{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:25:40Z","timestamp":1754155540072,"version":"3.41.2"},"reference-count":76,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T00:00:00Z","timestamp":1633564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["K"],"published-print":{"date-parts":[[2022,5,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Cloud eases information processing, but it holds numerous risks, including hacking and confidentiality problems. It puts businesses at risk in terms of data security and compliance. This paper aims to maximize the covered human resource (HR) vulnerabilities and minimize the security costs in the enterprise cloud using a fuzzy-based method and firefly optimization algorithm.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Cloud computing provides a platform to improve the quality and availability of IT resources. It changes the way people communicate and conduct their businesses. However, some security concerns continue to derail the expansion of cloud-based systems into all parts of human life. Enterprise cloud security is a vital component in ensuring the long-term stability of cloud technology by instilling trust. In this paper, a fuzzy-based method and firefly optimization algorithm are suggested for optimizing HR vulnerabilities while mitigating security expenses in organizational cloud environments. MATLAB is employed as a simulation tool to assess the efficiency of the suggested recommendation algorithm. The suggested approach is based on the firefly algorithm (FA) since it is swift and reduces randomization throughout the lookup for an optimal solution, resulting in improved performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The fuzzy-based method and FA unveil better performance than existing met heuristic algorithms. Using a simulation, all the results are verified. The study findings showed that this method could simulate complex and dynamic security problems in cloud services.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>The findings may be utilized to assist the cloud provider or tenant of the cloud infrastructure system in taking appropriate risk mitigation steps.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Using a fuzzy-based method and FA to maximize the covered HR vulnerabilities and minimize the security costs in the enterprise cloud is the main novelty of this paper.<\/jats:p><\/jats:sec>","DOI":"10.1108\/k-04-2021-0280","type":"journal-article","created":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T08:50:12Z","timestamp":1633769412000},"page":"2008-2029","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of the trust values among human resources in the enterprise cloud using an optimization algorithm and fuzzy logic"],"prefix":"10.1108","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4274-7930","authenticated-orcid":false,"given":"Lantian","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6808-9820","authenticated-orcid":false,"given":"Bahareh","family":"Pahlevanzadeh","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"issue":"11","key":"key2022051606414618700_ref001","doi-asserted-by":"crossref","first-page":"1975","DOI":"10.1109\/LWC.2020.3010156","article-title":"A distributed power control algorithm for energy efficiency maximization in wireless cellular networks","volume":"9","year":"2020","journal-title":"IEEE Wireless Communications Letters"},{"issue":"8","key":"key2022051606414618700_ref002","doi-asserted-by":"crossref","first-page":"8601","DOI":"10.1109\/TVT.2020.2997853","article-title":"Resource allocation for cellular V2X networks mode-3 with underlay approach in LTE-V standard","volume":"69","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"year":"2011","key":"key2022051606414618700_ref003","article-title":"Trust modeling and verification using colored petri nets"},{"issue":"6","key":"key2022051606414618700_ref004","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","article-title":"Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility","volume":"25","year":"2009","journal-title":"Future Generation Computer Systems"},{"key":"key2022051606414618700_ref005","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.future.2020.04.008","article-title":"Multi-population differential evolution-assisted Harris hawks optimization: framework and case studies","volume":"111","year":"2020","journal-title":"Future Generation Computer Systems"},{"issue":"8","key":"key2022051606414618700_ref006","doi-asserted-by":"crossref","first-page":"4643","DOI":"10.1287\/mnsc.2020.3707","article-title":"Human capital-driven acquisition: evidence from the inevitable disclosure doctrine","volume":"67","year":"2021","journal-title":"Management Science"},{"year":"2011","key":"key2022051606414618700_ref007","article-title":"Optimum of table"},{"issue":"5","key":"key2022051606414618700_ref008","first-page":"2","article-title":"Cloud computing: an overview","volume":"7","year":"2009","journal-title":"ACM Queue"},{"issue":"1","key":"key2022051606414618700_ref009","first-page":"90","article-title":"Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare","volume":"13","year":"2021","journal-title":"Sustainability"},{"issue":"4","key":"key2022051606414618700_ref010","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1348\/014466602321149849","article-title":"Conflicts among human values and trust in institutions","volume":"41","year":"2002","journal-title":"British Journal of Social Psychology"},{"issue":"3","key":"key2022051606414618700_ref011","doi-asserted-by":"crossref","first-page":"687","DOI":"10.22214\/ijraset.2020.3130","article-title":"Level