{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:21:27Z","timestamp":1758248487278,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3652447","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Security Technique for Processing Large Data Over a Distributed Cloud Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7023-5006","authenticated-orcid":false,"given":"Vivek","family":"Saxena","sequence":"first","affiliation":[{"name":"computer science engineering, PIET Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3311-4250","authenticated-orcid":false,"given":"Shiladitya","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"School of Computer Science, UPES, Dehradun, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0294-1245","authenticated-orcid":false,"given":"Deepika","family":"Saxena","sequence":"additional","affiliation":[{"name":"Poornima University, Jaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"42445","article-title":"2018. Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting","volume":"6","author":"Gan D.N.","unstructured":"Wu, D.N., Gan, Q.Q. and Wang, X.M., 2018. Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting. IEEE Access, 6, pp.42445-42453.","journal-title":"IEEE Access"},{"issue":"16","key":"e_1_3_2_1_2_1","first-page":"14542","article-title":"Lightweight privacy-preserving scheme using homomorphic encryption in industrial internet of things","volume":"9","author":"Zhao Shanshan","year":"2021","unstructured":"Li, Shancang, Shanshan Zhao, Geyong Min, Lianyong Qi, and Gang Liu. \"Lightweight privacy-preserving scheme using homomorphic encryption in industrial internet of things.\" IEEE Internet of Things Journal 9, no. 16 (2021): 14542-14550.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"352","article-title":"Private machine learning classification based on fully homomorphic encryption","volume":"8","author":"Zhang Peng","year":"2018","unstructured":"Sun, Xiaoqiang, Peng Zhang, Joseph K. Liu, Jianping Yu, and Weixin Xie. \"Private machine learning classification based on fully homomorphic encryption.\" IEEE Transactions on Emerging Topics in Computing 8, no. 2 (2018): 352-364.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE","author":"Li Chao","year":"2014","unstructured":"Zhao, Feng, Chao Li, and Chun Feng Liu. \"A cloud computing security solution based on fully homomorphic encryption.\" In 16th international conference on advanced communication technology, pp. 485-488. IEEE, 2014."},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"353","article-title":"Design and implementation of encryption\/decryption architectures for BFV homomorphic encryption scheme","volume":"28","author":"Can Ahmet","year":"2019","unstructured":"Mert, Ahmet Can, Erdin\u00e7 \u00d6zt\u00fcrk, and Erkay Sava\u015f. \"Design and implementation of encryption\/decryption architectures for BFV homomorphic encryption scheme.\" IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, no. 2 (2019): 353-362.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978297"},{"key":"e_1_3_2_1_7_1","first-page":"421","volume-title":"Analytics and Innovation: Proceedings of ICDMAI 2018","volume":"2","author":"Chakkaravarthy Midhun","year":"2019","unstructured":"Bhattacharjee, Shiladitya, Midhun Chakkaravarthy, and Divya Midhun Chakkaravarthy. \"GPU-based integrated security system for minimizing data loss in big data transmission.\" In Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, Volume 2, pp. 421-435. Springer Singapore, 2019."},{"issue":"5","key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"e0214044","DOI":"10.1371\/journal.pone.0214044","article-title":"Framework for parallelisation on big data","volume":"14","author":"Ab Lukman","year":"2019","unstructured":"Rahim, Lukman Ab, Krishna Mohan Kudiri, and Shiladitya Bahattacharjee. \"Framework for parallelisation on big data.\" PloS one 14, no. 5 (2019): e0214044.","journal-title":"PloS one"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246726"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2022.112398"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2023.07.022"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2016.01.036"},{"key":"e_1_3_2_1_13_1","volume-title":"439-453","author":"Li Chuanhao","year":"2018","unstructured":"Zhang, Wei, Chuanhao Li, Gaoliang Peng, Yuanhang Chen, and Zhujun Zhang. \"A deep convolutional neural network with new training methods for bearing fault diagnosis under noisy environment and different working load.\" Mechanical systems and signal processing 100 (2018): 439-453."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2014.04.007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Bhattacharjee Shiladitya Lukman Bin Ab Rahim and Izatdin BA Aziz. \"Hiding of compressed bit stream into audio file to enhance the confidentiality and portability of a data transmission system.\" In 2015 International Symposium on Mathematical Sciences and Computing Research (iSMSC) pp. 196-201. IEEE 2015.","DOI":"10.1109\/ISMSC.2015.7594052"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE","author":"Ab Rahim Lukman Bin","year":"2014","unstructured":"Bhattacharjee, Shiladitya, Lukman Bin Ab Rahim, and Izzatdin BA Aziz. \"A multibit burst error detection and correction mechanism for application layer.\" In 2014 International Conference on Computer and Information Sciences (ICCOINS), pp. 1-6. IEEE, 2014."},{"key":"e_1_3_2_1_17_1","first-page":"421","article-title":"A study on seismic big data handling at seismic exploration industry","author":"Ab Rahim Lukman Bin","year":"2019","unstructured":"Bhattacharjee, Shiladitya, Lukman Bin Ab Rahim, Ade Wahyu Ramadhani, Midhunchakkaravarthy, and Divya Midhunchakkravarthy. \"A study on seismic big data handling at seismic exploration industry.\" In Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2019, pp. 421-429. Singapore: Springer Singapore, 2021.","journal-title":"Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.06.012"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.07.005"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.01.024"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Bhattacharjee Shiladitya Divya Midhun Chakkaravarthy Midhun Chakkaravarthy and Lukman Bin Ab Rahim. \"An integrated technique to ensure confidentiality and integrity in data transmission through the strongest and authentic hotspot selection mechanism.\" In Data Management Analytics and Innovation: Proceedings of ICDMAI 2019 Volume 2 pp. 459-474. Springer Singapore 2020.","DOI":"10.1007\/978-981-13-9364-8_33"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.05.022"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).","author":"Saxena U. P.","year":"2022","unstructured":"Singh, U. P., Saxena, V., Kumar, A., Bhari, P., & Saxena, D. (2022, December). Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5)."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp.1-6).","author":"Singh P. L.","year":"2022","unstructured":"Kumar, A., Bhari, P. L., Singh, U. P., & Saxena, V. (2022, December). Comparative Study of different Machine Learning Algorithms to Analyze Sentiments with a Case Study of Two Person's Microblogs on Twitter. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp.1-6)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).","author":"U.","year":"2022","unstructured":"Saxena, V., Saxena, D., & Singh, U. P. (2022, December). Security Enhancement using Image verification method to Secure Docker Containers. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5)."}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3652447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:21:42Z","timestamp":1758216102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":25,"alternative-id":["10.1145\/3647444.3652447","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3652447","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}