{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:56Z","timestamp":1767581456199,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590851","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["High-Availability Encryption-Based Cloud Resource Provisioning System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2651-2509","authenticated-orcid":false,"given":"Ranjith Singh","family":"Koppaiyan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Karpagam Academy of Higher Education, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6221-7078","authenticated-orcid":false,"given":"Abdul Shareef","family":"Pallivalappil","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Science, Srinivas University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8649-1060","authenticated-orcid":false,"given":"Pooja","family":"Singh","sequence":"additional","affiliation":[{"name":"SCSE, Deptt of CSE, Galgotias University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5869-9959","authenticated-orcid":false,"given":"Husna","family":"Tabassum","sequence":"additional","affiliation":[{"name":"Department of CSE, HKBK College of Engineering, India."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3744-4858","authenticated-orcid":false,"given":"Pragya","family":"Tewari","sequence":"additional","affiliation":[{"name":"CSE, Galgotias University, Greater Noida, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1833-794X","authenticated-orcid":false,"given":"Ms","family":"Sweeti","sequence":"additional","affiliation":[{"name":"CSE, BBDU LUCKNOW, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9459-1312","authenticated-orcid":false,"given":"Sarvesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"CSE, BBD University, Lucknow, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2004.04.018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.10.050"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"2022 IEEE Delhi Section Conference (DELCON)","author":"Tiwari Ashish","year":"2022","unstructured":"Chouhan, Ajay, Ashish Tiwari, Chander Diwaker, and Atul Sharma. \"Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model.\" In 2022 IEEE Delhi Section Conference (DELCON), pp. 1-5. IEEE, 2022."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.916555"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i1.pp387-395"},{"key":"e_1_3_2_1_7_1","volume-title":"3rd IEEE International Advanced Computing Conference.","author":"Nagaraju A.","year":"2013","unstructured":"Tiwari, Ashish, A. Nagaraju, and Mehul Mahrishi. \"An Optimized Scheduling Algorithm for Cloud Broker Using Cost Adaptive Modeling.\" In 3rd IEEE International Advanced Computing Conference. 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5520324"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSPPC.313048"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102343"},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"422","article-title":"Eagle Techniques In Cloud Computational Formulation","volume":"8","author":"Garg Ritu","year":"2019","unstructured":"Tiwari, Ashish, and Ritu Garg. \"Eagle Techniques In Cloud Computational Formulation.\" International Journal of Innovative Technology and Exploring Engineering 8, no. 1 (2019): 422-429.","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122401"},{"key":"e_1_3_2_1_13_1","first-page":"341","article-title":"ACCOS: A Hybrid Anomaly-Aware Cloud Computing Formulation-Based Ontology Services in Clouds","author":"Garg Ritu","year":"2021","unstructured":"Tiwari, Ashish, and Ritu Garg. \"ACCOS: A Hybrid Anomaly-Aware Cloud Computing Formulation-Based Ontology Services in Clouds.\" In ISIC, pp. 341-346. 2021.","journal-title":"ISIC"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2021.015206"},{"key":"e_1_3_2_1_15_1","unstructured":"Tiwari Ashish Mehul Mahrishi and Suresh Fatehpuria. \"A Broking Structure Originated on Service accommodative Using MROSP Algorithm.\" (2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"AIP Publishing LLC","author":"Jhansi Rani S., G.","year":"2022","unstructured":"Karthikeyan, S., G. Jhansi Rani, K. Ramamoorthy, T. Chelladurai, and Dr E. Thangaselvi. \"The industrial internet of things (IIoT): An analysis framework for industry 4.0 applications.\" In AIP Conference Proceedings, vol. 2418, no. 1, p. 030014. AIP Publishing LLC, 2022."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSI.309111"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2021.100129"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.306260"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102661"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.311502"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122021"},{"key":"e_1_3_2_1_23_1","first-page":"531","volume-title":"Automation and Wireless Systems in Electrical Engineering: Proceedings of MARC 2018","author":"Sharma R. M.","year":"2019","unstructured":"Tiwari, Ashish, and R. M. Sharma. \"A Skywatch on the Challenging Gradual Progression of Scheduling in Cloud Computing.\" In Applications of Computing, Automation and Wireless Systems in Electrical Engineering: Proceedings of MARC 2018, pp. 531-541. Springer Singapore, 2019."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Ramli Muhammad Rusyadi Sanjay Bhardwaj and Dong-Seong Kim. \"Toward reliable fog computing architecture for industrial internet of things.\" (2019).","DOI":"10.20944\/preprints201903.0096.v1"},{"key":"e_1_3_2_1_25_1","first-page":"739","volume-title":"Proceedings of 3rd International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication: MARC","author":"Kumar Sarvesh","year":"2021","unstructured":"Tiwari, Ashish, Sarvesh Kumar, Neeraj Baishwar, Sunil Kumar Vishwakarma, and Prabhishek Singh. \"Efficient Cloud Orchestration Services in Computing.\" In Proceedings of 3rd International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication: MARC 2021, pp. 739-746. Singapore: Springer Nature Singapore, 2022."},{"key":"e_1_3_2_1_26_1","unstructured":"Narayana Srikar. \"Security Analysis of Web Application for Industrial Internet of Things.\" (2022)."