{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:03:24Z","timestamp":1761897804733},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:00:00Z","timestamp":1667433600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T00:00:00Z","timestamp":1667433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years the process of transportation needs a highly effective traffic system in order to monitor all consumer goods as many goods are left out at different locations. To handle such moving cases cloud platform is highly helpful as with respect to geographical location the goods are mapped in correct form. However incorporation of single cloud platform does not provide sufficient amount of storage about all goods thus a multiple cloud platform is introduced in proposed system. As multiple cloud platform is provided the security features of each data base system is also checked and enhanced using encryption keys. Moreover for proper operating conditions of multiple cloud platforms an analytical model is designed that synchronizes necessary data at end system. The defined analytical model focuses on solving multiple objectives that are related to critical energy problems where demand problems are reduced. Further the encryption process is carried out using Improved BlowFish Algorithm (IBFA) by allocating proper resources with decryption keys. To validate the effectiveness of proposed method five scenarios are considered where all scenario outcomes proves to be much higher than existing models by an average of 43%.<\/jats:p>","DOI":"10.1186\/s13677-022-00351-0","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T12:03:01Z","timestamp":1667476981000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm"],"prefix":"10.1186","volume":"11","author":[{"given":"S","family":"Shitharth","sequence":"first","affiliation":[]},{"given":"Fahad S.","family":"Alotaibi","sequence":"additional","affiliation":[]},{"given":"Hariprasath","family":"Manoharan","sequence":"additional","affiliation":[]},{"given":"Adil O.","family":"Khadidos","sequence":"additional","affiliation":[]},{"given":"Khaled H.","family":"Alyoubi","sequence":"additional","affiliation":[]},{"given":"Abdulrhman M.","family":"Alshareef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,3]]},"reference":[{"issue":"1","key":"351_CR1","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/TNSM.2021.3104531","volume":"19","author":"D Upadhyay","year":"2022","unstructured":"Upadhyay D, Zaman M, Joshi R, and Srinivas Sampalli (2022) An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems. IEEE Trans Netw Serv Manage 19(1):642\u2013660. https:\/\/doi.org\/10.1109\/TNSM.2021.3104531","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"351_CR2","doi-asserted-by":"publisher","first-page":"136071","DOI":"10.1109\/ACCESS.2020.3011207","volume":"8","author":"AA Suvorov","year":"2020","unstructured":"Suvorov AA, Ahmed AZaki, Diab AS, Gusev MV, Andreev NY, Ruban AB, Askarov RA, Ufa et al (2020) Comprehensive Validation of Transient Stability Calculations in Electric Power Systems and Hardware-Software Tool for Its Implementation. IEEE Access 8:136071\u2013136091. https:\/\/doi.org\/10.1109\/ACCESS.2020.3011207","journal-title":"IEEE Access"},{"key":"351_CR3","doi-asserted-by":"publisher","unstructured":"Shitharth S, Satheesh N, Kumar BPraveen, \u2018 IDS Detection Based on Optimization Based on WI-CS and GNN, Algorithm (2021) in SCADA Network\u2019, Architectural Wireless Networks Solutions and Security Issues, Lecture notes in network and systems, Springer, vol.\u00a0196, Issue 1, pp.