2019s management information system (MIS).<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Findings<\/jats:title>\n                    <jats:p>Based on the detection results about incremental update of data value, the management strategy about cloud computing data security is correspondingly updated according the strategy of the nearest neighbors.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Originality\/value<\/jats:title>\n                    <jats:p>The research results provide the model and method for the enterprise to update cloud computing data security management strategy according to the change of data value and help the enterprises to improve the active defense capability about cloud computing data security.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.1108\/jeim-08-2024-0451","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T12:46:56Z","timestamp":1745239616000},"page":"1579-1598","source":"Crossref","is-referenced-by-count":4,"title":["Cloud computing data security management strategy based on incremental update of data value"],"prefix":"10.1108","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0049-8806","authenticated-orcid":true,"given":"Zhiying","family":"Wang","sequence":"first","affiliation":[{"name":"Jiangsu University of Science and Technology School of Economics and Management, , ,","place":["Zhenjiang, China"]}]},{"given":"Nianxin","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangsu University of Science and Technology School of Economics and Management, , ,","place":["Zhenjiang, China"]}]},{"given":"Shilun","family":"Ge","sequence":"additional","affiliation":[{"name":"Jiangsu University of Science and Technology School of Economics and Management, , ,","place":["Zhenjiang, China"]}]}],"member":"140","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"issue":"1","key":"2025121007515522400_ref001","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi14010011","article-title":"Security and privacy in cloud computing: technical review","volume":"14","author":"Abdulsalam","year":"2021","journal-title":"Future Internet"},{"issue":"2","key":"2025121007515522400_ref002","doi-asserted-by":"publisher","first-page":"107","DOI":"10.22059\/jitm.2020.75795","article-title":"Top benefits and hindrances to cloud computing adoption in Saudi Arabia: a brief study","volume":"12","author":"Albelaihi","year":"2020","journal-title":"Journal of Information Technology Management"},{"issue":"3","key":"2025121007515522400_ref003","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1108\/jstpm-05-2018-0053","article-title":"A multifaceted framework for adoption of cloud computing in Malaysian SMEs","volume":"10","author":"Asiaei","year":"2019","journal-title":"Journal of Science and Technology Policy Management"},{"key":"2025121007515522400_ref004","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-74469-6_28","article-title":"Information life cycle, information value and data management","author":"Bayer","year":"2007"},{"issue":"5","key":"2025121007515522400_ref005","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1007\/s10877-023-01007-3","article-title":"From big data's 5Vs to clinical practice's 5Ws: enhancing data-driven decision making in healthcare","volume":"37","author":"Bellini","year":"2023","journal-title":"Journal of Clinical Monitoring and Computing"},{"key":"2025121007515522400_ref006","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/ICAC.2005.35","article-title":"Information valuation for information lifecycle management","author":"Chen","year":"2005"},{"issue":"2","key":"2025121007515522400_ref007","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","article-title":"Big data: a survey","volume":"19","author":"Chen","year":"2014","journal-title":"Mobile Networks and Applications"},{"issue":"2","key":"2025121007515522400_ref008","doi-asserted-by":"publisher","first-page":"87","DOI":"10.4018\/IJEIS.2018040106","article-title":"Network system structure design for data centers in large enterprises using cloud computing","volume":"14","author":"Chi","year":"2018","journal-title":"International Journal of Enterprise Information Systems"},{"issue":"4","key":"2025121007515522400_ref009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2699909","article-title":"Dynamic provable data possession","volume":"17","author":"Erway","year":"2015","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"2025121007515522400_ref010","doi-asserted-by":"publisher","first-page":"127","DOI":"10.3390\/e25010127","article-title":"An enhanced quantum k-nearest neighbor classification algorithm based on polar distance","volume":"25","author":"Feng","year":"2023","journal-title":"Entropy"},{"issue":"2","key":"2025121007515522400_ref011","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1083784.1083789","article-title":"Mining data streams: a review","volume":"34","author":"Gaber","year":"2005","journal-title":"ACM Sigmod Record"},{"issue":"4","key":"2025121007515522400_ref012","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.1007\/s11036-019-01509-y","article-title":"ShadowFPE: new encrypted web application solution based on shadow DOM","volume":"26","author":"Guo","year":"2020","journal-title":"Mobile Networks and Applications"},{"issue":"2","key":"2025121007515522400_ref013","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/1773912.1773926","article-title":"A case for the accountable cloud","volume":"44","author":"Haeberlen","year":"2010","journal-title":"ACM SIGOPS - Operating Systems Review"},{"issue":"9","key":"2025121007515522400_ref014","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","article-title":"A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability","volume":"23","author":"Hao","year":"2011","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"2025121007515522400_ref015","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.jsis.2011.06.001","article-title":"Value conflicts for information security management","volume":"20","author":"Hedstr\u00f6m","year":"2011","journal-title":"The Journal of Strategic Information Systems"},{"issue":"1","key":"2025121007515522400_ref016","doi-asserted-by":"publisher","first-page":"180","DOI":"10.5465\/amr.2007.23464011","article-title":"Value creation and value capture: a multilevel