},{"issue":"2","key":"e_1_3_2_1_27_1","article-title":"A Vision towards Optimization of Ontological Datacenters Computing World","volume":"1","author":"Sharma Kumar","year":"2018","unstructured":"Kumar Sharma, Amit, Ashish Tiwari, Brahmdutt Bohra, and Saddam Khan. \"A Vision towards Optimization of Ontological Datacenters Computing World.\" International Journal of Information Systems & Management Science 1, no. 2 (2018).","journal-title":"International Journal of Information Systems & Management Science"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT)","author":"Venkata Y.","year":"2022","unstructured":"Rangaiah, Y. Venkata, Ambrish Kumar Sharma, T. Bhargavi, Meenu Chopra, Cosmena Mahapatra, and Ashish Tiwari. \"A Taxonomy towards Blockchain based Multimedia content Security.\" In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), pp. 1-4. IEEE, 2022."},{"issue":"11","key":"e_1_3_2_1_29_1","article-title":"Rendering Form Ontology Methodology for IoT Services in Cloud Computing","volume":"3","author":"Sharma Rajeev Mohan","year":"2018","unstructured":"Tiwari, Ashish, and Rajeev Mohan Sharma. \"Rendering Form Ontology Methodology for IoT Services in Cloud Computing.\" International Journal of Advanced Studies of Scientific Research 3, no. 11 (2018).","journal-title":"International Journal of Advanced Studies of Scientific Research"},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE","author":"Vasuki V.","year":"2022","unstructured":"Rohinidevi, V. Vasuki, Prabhat Kumar Srivastava, Nilesh Dubey, Shivam Tiwari, and Ashish Tiwari. \"A Taxonomy towards fog computing Resource Allocation.\" In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), pp. 1-5. IEEE, 2022."},{"key":"e_1_3_2_1_31_1","volume-title":"IEEE","author":"Kumar Neeraj","year":"2022","unstructured":"Singh, Neeraj Kumar, Abhishek Jain, Shruti Arya, Walter Edgar G\u00f3mez Gonzales, Jessica Elizabeth Acevedo Flores, and Ashish Tiwari. \"Attack Detection Taxonomy System in cloud services.\" In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), pp. 1-5. IEEE, 2022."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2022.2075085"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.182"},{"key":"e_1_3_2_1_34_1","first-page":"15","article-title":"Security challenges and application for underwater wireless sensor network","volume":"2","author":"Kumari Bersha","year":"2018","unstructured":"Kumar, Sarvesh, Bersha Kumari, and Harshita Chawla. \"Security challenges and application for underwater wireless sensor network.\" In Proceedings on International Conference on Emerg, vol. 2, pp. 15-21. 2018.","journal-title":"Proceedings on International Conference on Emerg"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.311033"},{"key":"e_1_3_2_1_36_1","first-page":"138","volume-title":"I3E","author":"van Der Merwe Alta","year":"2020","unstructured":"Jansen, Jacques, and Alta van Der Merwe. \"A framework for industrial internet of things.\" In Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6\u20138, 2020, Proceedings, Part I 19, pp. 138-150. Springer International Publishing, 2020."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2022.2072432"},{"key":"e_1_3_2_1_38_1","volume-title":"Strategies, Technologies, and Implementations","author":"Jr Palavicini","year":"2017","unstructured":"Palavicini Jr, Geancarlo, Josiah Bryan, Eaven Sheets, Megan Kline, and John San Miguel. \"Towards firmware analysis of industrial internet of things (IIoT).\" Special Session on Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations (2017)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3142030"},{"key":"e_1_3_2_1_40_1","first-page":"223","volume-title":"Siddharth Swarup Routaray, and Manjusha Pandey. \"IIoT: a survey and review of theoretical concepts.\" In Interoperability in IoT for Smart Systems","year":"2020","unstructured":"Ghosh, Souptik, Mahendra Kumar Gourisaria, Siddharth Swarup Routaray, and Manjusha Pandey. \"IIoT: a survey and review of theoretical concepts.\" In Interoperability in IoT for Smart Systems, pp. 223-236. CRC Press, 2020."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2018.093336"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3179320"},{"key":"e_1_3_2_1_43_1","first-page":"1","article-title":"An efficient, provably-secure DAG based consensus mechanism for industrial internet of things","author":"Senthilkumar A., N.","year":"2022","unstructured":"Sasikumar, A., N. Senthilkumar, V. Subramaniyaswamy, Ketan Kotecha, V. Indragandhi, and Logesh Ravi. \"An efficient, provably-secure DAG based consensus mechanism for industrial internet of things.\" International Journal on Interactive Design and Manufacturing (IJIDeM) (2022): 1-11.","journal-title":"International Journal on Interactive Design and Manufacturing (IJIDeM) ("},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X21994356"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.05.002"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Lou David J. Holler Dhruvin Patel Ulrich Graf and M. Gillmore. \"The industrial internet of things networking framework.\" (2021): 1-70.","DOI":"10.1007\/978-3-030-63139-0_1"},{"key":"e_1_3_2_1_47_1","first-page":"14","volume-title":"An expeditious chaos based digital image encryption algorithm.\" In 2012 1st International Conference on Recent Advances in Information Technology (RAIT)","author":"Arun R.","year":"2012","unstructured":"Raj, R. Arun, Sudhish N. George, and P. P. Deepthi. \"An expeditious chaos based digital image encryption algorithm.\" In 2012 1st International Conference on Recent Advances in Information Technology (RAIT), pp. 14-18. IEEE, 2012."},{"key":"e_1_3_2_1_48_1","first-page":"620","volume-title":"A personalized anonymization model.\" In 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)","author":"Liu Ling","year":"2005","unstructured":"Gedik, Bugra, and Ling Liu. \"Location privacy in mobile systems: A personalized anonymization model.\" In 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp. 620-629. IEEE, 2005."}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590851","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:47:43Z","timestamp":1767581263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":48,"alternative-id":["10.1145\/3590837.3590851","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590851","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}