\u00a0247\u2013266. https:\/\/doi.org\/10.1007\/978-981-16-0386-0_14","DOI":"10.1007\/978-981-16-0386-0_14"},{"key":"351_CR4","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1016\/j.renene.2021.03.008","volume":"171","author":"M Kermani","year":"2021","unstructured":"Kermani M, Adelmanesh B, Shirdare E, Sima CA, Carn\u00ec DL, and Luigi Martirano (2021) Intelligent Energy Management Based on SCADA System in a Real Microgrid for Smart Building Applications. Renewable Energy 171:1115\u20131127. https:\/\/doi.org\/10.1016\/j.renene.2021.03.008","journal-title":"Renewable Energy"},{"issue":"12","key":"351_CR5","doi-asserted-by":"publisher","first-page":"2240","DOI":"10.1049\/iet-rpg.2018.5913","volume":"13","author":"A \u0110or\u0111evi\u0107","year":"2019","unstructured":"\u0110or\u0111evi\u0107 A, and \u017deljko \u0110uri\u0161i\u0107 (2019) Mathematical Model for the Optimal Determination of Voltage Level and PCC for Large Wind Farms Connection to Transmission Network. IET Renew Power Gener 13(12):2240\u20132250. https:\/\/doi.org\/10.1049\/iet-rpg.2018.5913","journal-title":"IET Renew Power Gener"},{"issue":"6","key":"351_CR6","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1007\/s40565-017-0330-z","volume":"5","author":"A Samimi","year":"2017","unstructured":"Samimi A, and Mehdi Nikzad (2017) Complete Active-Reactive Power Resource Scheduling of Smart Distribution System with High Penetration of Distributed Energy Resources. J Mod Power Syst Clean Energy 5(6):863\u2013875. https:\/\/doi.org\/10.1007\/s40565-017-0330-z","journal-title":"J Mod Power Syst Clean Energy"},{"issue":"2","key":"351_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.31258\/ijeepse.3.2.46-52","volume":"3","author":"N Marpaung","year":"2020","unstructured":"Marpaung N, Lysbetti E, Ervianto R, Amri, and Hayatul Illahi (2020) Analysis of SCADA Application on Distribution System Reliability. Int J Electr Energy Power Syst Eng 3(2):46\u201352. https:\/\/doi.org\/10.31258\/ijeepse.3.2.46-52","journal-title":"Int J Electr Energy Power Syst Eng"},{"key":"351_CR8","doi-asserted-by":"publisher","unstructured":"Astolfi, Davide. 2021. \u201cPerspectives on Scada Data Analysis Methods for Multivariate Wind Turbine Power Curve Modeling.\u201d Machines 9 (5). https:\/\/doi.org\/10.3390\/machines9050100.","DOI":"10.3390\/machines9050100"},{"key":"351_CR9","doi-asserted-by":"publisher","unstructured":"Kong X, Chen Y, Xu T, Wang C, Yong C, Li P, and Li Yu (2018) A Hybrid State Estimator Based on SCADA and PMU Measurements for Medium Voltage Distribution System. Appl Sci (Switzerland) 8(9). https:\/\/doi.org\/10.3390\/app8091527","DOI":"10.3390\/app8091527"},{"issue":"9","key":"351_CR10","doi-asserted-by":"publisher","first-page":"1822","DOI":"10.1049\/gtd2.12420","volume":"16","author":"H Kong","year":"2022","unstructured":"Kong H, Lu M, Que L, Xu F, Zhao J, and Ancheng Xue (2022) A New Four-Step Method to Identify the Parameters of Transmission Line Based on SCADA Data. IET Gener Transm Distrib 16(9):1822\u20131835. https:\/\/doi.org\/10.1049\/gtd2.12420","journal-title":"IET Gener Transm Distrib"},{"key":"351_CR11","doi-asserted-by":"publisher","unstructured":"Pandit, Ravi, Athanasios Kolios. 2020\u00a0\u201cSCADA Data-Based Support Vector Machine Wind Turbine Power Curve Uncertainty Estimation and Its Comparative Studies.\u201d Applied Sciences (Switzerland) 10 (23): 1\u201318. https:\/\/doi.org\/10.3390\/app10238685.","DOI":"10.3390\/app10238685"},{"key":"351_CR12","doi-asserted-by":"publisher","unstructured":"Alaa O, Khadidos AO, Khadidos H, Manoharan KH, Alyoubi, Abdulrhman M, Alshareef, Shitharth S (2022) \" Integrating Industrial Appliances for Security Enhancement in Data Point Using SCADA Networks with Learning Algorithm,\u201c International transactions on Electrical Energy Systems, vol. Article ID 8457116, 17 pages, 2022. https:\/\/doi.org\/10.1155\/2022\/8685235.","DOI":"10.1155\/2022\/8685235"},{"key":"351_CR13","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1016\/j.proeng.2014.02.180","volume":"70","author":"J Temido","year":"2014","unstructured":"Temido J, Sousa J, Malheiro R (2014) SCADA and Smart Metering Systems in Water Companies. A Perspective Based on the Value Creation Analysis. Procedia Eng 70:1629\u20131638. https:\/\/doi.org\/10.1016\/j.proeng.2014.02.180","journal-title":"Procedia Eng"},{"key":"351_CR14","doi-asserted-by":"publisher","unstructured":"Mollah MB, Sikder SI (2012) \u201cTowards IEEE 802.22 Based SCADA System for Future Distributed System.