perspective","volume":"32","author":"Lepak","year":"2007","journal-title":"Academy of Management Review"},{"key":"2025121007515522400_ref017","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.future.2016.12.010","article-title":"Optimal data partitioning in cloud computing system with random server assignment","volume":"70","author":"Levitin","year":"2017","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"2025121007515522400_ref018","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/j.ejor.2017.11.064","article-title":"Co-residence based data vulnerability vs. security in cloud computing system with random server assignment","volume":"267","author":"Levitin","year":"2018","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"2025121007515522400_ref019","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1111\/risa.13219","article-title":"Security of separated data in cloud systems with competing attack detection and data theft processes","volume":"39","author":"Levitin","year":"2019","journal-title":"Risk Analysis"},{"key":"2025121007515522400_ref020","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ress.2020.106969","article-title":"Optimal early warning defense of N-version programming service against co-resident attacks in cloud system","volume":"201","author":"Levitin","year":"2020","journal-title":"Reliability Engineering and System Safety"},{"key":"2025121007515522400_ref021","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.comcom.2023.07.008","article-title":"A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing","volume":"209","author":"Lv","year":"2023","journal-title":"Computer Communications"},{"issue":"3","key":"2025121007515522400_ref023","doi-asserted-by":"publisher","first-page":"128","DOI":"10.4018\/IJEIS.2018070107","article-title":"A cloud based solution for collaborative and secure sharing of medical data","volume":"14","author":"Marwan","year":"2018","journal-title":"International Journal of Enterprise Information Systems"},{"issue":"37","key":"2025121007515522400_ref024","doi-asserted-by":"publisher","first-page":"4342","DOI":"10.1080\/00036846.2021.1899121","article-title":"Digital economy value chain: concept, model structure, and mechanism","volume":"53","author":"Miao","year":"2021","journal-title":"Applied Economics"},{"issue":"2","key":"2025121007515522400_ref025","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1541\/ieejias.139.158","article-title":"Balanced kNN: a new lazy learning algorithm and its evaluation","volume":"139","author":"Nagayama","year":"2019","journal-title":"IEEE Transactions on Industry Applications"},{"issue":"3","key":"2025121007515522400_ref026","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2018.2866321","article-title":"Passive attacks against searchable encryption","volume":"14","author":"Ning","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2025121007515522400_ref027","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-40203-6_6","article-title":"Estimating asset sensitivity by profiling users","volume":"8134","author":"Park","year":"2013","journal-title":"ESORICS 2013"},{"issue":"4","key":"2025121007515522400_ref028","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/097226290801200401","article-title":"Analytic hierarchy process for selection of erp software for manufacturing companies","volume":"12","author":"Perera","year":"2008","journal-title":"Management Development Institute"},{"issue":"2","key":"2025121007515522400_ref029","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1287\/isre.12.2.208.9697","article-title":"Research report: richness versus parsimony in modeling technology adoption decisions-understanding merchant adoption of a smart card-based payment system","volume":"12","author":"Plouffe","year":"2001","journal-title":"Information Systems Research"},{"issue":"7","key":"2025121007515522400_ref030","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s12652-018-0967-0","article-title":"A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud","volume":"10","author":"Premkamal","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"4","key":"2025121007515522400_ref031","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1080\/15228053.2013.10845727","article-title":"Towards an understanding of cloud computing\u2019s impact on organizational IT strategy","volume":"15","author":"Qian","year":"2014","journal-title":"Journal of Information Technology Case and Application Research"},{"issue":"3","key":"2025121007515522400_ref032","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1109\/TPAMI.2020.3019967","article-title":"Towards robust monocular depth estimation: mixing datasets for zero-shot cross dataset transfer","volume":"44","author":"Ranftl","year":"2022","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"2025121007515522400_ref033","doi-asserted-by":"publisher","first-page":"69","DOI":"10.4018\/ijeis.2020010104","article-title":"An efficient multi-objective model for data replication in cloud computing environment","volume":"16","author":"Sasikumar","year":"2020","journal-title":"International Journal of Enterprise Information Systems"},{"key":"2025121007515522400_ref034","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3127\/ajis.v22i0.1603","article-title":"Factors that influence adoption of cloud computing: an empirical study of Australian SMEs","volume":"22","author":"Senarathna","year":"2018","journal-title":"Australasian Journal of Information Systems"},{"key":"2025121007515522400_ref035","doi-asserted-by":"publisher","first-page":"26334","DOI":"10.1109\/ACCESS.2024.3351119","article-title":"Dynamic AES encryption and blockchain key management: a novel solution for cloud data security","volume":"12","author":"Shakor","year":"2024","journal-title":"IEEE Access"},{"key":"2025121007515522400_ref036","doi-asserted-by":"publisher","first-page":"79169","DOI":"10.1109\/ACCESS.2020.2987331","article-title":"Factors influencing SMEs' adoption of cloud computing services in Lebanon","volume":"8","author":"Skafi","year":"2020","journal-title":"IEEE Access"},{"issue":"6","key":"2025121007515522400_ref037","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSEC.2018.2882122","article-title":"Toward cyberresiliency in the context of cloud computing resilient security","volume":"16","author":"Sun","year":"2018","journal-title":"IEEE