of human resources development-A conceptual and review exposition","volume":"8","year":"2020","journal-title":"International Journal for Research in Applied Science and Engineering Technology"},{"issue":"5","key":"key2022051606414618700_ref012","first-page":"448","article-title":"A Gaussian firefly algorithm","volume":"1","year":"2011","journal-title":"International Journal of Machine Learning and Computing"},{"issue":"23-24","key":"key2022051606414618700_ref013","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1016\/j.compstruc.2011.08.002","article-title":"Mixed variable structural optimization using firefly algorithm","volume":"89","year":"2011","journal-title":"Computers and Structures"},{"issue":"5","key":"key2022051606414618700_ref014","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1080\/01430750.2017.1412350","article-title":"Application of a new hybrid forecast engine with feature selection algorithm in a power system","volume":"40","year":"2019","journal-title":"International Journal of Ambient Energy"},{"volume-title":"Web 2.0 Architectures: what Entrepreneurs and Information Architects Need to Know","year":"2009","key":"key2022051606414618700_ref015"},{"issue":"1-2","key":"key2022051606414618700_ref016","first-page":"97","article-title":"Trust-based fruit fly optimisation algorithm for task scheduling in a cloud environment","volume":"7","year":"2020","journal-title":"International Journal of Internet Manufacturing and Services"},{"key":"key2022051606414618700_ref017","article-title":"Crop evapotranspiration prediction by considering dynamic change of crop coefficient and the precipitation effect in back-propagation neural network model","volume":"596","year":"2021","journal-title":"Journal of Hydrology"},{"article-title":"Unikernels for cloud architectures: how single responsibility can reduce complexity, thus improving enterprise cloud security","volume-title":"Paper Presented at the COMPLEXIS","year":"2017","key":"key2022051606414618700_ref018"},{"issue":"10","key":"key2022051606414618700_ref019","doi-asserted-by":"crossref","first-page":"2221","DOI":"10.1109\/LCOMM.2020.3005947","article-title":"Multi-branch deep residual learning for clustering and beamforming in user-centric network","volume":"24","year":"2020","journal-title":"IEEE Communications Letters"},{"key":"key2022051606414618700_ref020","first-page":"1","article-title":"A new SLA-aware method for discovering the cloud services using an improved nature-inspired optimization algorithm","volume":"7","year":"2021","journal-title":"PeerJ Computer Science"},{"issue":"ahead-of-print","key":"key2022051606414618700_ref021","doi-asserted-by":"publisher","DOI":"10.1108\/K-12-2020-0909","article-title":"Service discovery mechanisms in cloud computing: a comprehensive and systematic literature review","volume":"ahead-of-print","year":"2021","journal-title":"Kybernetes"},{"volume-title":"Artificial Intelligence in Human Resources Information Systems: Investigating its Trust and Adoption Determinants","year":"2020","key":"key2022051606414618700_ref022"},{"key":"key2022051606414618700_ref023","article-title":"Orthogonal learning covariance matrix for defects of grey wolf optimizer: insights, balance, diversity, and feature selection","volume":"213","year":"2021","journal-title":"Knowledge-Based Systems"},{"article-title":"Trust, distrust and human resource management","volume-title":"Elgar Introduction to Theories of Human Resources and Employment Relations","year":"2019","key":"key2022051606414618700_ref024"},{"issue":"3","key":"key2022051606414618700_ref025","first-page":"1","article-title":"Firefly algorithm based on fuzzy mechanism for optimal congestion management","volume":"3","year":"2015","journal-title":"UCT Journal of Research in Science, Engineering and Technology"},{"year":"2009","key":"key2022051606414618700_ref026","article-title":"A fuzzy logic-based trust model in grid"},{"issue":"14","key":"key2022051606414618700_ref027","doi-asserted-by":"crossref","first-page":"2396","DOI":"10.1016\/j.comnet.2009.04.008","article-title":"A trust model based on fuzzy recommendation for mobile ad-hoc networks","volume":"53","year":"2009","journal-title":"Computer Networks"},{"issue":"8","key":"key2022051606414618700_ref028","first-page":"6273","article-title":"Industrial security solution for virtual reality","volume":"8","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"key2022051606414618700_ref029","first-page":"2048","article-title":"Diversified technologies in internet of vehicles under intelligent edge computing","volume":"22","year":"2020","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"1s","key":"key2022051606414618700_ref030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3418215","article-title":"Fine-grained visual computing based on deep learning","volume":"17","year":"2021","journal-title":"ACM Transactions on Multimidia Computing Communications and Applications"},{"issue":"2","key":"key2022051606414618700_ref031","doi-asserted-by":"crossref","first-page":"1679","DOI":"10.1016\/j.asoc.2010.04.024","article-title":"Differential evolution algorithm with ensemble of parameters and mutation strategies","volume":"11","year":"2011","journal-title":"Applied Soft Computing"},{"issue":"7","key":"key2022051606414618700_ref032","first-page":"1192","article-title":"Bandwidth and delay optimization by integration of software trust estimator with multi-user cloud resource competence","volume":"33","year":"2020","journal-title":"International Journal