{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:29:26Z","timestamp":1774366166267,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T00:00:00Z","timestamp":1681776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal. However, most of the existing solutions have high computational and trust costs. Furthermore, the fairness of access authorization and the security of data search can be difficult to guarantee. To address these issues, we propose a novel access control scheme based on blockchain and attribute-based searchable encryption in cloud environment. The proposed scheme achieves fine-grained access control with low computation consumption by implementing proxy encryption and decryption, while supporting policy hiding and attribute revocation. The encrypted file is stored in the IPFS and the metadata ciphertext is stored on the blockchain, which ensures data integrity and confidentiality. Simultaneously, the scheme enables the secure search of ciphertext keyword in an open and transparent blockchain environment. Additionally, an audit contract is designed to constrain user access behavior to dynamically manage access authorization. Security analysis proves that our scheme is resistant to chosen-plaintext attacks and keyword-guessing attacks. Theoretical analysis and experimental results show that our scheme has high computational and storage efficiency, which is more advantageous than other schemes.<\/jats:p>","DOI":"10.1186\/s13677-023-00444-4","type":"journal-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T01:04:21Z","timestamp":1681779861000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment"],"prefix":"10.1186","volume":"12","author":[{"given":"Liang","family":"Yan","sequence":"first","affiliation":[]},{"given":"Lina","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guifen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingya","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,18]]},"reference":[{"issue":"6","key":"444_CR1","first-page":"4568","volume":"13","author":"PP Nayudu","year":"2018","unstructured":"Nayudu PP, Sekhar KR (2018) Cloud environment: A review on dynamic resource allocation schemes. Int J Appl Eng Res 13(6):4568\u20134575","journal-title":"Int J Appl Eng Res"},{"issue":"9","key":"444_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40\u201348","journal-title":"IEEE Commun Mag"},{"key":"444_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP\u201907); IEEE, CA. pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"444_CR4","doi-asserted-by":"crossref","unstructured":"Nayudu PP, Sekhar KR (2023) Dynamic time and location information in ciphertext-policy attribute-based encryption with multi-authorization. Intell Autom Soft Comput 35(3):3801-3813","DOI":"10.32604\/iasc.2023.032267"},{"key":"444_CR5","doi-asserted-by":"crossref","unstructured":"Nayudu PP, Sekhar KR (2022) Accountable specific attribute-based encryption scheme for cloud access control. IntJ Syst Assur Eng Manag 1\u201310","DOI":"10.1007\/s13198-022-01689-z"},{"key":"444_CR6","first-page":"1","volume":"40","author":"PP Nayudu","year":"2021","unstructured":"Nayudu PP, Sekhar KR (2021) Enhancement of attribute - based encryption schemes through machine learning techniques: research challenges and opportunities. J Jilin University 40:1\u201318","journal-title":"J Jilin University"},{"issue":"4","key":"444_CR7","first-page":"481","volume":"42","author":"Y Yuan","year":"2016","unstructured":"Yuan Y, Wang FY et al (2016) Blockchain: the state of the art and future trends. Acta Autom Sin 42(4):481\u2013494","journal-title":"Acta Autom Sin"},{"issue":"4","key":"444_CR8","doi-asserted-by":"publisher","first-page":"8899","DOI":"10.1007\/s10586-018-2018-1","volume":"22","author":"N Zhu","year":"2019","unstructured":"Zhu N, Cai F, He J, Zhang Y, Li W, Li Z (2019) Management of access privileges for dynamic access control. Cluster Comput 22(4):8899\u20138917","journal-title":"Cluster Comput"},{"key":"444_CR9","doi-asserted-by":"crossref","unstructured":"Wang P, Yue Y, Sun W, Liu J (2019) An attribute-based