\u201d 2012 International Conference on Informatics, Electronics and Vision, ICIEV 2012, no. May 2012: 1075\u201380. https:\/\/doi.org\/10.1109\/ICIEV.2012.6317474","DOI":"10.1109\/ICIEV.2012.6317474"},{"issue":"2","key":"351_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5815\/ijieeb.2018.02.04","volume":"10","author":"O Kovaliuk","year":"2018","unstructured":"Kovaliuk O, Dmytro KM, Huza, Kovaliuk OO (2018) Development of SCADA System Based on Web Technologies. Int J Inform Eng Electron Bus 10(2):25\u201332. https:\/\/doi.org\/10.5815\/ijieeb.2018.02.04","journal-title":"Int J Inform Eng Electron Bus"},{"issue":"7","key":"351_CR16","doi-asserted-by":"publisher","first-page":"9989","DOI":"10.1007\/s11042-022-12130-9","volume":"81","author":"FA Osman","year":"2022","unstructured":"Osman FA, Mohamed YM, Hashem, Mostafa AR, Eltokhy (2022) Secured Cloud SCADA System Implementation for Industrial Applications. Multimedia Tools and Applications 81(7):9989\u201310005. https:\/\/doi.org\/10.1007\/s11042-022-12130-9","journal-title":"Multimedia Tools and Applications"},{"key":"351_CR17","doi-asserted-by":"publisher","unstructured":"Badshah A, Jalal A, Farooq U, Rehman G-U, Band SS, Iwendi C \u201cService Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds.Big Data.\u201d ahead of print. https:\/\/doi.org\/10.1089\/big.2021.0274","DOI":"10.1089\/big.2021.0274"},{"key":"351_CR18","doi-asserted-by":"publisher","unstructured":"Alaa O, Khadidos H, Manoharan S, Selvarajan, Adil O, Khadidos et al (2022) In: Energies (ed) A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security. MDPI. https:\/\/doi.org\/10.3390\/en15103624","DOI":"10.3390\/en15103624"},{"issue":"1","key":"351_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3934\/ElectrEng.2020.1.57","volume":"4","author":"LO Aghenta","year":"2019","unstructured":"Aghenta LO, Tariq Iqbal M (2019) Design and Implementation of a Low-Cost, Open Source IoT-Based SCADA System Using ESP32 with OLED, ThingsBoard and MQTT Protocol. AIMS Electron Electr Eng 4(1):57\u201386. https:\/\/doi.org\/10.3934\/ElectrEng.2020.1.57","journal-title":"AIMS Electron Electr Eng"},{"key":"351_CR20","doi-asserted-by":"publisher","unstructured":"Shitharth S, Prasad KM, Sangeetha K, Kshirsagar PR, Babu TS, Alhelou HH (2021) \u201cAn Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems,\u201c in IEEE Access. 9:156297\u2013156312. https:\/\/doi.org\/10.1109\/ACCESS.2021.3129053","DOI":"10.1109\/ACCESS.2021.3129053"},{"key":"351_CR21","doi-asserted-by":"publisher","unstructured":"Wang Q, Zhongli Z (2011) \u201cReinforcement Learning Model, Algorithms and Its Application.\u201d Proceedings 2011 International Conference on Mechatronic Science, Electric Engineering and Computer, MEC 2011, no. 1: 1143\u201346. https:\/\/doi.org\/10.1109\/MEC.2011.6025669","DOI":"10.1109\/MEC.2011.6025669"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00351-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-022-00351-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00351-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T10:06:01Z","timestamp":1667988361000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-022-00351-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,3]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["351"],"URL":"https:\/\/doi.org\/10.1186\/s13677-022-00351-0","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,3]]},"assertion":[{"value":"2 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"76"}}