of Engineering"},{"year":"2014","key":"key2022051606414618700_ref033","article-title":"Analysis of mesh router placement in wireless mesh networks using friedman test"},{"issue":"3","key":"key2022051606414618700_ref034","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1108\/K-12-2018-0663","article-title":"Structural equation modeling in cloud computing studies: a systematic literature review","volume":"49","year":"2020","journal-title":"Kybernetes"},{"issue":"ahead-of-print","key":"key2022051606414618700_ref035","doi-asserted-by":"publisher","DOI":"10.1108\/K-02-2021-0129","article-title":"Toward the efficient service selection approaches in cloud computing","volume":"ahead-of-print","year":"2021","journal-title":"Kybernetes"},{"issue":"4","key":"key2022051606414618700_ref036","first-page":"1105","article-title":"Relationship between islamic human resources management (IHRM) practices and trust: an empirical study","volume":"6","year":"2013","journal-title":"Journal of Industrial Engineering and Management"},{"key":"key2022051606414618700_ref037","first-page":"226","article-title":"Enterprise security framework for enterprise cloud data centres","volume-title":"Cloud Security: Concepts, Methodologies, Tools, and Applications","year":"2019"},{"year":"2014","key":"key2022051606414618700_ref038","article-title":"Recommendations and best practices for cloud enterprise security"},{"journal-title":"Nuclear Engineering Technology","article-title":"Proposing a gamma radiation based intelligent system for simultaneous analyzing and detecting type and amount of petroleum by-products","year":"2020","key":"key2022051606414618700_ref039"},{"key":"key2022051606414618700_ref040","article-title":"Application of GMDH neural network technique to improve measuring precision of a simplified photon attenuation based two-phase flowmeter","volume":"75","year":"2020","journal-title":"Flow Measurement Instrumentation"},{"key":"key2022051606414618700_ref041","article-title":"Combination of X-ray tube and GMDH neural network as a nondestructive and potential technique for measuring characteristics of gas-oil\u2013water three phase flows","volume":"168","year":"2021","journal-title":"Measurement"},{"journal-title":"Kybernetes","article-title":"Enterprise cloud computing: a strategy guide for business and technology Leaders\u00a9 YR Storch Rudall","year":"2011","key":"key2022051606414618700_ref042"},{"issue":"9","key":"key2022051606414618700_ref043","article-title":"Enhancing cloud computing security using AES algorithm","volume":"67","year":"2013","journal-title":"International Journal of Computer Applications"},{"key":"key2022051606414618700_ref044","article-title":"Applicability of time-domain feature extraction methods and artificial intelligence in two-phase flow meters based on gamma-ray absorption technique","volume":"168","year":"2021","journal-title":"Measurement"},{"key":"key2022051606414618700_ref045","article-title":"Double adaptive weights for stabilization of moth flame optimizer: balance analysis, engineering cases, and medical diagnosis","volume":"214","year":"2021","journal-title":"Knowledge-Based Systems"},{"issue":"1","key":"key2022051606414618700_ref046","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s40998-018-0146-5","article-title":"A lightweight user authentication scheme for cloud-IoT based healthcare services","volume":"43","year":"2019","journal-title":"Iranian Journal of Science and Technology, Transactions of Electrical Engineering"},{"key":"key2022051606414618700_ref047","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.knosys.2016.01.002","article-title":"Evolving support vector machines using fruit fly optimization for medical data classification","volume":"96","year":"2016","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"key2022051606414618700_ref048","first-page":"2193","article-title":"Near-online tracking with co-occurrence constraints in blockchain-based edge computing","volume":"8","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"key2022051606414618700_ref049","first-page":"32","article-title":"Enhanced security framework to ensure data security in cloud computing using cryptography","volume":"1","year":"2012","journal-title":"Advances in Computer Science and Its Applications"},{"issue":"4","key":"key2022051606414618700_ref050","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1504\/IJICA.2011.044529","article-title":"A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments","volume":"3","year":"2011","journal-title":"International Journal of Innovative Computing and Applications"},{"year":"2020","key":"key2022051606414618700_ref051","article-title":"Trust evaluation model for cloud security using fuzzy theory"},{"issue":"5","key":"key2022051606414618700_ref052","first-page":"10905","article-title":"An improved efficient: artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment","volume":"22","year":"2019","journal-title":"Cluster Computing"},{"year":"2005","key":"key2022051606414618700_ref053","article-title":"Service-oriented system engineering: a new paradigm"},{"key":"key2022051606414618700_ref054","article-title":"Evolutionary biogeography-based whale optimization methods with communication structure: towards measuring the balance","volume":"212","year":"2021","journal-title":"Knowledge-Based Systems"},{"year":"2017","key":"key2022051606414618700_ref055","article-title":"A hybrid approach to enhance data security in cloud storage"},{"key":"key2022051606414618700_ref056","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.infsof.2017.01.006","article-title":"Taxonomies