{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:18:42Z","timestamp":1769757522984,"version":"3.49.0"},"reference-count":42,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Coop. Info. Syst."],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:p> As with IoT devices, cloud computation increases its applicability to other areas that use the information and puts it in a commonplace that is necessary for computing and analysis. These devices need the cloud to store and retrieve data since they are unable to store and process data on their own. Cloud computing offers a variety of services to consumers, including IaaS, PaaS, and SaaS. The usage of cloud resources for data storage that may be accessible by all users associated with cloud computing is a key disadvantage of cloud computing. Without disclosing the data\u2019s contents, the usage of Public Key Encryptions with Keyword Search (PEKS) secures publicly encrypted keys against third-party search capabilities that are not trustworthy. PEKs provide a security risk every time Interior Keywords Guessing Attacks (IKGA) are discovered in the system since an unauthorized service estimates the keywords in the trapdoor. This issue can be resolved using various methodologies such as the Certificateless Fleshed Public Key Authenticated Encryption of Keyword Search (CL-HPAEKS), which also uses Altered Elliptic Curve Cryptography (MECC), and the Mutation Centred Flower Pollinations Algorithm (CM-FPA), which uses optimization in keys to be improving the algorithm\u2019s performance. The system\u2019s security is achieved by adding a Message Fragments\u00a05 (MD5) scramble mechanism. The proposed system achieves system security of 96%, and it takes less time to implement than earlier encryption methods. <\/jats:p>","DOI":"10.1142\/s0218843024500011","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T07:08:43Z","timestamp":1710745723000},"source":"Crossref","is-referenced-by-count":13,"title":["Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services"],"prefix":"10.1142","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0727-7072","authenticated-orcid":false,"given":"P.","family":"Punitha","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Tagore Institute of Engineering and Technology, Salem, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1669-8012","authenticated-orcid":false,"given":"Lakshmana","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Machine Learning, Tagore Institute of Engineering and Technology, Salem, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4224-2919","authenticated-orcid":false,"given":"S.","family":"Revathi","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Anna University, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8992-694X","authenticated-orcid":false,"given":"R.","family":"Premalatha","sequence":"additional","affiliation":[{"name":"IFET College of Engineering, Villupuram, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0266-2780","authenticated-orcid":false,"given":"R. S.","family":"Aiswarya","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, KPR Institute of Engineering and Technology, Coimbatore, India"}]}],"member":"219","published-online":{"date-parts":[[2024,3,18]]},"reference":[{"key":"S0218843024500011BIB001","first-page":"1024296","volume":"50","author":"Ma M.","year":"2020","journal-title":"J. Inf. Security Appl."},{"key":"S0218843024500011BIB002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-020-07175-8","volume":"113","author":"Elhabob R.","year":"2020","journal-title":"Wirel. Personal Commun."},{"key":"S0218843024500011BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2861424"},{"key":"S0218843024500011BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"S0218843024500011BIB005","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"S0218843024500011BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.138"},{"key":"S0218843024500011BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"S0218843024500011BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.09.030"},{"key":"S0218843024500011BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2017.09.012"},{"key":"S0218843024500011BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"S0218843024500011BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.003"},{"key":"S0218843024500011BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-019-00716-8"},{"key":"S0218843024500011BIB013","first-page":"156","volume":"47","author":"Daniel R. M.","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218843024500011BIB014","first-page":"191","volume-title":"International Conf. Intelligent Information Hiding and Multimedia Signal Processing","author":"Wu T.","year":"2017"},{"key":"S0218843024500011BIB015","first-page":"102394","volume":"49","author":"Pakniat N.","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218843024500011BIB016","first-page":"130","volume-title":"Int. Conf. Information Technology and Communications","author":"Vivek S.","year":"2015"},{"key":"S0218843024500011BIB017","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1700534"},{"key":"S0218843024500011BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"S0218843024500011BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4642-1_1"},{"key":"S0218843024500011BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.004"},{"key":"S0218843024500011BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.022"},{"key":"S0218843024500011BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2510822"},{"key":"S0218843024500011BIB023","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-00701-7"},{"key":"S0218843024500011BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"key":"S0218843024500011BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945813"},{"key":"S0218843024500011BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.063"},{"key":"S0218843024500011BIB027","first-page":"1","author":"Elhabob R.","year":"2019","journal-title":"J. Amb. Intell. Humanized Comput."},{"key":"S0218843024500011BIB028","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0178-y"},{"key":"S0218843024500011BIB029","first-page":"1","volume":"14","author":"Xiong H.","year":"2019","journal-title":"IEEE Syst. J."},{"key":"S0218843024500011BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931056"},{"key":"S0218843024500011BIB031","doi-asserted-by":"publisher","DOI":"10.4018\/IJIIT.2015040103"},{"key":"S0218843024500011BIB032","volume":"10","author":"Ponmalar A.","year":"2018","journal-title":"J. Adv. Res. Dyn. Control Syst."},{"key":"S0218843024500011BIB033","first-page":"1","volume":"10","author":"Mayuranathan M.","year":"2019","journal-title":"J. Amb. Intell. Humanized Comput."},{"key":"S0218843024500011BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2017.30"},{"key":"S0218843024500011BIB036","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-018-0324-x"},{"key":"S0218843024500011BIB037","volume-title":"2018 28th Int. Conf. Computer Theory and Applications (ICCTA)","author":"Hafez E.","year":"2018"},{"key":"S0218843024500011BIB038","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2018.8524212"},{"key":"S0218843024500011BIB039","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.11.048"},{"key":"S0218843024500011BIB040","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9624-4"},{"key":"S0218843024500011BIB041","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2020.02.023"},{"key":"S0218843024500011BIB042","first-page":"29","volume":"74","author":"Pandey V.","year":"2013","journal-title":"Int. J. Computer Appl."},{"key":"S0218843024500011BIB043","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC44355.2019.9036447"}],"container-title":["International Journal of Cooperative Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218843024500011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T08:58:58Z","timestamp":1723798738000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218843024500011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,18]]},"references-count":42,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["10.1142\/S0218843024500011"],"URL":"https:\/\/doi.org\/10.1142\/s0218843024500011","relation":{},"ISSN":["0218-8430","1793-6365"],"issn-type":[{"value":"0218-8430","type":"print"},{"value":"1793-6365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,18]]},"article-number":"2450001"}}