Security and Privacy"},{"key":"2025121007515522400_ref038","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2017.09.020","article-title":"Next generation cloud computing: new trends and research directions","volume":"79","author":"Varghese","year":"2018","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"2025121007515522400_ref039","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10207-018-0418-0","article-title":"Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter","volume":"18","author":"Vora","year":"2019","journal-title":"International Journal of Information Security"},{"issue":"5","key":"2025121007515522400_ref040","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","article-title":"Enabling public auditability and data dynamics for storage security in cloud computing","volume":"22","author":"Wang","year":"2010","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"2025121007515522400_ref041","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSC.2011.24","article-title":"Toward secure and dependable storage services in cloud computing","volume":"5","author":"Wang","year":"2012","journal-title":"IEEE Transactions on Services Computing"},{"issue":"4-6","key":"2025121007515522400_ref042","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1080\/19393555.2016.1231353","article-title":"Differentiated management strategies on cloud computing data security driven by data value","volume":"25","author":"Wang","year":"2016","journal-title":"Information Security Journal: A Global Perspective"},{"key":"2025121007515522400_ref043","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.ijinfomgt.2019.09.002","article-title":"An empirical study on business analytics affordances enhancing the management of cloud computing data security","volume":"50","author":"Wang","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"3","key":"2025121007515522400_ref044","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1023\/A:1011934131004","article-title":"Secure digital archiving of high-value data","volume":"19","author":"Wright","year":"2001","journal-title":"BT Technology Journal"},{"issue":"1","key":"2025121007515522400_ref045","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11280-018-0539-4","article-title":"Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments","volume":"22","author":"Wu","year":"2019","journal-title":"World Wide Web"},{"issue":"8","key":"2025121007515522400_ref046","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1016\/j.im.2016.06.003","article-title":"Value co-creation between firms and customers: the role of big data-based cooperative assets","volume":"53","author":"Xie","year":"2016","journal-title":"Information and Management"},{"key":"2025121007515522400_ref047","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.ress.2017.06.006","article-title":"Balancing theft and corruption threats by data partition in cloud system with independent server protection","volume":"167","author":"Xing","year":"2017","journal-title":"Reliability Engineering and System Safety"},{"issue":"2","key":"2025121007515522400_ref048","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1109\/TKDE.2012.251","article-title":"Building confidential and efficient query services in the cloud with rasp data perturbation","volume":"26","author":"Xu","year":"2014","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"2025121007515522400_ref049","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TSUSC.2021.3128388","article-title":"Dynamic data transaction in crowdsensing based on multi-armed bandits and shapley value","volume":"7","author":"Xu","year":"2022","journal-title":"IEEE Transactions on Sustainable Computing"},{"issue":"8","key":"2025121007515522400_ref050","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1109\/TIFS.2017.2695449","article-title":"Strong key-exposure resilient auditing for secure cloud storage","volume":"12","author":"Yu","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"2025121007515522400_ref051","doi-asserted-by":"publisher","first-page":"7669","DOI":"10.1109\/TII.2021.3049141","article-title":"Blockchain-enhanced data sharing with traceable and direct revocation in IIoT","volume":"17","author":"Yu","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2025121007515522400_ref052","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","article-title":"Ensuring attribute privacy protection and fast decryption for outsourced data security in Mobile cloud computing","volume":"379","author":"Zhang","year":"2017","journal-title":"Information Sciences"},{"issue":"6","key":"2025121007515522400_ref053","doi-asserted-by":"publisher","first-page":"4238","DOI":"10.1109\/TII.2020.2991204","article-title":"Secure storage auditing with efficient key updates for cognitive industrial IoT environment","volume":"17","author":"Zheng","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"2025121007515522400_ref054","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1109\/TDSC.2020.3013927","article-title":"Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics","volume":"19","author":"Zhou","year":"2022","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2025121007515522400_ref055","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","article-title":"Secure and controllable K-NN query over encrypted cloud data with key confidentiality","volume":"89","author":"Zhu","year":"2016","journal-title":"Journal of Parallel and Distributed Computing"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-08-2024-0451\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/jeim\/article-pdf\/38\/5\/1579\/11018807\/jeim-08-2024-0451en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/jeim\/article-pdf\/38\/5\/1579\/11018807\/jeim-08-2024-0451en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:52:05Z","timestamp":1765371125000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/jeim\/article\/38\/5\/1579\/1254122\/Cloud-computing-data-security-management-strategy"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,12,12]]}},"URL":"https:\/\/doi.org\/10.1108\/jeim-08-2024-0451","relation":{},"ISSN":["1741-0398","1758-7409"],"issn-type":[{"value":"1741-0398","type":"print"},{"value":"1758-7409","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,22]]}}}