in software engineering: a systematic mapping study and a revised taxonomy development method","volume":"85","year":"2017","journal-title":"Information and Software Technology"},{"issue":"ahead-of-print","key":"key2022051606414618700_ref057","doi-asserted-by":"publisher","DOI":"10.1108\/K-04-2021-0333","article-title":"The role of IT-based technologies on the management of human resources in the COVID-19 era","volume":"ahead-of-print","year":"2021","journal-title":"Kybernetes"},{"key":"key2022051606414618700_ref058","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.eswa.2015.08.054","article-title":"Opposition and dimensional based modified firefly algorithm","volume":"44","year":"2016","journal-title":"Expert Systems with Applications"},{"key":"key2022051606414618700_ref059","article-title":"Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis","volume":"88","year":"2020","journal-title":"Applied Soft Computing"},{"key":"key2022051606414618700_ref060","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.neucom.2017.04.060","article-title":"Toward an optimal kernel extreme learning machine using a chaotic moth-flame optimization strategy with applications in medical diagnoses","volume":"267","year":"2017","journal-title":"Neurocomputing"},{"volume-title":"An Integrated CASB Implementation Model to Enhance Enterprise Cloud Security","year":"2020","key":"key2022051606414618700_ref061"},{"issue":"3","key":"key2022051606414618700_ref062","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3398202","article-title":"On Scalability of Association-rule-based recommendation: a unified distributed-computing framework","volume":"14","year":"2020","journal-title":"ACM Transactions on the Web"},{"issue":"7","key":"key2022051606414618700_ref063","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1007\/s11265-021-01666-y","article-title":"A diversity-based selfish node detection algorithm for socially aware networking","volume":"93","year":"2021","journal-title":"Journal of Signal Processing Systems"},{"issue":"4","key":"key2022051606414618700_ref064","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s00500-013-1089-4","article-title":"Adaptive computational chemotaxis based on field in bacterial foraging optimization","volume":"18","year":"2014","journal-title":"Soft Computing"},{"key":"key2022051606414618700_ref065","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.ins.2019.04.022","article-title":"Enhanced Moth-flame optimizer with mutation strategy for global optimization","volume":"492","year":"2019","journal-title":"Information Sciences"},{"volume-title":"Engineering Optimization: An Introduction with Metaheuristic Applications","year":"2010","key":"key2022051606414618700_ref066"},{"key":"key2022051606414618700_ref067","first-page":"245","article-title":"Why the firefly algorithm works?","volume-title":"Nature-Inspired Algorithms and Applied Optimization","year":"2018"},{"year":"2010","key":"key2022051606414618700_ref068","article-title":"A collaborative trust model of firewall-through based on Cloud Computing"},{"key":"key2022051606414618700_ref069","first-page":"1","article-title":"Dynamic Gaussian bare-bones fruit fly optimizers with abandonment mechanism: method and analysis","year":"2020","journal-title":"Engineering with Computers"},{"key":"key2022051606414618700_ref070","first-page":"1","article-title":"SGOA: annealing-behaved grasshopper optimizer for global tasks","year":"2021","journal-title":"Engineering with Computers"},{"issue":"2","key":"key2022051606414618700_ref071","first-page":"139","article-title":"Research on image retrieval algorithm based on combination of color and shape features","volume":"93","year":"2021","journal-title":"Journal of Signal Processing Systems"},{"year":"2009","key":"key2022051606414618700_ref072","article-title":"CCOA: cloud computing open architecture"},{"key":"key2022051606414618700_ref073","first-page":"1","article-title":"Boosted binary Harris hawks optimizer and feature selection","year":"2020","journal-title":"Engineering with Computers"},{"key":"key2022051606414618700_ref074","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/j.asoc.2014.07.024","article-title":"Feature selection based on improved ant colony optimization for online detection of foreign fiber in cotton","volume":"24","year":"2014","journal-title":"Applied Soft Computing"},{"key":"key2022051606414618700_ref075","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.compbiolchem.2018.11.017","article-title":"Chaos enhanced grey wolf optimization wrapped ELM for diagnosis of paraquat-poisoned patients","volume":"78","year":"2019","journal-title":"Computational Biology and Chemistry"},{"key":"key2022051606414618700_ref076","article-title":"Chaotic random spare ant colony optimization for multi-threshold image segmentation of 2D Kapur entropy","volume":"216","year":"2021","journal-title":"Knowledge-Based Systems"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-04-2021-0280\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-04-2021-0280\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:47:53Z","timestamp":1753393673000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/51\/6\/2008-2029\/511619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,7]]},"references-count":76,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2021,10,7]]},"published-print":{"date-parts":[[2022,5,17]]}},"alternative-id":["10.1108\/K-04-2021-0280"],"URL":"https:\/\/doi.org\/10.1108\/k-04-2021-0280","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2021,10,7]]}}}