distributed access control for blockchain-enabled iot. In: 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, Barcelona, pp 1\u20136","DOI":"10.1109\/WiMOB.2019.8923232"},{"issue":"3","key":"444_CR10","doi-asserted-by":"publisher","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","volume":"6","author":"J Kang","year":"2018","unstructured":"Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S, Zhang Y (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J 6(3):4660\u20134670","journal-title":"IEEE Internet Things J"},{"key":"444_CR11","doi-asserted-by":"publisher","first-page":"91751","DOI":"10.1109\/ACCESS.2020.2993921","volume":"8","author":"B Liu","year":"2020","unstructured":"Liu B, Xiao L, Long J, Tang M, Hosam O (2020) Secure digital certificate-based data access control scheme in blockchain. IEEE Access 8:91751\u201391760","journal-title":"IEEE Access"},{"issue":"11","key":"444_CR12","first-page":"2324","volume":"40","author":"J Yu","year":"2019","unstructured":"Yu J, Zhang H, Li S, Mao L, Ji P (2019) Data sharing model for internet of things based on blockchain. J Chin Mini-Micro Comput Syst 40(11):2324\u20132329","journal-title":"J Chin Mini-Micro Comput Syst"},{"key":"444_CR13","doi-asserted-by":"crossref","unstructured":"Al Breiki H, Al Qassem L, Salah K, Rehman MHU, Sevtinovic D (2019) Decentralized access control for iot data using blockchain and trusted oracles. In: 2019 IEEE International Conference on Industrial Internet (ICII). IEEE, Orlando, pp 248\u2013257","DOI":"10.1109\/ICII.2019.00051"},{"key":"444_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.cose.2019.03.016","volume":"84","author":"DDF Maesa","year":"2019","unstructured":"Maesa DDF, Mori P, Ricci L (2019) A blockchain based approach for the definition of auditable access control systems. Comput Secur 84:93\u2013119","journal-title":"Comput Secur"},{"issue":"5","key":"444_CR15","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","volume":"12","author":"R Li","year":"2018","unstructured":"Li R, Song T, Mei B, Li H, Cheng X, Sun L (2018) Blockchain for large-scale internet of things data storage and protection. IEEE Trans Serv Comput 12(5):762\u2013771","journal-title":"IEEE Trans Serv Comput"},{"key":"444_CR16","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2019.01.003","volume":"129","author":"VKA Sandor","year":"2019","unstructured":"Sandor VKA, Lin Y, Li X, Lin F, Zhang S (2019) Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage. J Netw Comput Appl 129:25\u201336","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"444_CR17","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/TC.2020.3043950","volume":"71","author":"N Chen","year":"2020","unstructured":"Chen N, Li J, Zhang Y, Guo Y (2020) Efficient cp-abe scheme with shared decryption in cloud storage. IEEE Trans Comput 71(1):175\u2013184","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"444_CR18","doi-asserted-by":"publisher","first-page":"5826","DOI":"10.1109\/TVT.2020.2968094","volume":"69","author":"K Fan","year":"2020","unstructured":"Fan K, Pan Q, Zhang K, Bai Y, Sun S, Li H, Yang Y (2020) A secure and verifiable data sharing scheme based on blockchain in vehicular social networks. IEEE Trans Veh Technol 69(6):5826\u20135835","journal-title":"IEEE Trans Veh Technol"},{"issue":"24","key":"444_CR19","doi-asserted-by":"publisher","first-page":"7054","DOI":"10.3390\/su11247054","volume":"11","author":"M Naz","year":"2019","unstructured":"Naz M, Al-zahrani FA, Khalid R, Javaid N, Qamar AM, Afzal MK, Shafiq M (2019) A secure data sharing platform using blockchain and interplanetary file system. Sustainability 11(24):7054","journal-title":"Sustainability"},{"issue":"1","key":"444_CR20","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TCC.2017.2754255","volume":"8","author":"SJ De","year":"2017","unstructured":"De SJ, Ruj S (2017) Efficient decentralized attribute based access control for mobile clouds. IEEE Trans Cloud Comput 8(1):124\u2013137","journal-title":"IEEE Trans Cloud Comput"},{"key":"444_CR21","doi-asserted-by":"publisher","first-page":"85190","DOI":"10.1109\/ACCESS.2020.2992203","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Pei L, Liao D, Chen S, Zhang M, Xu D (2020) Fadb: A fine-grained access control scheme for vanet data based on blockchain. IEEE Access 8:85190\u201385203","journal-title":"IEEE Access"},{"issue":"11","key":"444_CR22","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1109\/TPDS.2012.61","volume":"24","author":"J Hur","year":"2013","unstructured":"Hur J (2013) Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans Parallel Distrib Syst 24(11):2171\u20132180","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"444_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.23919\/JCC.2020.06.013","volume":"17","author":"L Cao","year":"2020","unstructured":"Cao L, Kang Y, Wu Q, Wu R, Guo X, Feng T (2020) Searchable encryption cloud storage with dynamic data update to support efficient policy hiding. China Commun 17(6):153\u2013163","journal-title":"China Commun"},{"issue":"11","key":"444_CR24","doi-asserted-by":"publisher","first-page":"1950186","DOI":"10.1142\/S021812661950186X","volume":"28","author":"C Huang","year":"2019","unstructured":"Huang C, Wei S, Fu A (2019) An efficient privacy-preserving attribute-based encryption with hidden policy for cloud storage. J Circ and Syst Comput 28(11):1950186","journal-title":"J Circ and Syst Comput"},{"issue":"6","key":"444_CR25","doi-asserted-by":"publisher","first-page":"5784","DOI":"10.1109\/TVT.2020.2967099","volume":"69","author":"S Gao","year":"2020","unstructured":"Gao S, Piao G, Zhu J, Ma X, Ma J (2020) Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain. IEEE Trans Veh Technol 69(6):5784\u20135798","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"444_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-015-0034-8","volume":"4","author":"Y Yang","year":"2015","unstructured":"Yang Y (2015) Attribute-based data retrieval with semantic keyword search for e-health cloud. J Cloud Comput Adv Syst Appl 4(1):1\u20136","journal-title":"J Cloud Comput Adv Syst Appl"},{"issue":"5","key":"444_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5449-9","volume":"60","author":"S Qiu","year":"2017","unstructured":"Qiu S, Liu J, Shi Y, Zhang R (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci China Inf Sci 60(5):1\u201312","journal-title":"Sci China Inf Sci"},{"issue":"4","key":"444_CR28","first-page":"1667","volume":"18","author":"Y Miao","year":"2019","unstructured":"Miao Y, Deng RH, Liu X, Choo KKR, Wu H, Li H (2019) Multi-authority attribute-based keyword search over encrypted cloud data. IEEE Trans Dependable Secure Comput 18(4):1667\u20131680","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"444_CR29","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jpdc.2019.09.011","volume":"135","author":"H Yin","year":"2020","unstructured":"Yin H, Qin Z, Zhang J, Deng H, Li F, Li K (2020) A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing. J Parallel Distrib Comput 135:56\u201369","journal-title":"J Parallel Distrib Comput"},{"key":"444_CR30","doi-asserted-by":"publisher","first-page":"108196","DOI":"10.1016\/j.comnet.2021.108196","volume":"195","author":"S Tu","year":"2021","unstructured":"Tu S, Waqas M, Huang F, Abbas G, Abbas ZH (2021) A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Comput Netw 195:108196","journal-title":"Comput Netw"},{"key":"444_CR31","doi-asserted-by":"crossref","unstructured":"Yin H, Li Y, Li F, Deng H, Zhang W, Li K (2022) An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted iot. J Syst Archit 102533","DOI":"10.1016\/j.sysarc.2022.102533"},{"issue":"9","key":"444_CR32","doi-asserted-by":"publisher","first-page":"7851","DOI":"10.1109\/JIOT.2020.2993231","volume":"7","author":"S Liu","year":"2020","unstructured":"Liu S, Yu J, Xiao Y, Wan Z, Wang S, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J 7(9):7851\u20137867","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"444_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-021-00247-5","volume":"10","author":"W Li","year":"2021","unstructured":"Li W, Wu J, Cao J, Chen N, Zhang Q, Buyya R (2021) Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions. J Cloud Comput Adv Syst Appl 10(1):1\u201334","journal-title":"J Cloud Comput Adv Syst Appl"},{"issue":"1","key":"444_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-022-00305-6","volume":"11","author":"EM Onyema","year":"2022","unstructured":"Onyema EM, Dalal S, Romero CAT, Seth B, Young P, Wajid MA (2022) Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities. J Cloud Comput Adv Syst Appl 11(1):1\u201320","journal-title":"J Cloud Comput Adv Syst Appl"},{"key":"444_CR35","doi-asserted-by":"crossref","unstructured":"Ma F, Fu Y, Ren M, Wang M, Jiang Y, Zhang K, Li H, Shi X (2019) Evm*: from offline detection to online reinforcement for ethereum virtual machine. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER): 24-27 February. IEEE, Harbin, pp 554\u2013558","DOI":"10.1109\/SANER.2019.8668038"},{"issue":"5","key":"444_CR36","doi-asserted-by":"publisher","first-page":"3058","DOI":"10.1007\/s12083-021-01108-3","volume":"14","author":"A Kumar","year":"2021","unstructured":"Kumar A, Abhishek K, Bhushan B, Chakraborty C (2021) Secure access control for manufacturing sector with application of ethereum blockchain. Peer Peer Netw Appl 14(5):3058\u20133074","journal-title":"Peer Peer Netw Appl"},{"key":"444_CR37","doi-asserted-by":"crossref","unstructured":"Wohrer M, Zdun U (2018) Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE, Campobasso, pp 2\u20138","DOI":"10.1109\/IWBOSE.2018.8327565"},{"key":"444_CR38","doi-asserted-by":"crossref","unstructured":"Wang S, Yuan Y, Wang X, Li J, Qin R, Wang FY (2018) An overview of smart contract: architecture, applications, and future trends. In: 2018 IEEE Intelligent Vehicles Symposium (IV). IEEE, Changshu, pp 108\u2013113","DOI":"10.1109\/IVS.2018.8500488"},{"issue":"10","key":"444_CR39","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/TSE.2019.2942301","volume":"47","author":"W Zou","year":"2019","unstructured":"Zou W, Lo D, Kochhar PS, Le XBD, Xia X, Feng Y, Chen Z, Xu B (2019) Smart contract development: Challenges and opportunities. IEEE Trans Software Eng 47(10):2084\u20132106","journal-title":"IEEE Trans Software Eng"},{"issue":"3","key":"444_CR40","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1007\/s10664-019-09796-5","volume":"25","author":"GA Oliva","year":"2020","unstructured":"Oliva GA, Hassan AE, Jiang ZMJ (2020) An exploratory study of smart contracts in the ethereum blockchain platform. Empir Softw Eng 25(3):1864\u20131904","journal-title":"Empir Softw Eng"},{"key":"444_CR41","doi-asserted-by":"crossref","unstructured":"Psaras Y, Dias D (2020) The interplanetary file system and the filecoin network. In: 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). IEEE, Valencia, pp 80\u201380","DOI":"10.1109\/DSN-S50200.2020.00043"},{"key":"444_CR42","doi-asserted-by":"crossref","unstructured":"Li F, Liu K, Zhang L, Huang S, Wu Q (2021) Ehrchain: a blockchain-based ehr system using attribute-based and homomorphic cryptosystem. IEEE Trans Serv Comput 15(5):2755-2765","DOI":"10.1109\/TSC.2021.3078119"},{"key":"444_CR43","doi-asserted-by":"crossref","unstructured":"Zheng Q, Li Y, Chen P, Dong X (2018) An innovative ipfs-based storage model for blockchain. In: 2018 IEEE\/WIC\/ACM international conference on web intelligence (WI): 03-06 December 2018. IEEE, Santiago, pp 704\u2013708","DOI":"10.1109\/WI.2018.000-8"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00444-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00444-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00444-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T01:04:54Z","timestamp":1681779894000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00444-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,18]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["444"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00444-4","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,18]]},"assertion":[{"value":"15 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"61"}}