{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T18:45:54Z","timestamp":1772649954297,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a greater need for privacy in terms of data, and utilizing secure services is highly recommended. So, data on the Cloud must have some privacy mechanisms to ensure personal and organizational privacy. So, for this, we must have an authentic way to increase the trust and reliability of the organization and individuals The authors have tried to create a way to rank things that uses the Analytical Hieratical Process (AHP) and the Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS). Based on the result and comparison, produce some hidden advantages named cost, benefit, risk and opportunity-based outcomes of the result.<\/jats:p><jats:p>In this paper, we are developing a cloud data privacy model; for this, we have done an intensive literature review by including Privacy factors such as Access Control, Authentication, Authorization, Trustworthiness, Confidentiality, Integrity, and Availability. Based on that review, we have chosen a few parameters that affect cloud data privacy in all the phases of the data life cycle. Most of the already available methods must be revised per the industry\u2019s current trends. Here, we will use Analytical Hieratical Process and Technique for Order Preference by Similarity to the Ideal Solution method to prove that our claim is better than other cloud data privacy models. In this paper, the author has selected the weights of the individual cloud data privacy criteria and further calculated the rank of individual data privacy criteria using the AHP method and subsequently utilized the final weights as input of the TOPSIS method to rank the cloud data privacy criteria.<\/jats:p>","DOI":"10.1186\/s13677-024-00606-y","type":"journal-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T11:02:18Z","timestamp":1707908538000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach"],"prefix":"10.1186","volume":"13","author":[{"given":"Mohammad Zunnun","family":"Khan","sequence":"first","affiliation":[]},{"given":"Mohd","family":"Shoaib","sequence":"additional","affiliation":[]},{"given":"Mohd Shahid","family":"Husain","sequence":"additional","affiliation":[]},{"given":"Khair","family":"Ul Nisa","sequence":"additional","affiliation":[]},{"given":"Mohammad. Tabrez","family":"Quasim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"606_CR1","first-page":"68","volume-title":"Analytic hierarchy process: applications and studies","author":"BL Golden","year":"1990","unstructured":"Golden BL, Wang Q (1990) An alternative measure of consistency. In: Golden BL, Wasil A, Harker PT (eds) Analytic hierarchy process: applications and studies. Springer Verlag, New-York, pp 68\u201381"},{"issue":"1","key":"606_CR2","first-page":"1","volume":"1","author":"N Jalaliyoon","year":"2012","unstructured":"Jalaliyoon N, Bakar NA, Taherdoost H (2012) Accomplishment of critical success factor in organization; using analytic hierarchy process. Int J Acad Res Manag 1(1):1\u20139. Helvetic Editions Ltd","journal-title":"Int J Acad Res Manag"},{"key":"606_CR3","unstructured":"Van Blarkom GW, Borking JJ (2003) Handbook of privacy and privacy-enhancing technologies - the case of intelligent software agents. Retrieved from e-Europe: ftp:\/\/ftp.cenorm.be\/PUBLIC\/CWAs\/e-Europe\/DPP\/CWA15263-00-2005-Apr.pdf"},{"key":"606_CR4","unstructured":"Federal Trade Commission (2010) Protecting consumer privacy in an era of rapid change: a proposed framework for businesses and policymakers. Retrieved from www.ftc.gov\/os\/2010\/12\/101201privacyreport.pdf"},{"key":"606_CR5","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1186\/s13677-023-00525-4","volume":"12","author":"MT Quasim","year":"2023","unstructured":"Quasim MT, Nisa KU, Khan MZ et al (2023) An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities. J Cloud Comp 12:158. https:\/\/doi.org\/10.1186\/s13677-023-00525-4","journal-title":"J Cloud Comp"},{"key":"606_CR6","doi-asserted-by":"publisher","unstructured":"Quasim MT, Mobarak MM, Nisa KU, Meraj M, Khan MZ (2023) Blockchain-based Secure health records in the healthcare industry. In: 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India. pp 545\u2013549. https:\/\/doi.org\/10.1109\/ICOEI56765.2023.10125802","DOI":"10.1109\/ICOEI56765.2023.10125802"},{"key":"606_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60922-1_1","volume-title":"Smart cities: a data analytics perspective. Lecture notes in intelligent transportation and infrastructure","author":"MT Quasim","year":"2021","unstructured":"Quasim MT, Khan MA, Algarni F, Alshahrani MM (2021) Fundamentals of smart cities. In: Khan MA, Algarni F, Quasim MT (eds) Smart cities: a data analytics perspective. Lecture notes in intelligent transportation and infrastructure. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-60922-1_1"},{"key":"606_CR8","doi-asserted-by":"publisher","unstructured":"Alnahari W, Quasim MT (2021) Privacy concerns, IoT devices and attacks in smart cities. In: 2021 International Congress of Advanced Technology and Engineering (ICOTEN). pp 1\u20135. https:\/\/doi.org\/10.1109\/ICOTEN52080.2021.9493559","DOI":"10.1109\/ICOTEN52080.2021.9493559"},{"key":"606_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1186\/s40537-023-00865-7","volume":"10","author":"NB Halima","year":"2023","unstructured":"Halima NB, Alluhaidan AS, Khan MZ et al (2023) A service-categorized security scheme with physical unclonable functions for internet of vehicles. J Big Data 10:178. https:\/\/doi.org\/10.1186\/s40537-023-00865-7","journal-title":"J Big Data"},{"key":"606_CR10","doi-asserted-by":"crossref","unstructured":"Gupta R, Gupta I, Singh AK, Saxena D, Lee CN (2022) An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst J. 17(2):2445\u20132454","DOI":"10.1109\/JSYST.2022.3218894"},{"issue":"4","key":"606_CR11","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Singh AK (2022) Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Netw Lett 4(4):217\u2013221","journal-title":"IEEE Netw Lett"},{"issue":"3","key":"606_CR12","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta R, Singh AK (2022) A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. N Gener Comput 40(3):737\u2013764","journal-title":"N Gener Comput"},{"key":"606_CR13","doi-asserted-by":"publisher","unstructured":"Brands S (2000) Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge. https:\/\/doi.org\/10.7551\/mitpress\/5931.001.0001","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"606_CR14","unstructured":"Cavoukian A, Abrams ST (2010) Privacy by design: essential for organizational accountability and strong business practices. Retrieved from www.globalprivacy.it\/Allegati_Web\/57C2B8AA758546A0B76D5668F5CF5E16.pdf"},{"key":"606_CR15","unstructured":"The Danish Data Protection Agency (2010) Processing of sensitive personal data in a cloud solution. Retrieved from www.datatilsynet.dk\/english\/processing-of-sensitive-personal-data-in-a-cloud-solution\/"},{"key":"606_CR16","unstructured":"ENISA (2009) Cloud computing information assurance framework. Retrieved from ENISA: www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-information-assurance-framework"},{"key":"606_CR17","unstructured":"ENISA (2009) Cloud computing security risk assessment. Retrieved from www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-risk-assessment"},{"key":"606_CR18","unstructured":"ENISA (2011) Security & resilience in governmental clouds. Retrieved from www.enisa.europa.eu\/act\/rm\/emerging-and-future-risk\/deliverables\/security-and-resilience-governmental-clouds"},{"key":"606_CR19","unstructured":"Enterprise Privacy Group (2008) Privacy by design: an overview of privacy enhancing technologies. Retrieved from www.ico.gov.uk\/upload\/documents\/pdb_report_html\/pbd_pets_paper.pdf"},{"key":"606_CR20","unstructured":"Gartner (2010) Worldwide cloud services market to surpass $68 billion in 2010. Retrieved from www.gartner.com\/it\/page.jsp?id=1389313"},{"key":"606_CR21","volume-title":"The analytic hierarchy process: planning, priority setting, resources allocation","author":"TL Saaty","year":"1980","unstructured":"Saaty TL (1980) The analytic hierarchy process: planning, priority setting, resources allocation. McGraw-Hill, London"},{"key":"606_CR22","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.aej.2023.06.073","volume":"77","author":"AS Alluhaidan","year":"2023","unstructured":"Alluhaidan AS, Khan MZ, Halima NB, Tyagi S (2023) A diversified context-based privacy-preserving scheme (DCP2S) for internet of vehicles. Alex Eng J 77:227\u2013237. https:\/\/doi.org\/10.1016\/j.aej.2023.06.073. ISSN 1110-0168","journal-title":"Alex Eng J"},{"key":"606_CR23","doi-asserted-by":"crossref","unstructured":"Mahmood Z (2011) Cloud computing: characteristics and deployment approaches. 2011 IEEE 11th International Conference on Computer and Information Technology, p 121\u2013126","DOI":"10.1109\/CIT.2011.75"},{"key":"606_CR24","doi-asserted-by":"crossref","unstructured":"Schiffman J, Moyer T, Vijayakumar H, Jaeger T, McDaniel P (2010) Seeding clouds with trust anchors. In: Proceedings of the 2010 ACM workshop on Cloud computing security workshop. pp 43\u201346","DOI":"10.1145\/1866835.1866843"},{"issue":"7","key":"606_CR25","doi-asserted-by":"publisher","first-page":"190903","DOI":"10.1155\/2014\/190903","volume":"10","author":"Y Sun","year":"2014","unstructured":"Sun Y, Zhang J, Xiong Y, Zhu G (2014) Data security and privacy in cloud computing. Int J Distrib Sens Netw 10(7):190903","journal-title":"Int J Distrib Sens Netw"},{"issue":"1","key":"606_CR26","doi-asserted-by":"publisher","first-page":"49","DOI":"10.14257\/ijgdc.2016.9.1.05","volume":"9","author":"K Jakimoski","year":"2016","unstructured":"Jakimoski K (2016) Security techniques for data protection in cloud computing. Int J Grid Distrib Comput 9(1):49\u201356","journal-title":"Int J Grid Distrib Comput"},{"issue":"1","key":"606_CR27","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TIFS.2017.2738601","volume":"13","author":"J Ning","year":"2017","unstructured":"Ning J, Cao Z, Dong X, Liang K, Ma H, Wei L (2017) Auditable \u03c3-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94\u2013105","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"606_CR28","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TII.2018.2824815","volume":"15","author":"S Roy","year":"2018","unstructured":"Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2018) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Industr Inf 15(1):457\u2013468","journal-title":"IEEE Trans Industr Inf"},{"key":"606_CR29","doi-asserted-by":"publisher","first-page":"70604","DOI":"10.1109\/ACCESS.2020.2985762","volume":"8","author":"C Yang","year":"2020","unstructured":"Yang C, Tan L, Shi N, Xu B, Cao Y, Yu K (2020) AuthPrivacyChain: a blockchain-based access control framework with privacy protection in cloud. IEEE Access 8:70604\u201370615","journal-title":"IEEE Access"},{"key":"606_CR30","volume-title":"WITHDRAWN: threshold secret sharing and multi-authority based data access control in cloud computing","author":"K Suresha","year":"2021","unstructured":"Suresha K, Vijayakarthick P, Dhanasekaran S, Murugan BS (2021) WITHDRAWN: threshold secret sharing and multi-authority based data access control in cloud computing"},{"key":"606_CR31","unstructured":"Ahmadi S, Salehfar M (2022) Privacy-preserving cloud computing: ecosystem, life cycle, layered architecture and future roadmap. arXiv preprint arXiv:2204.11120"},{"key":"606_CR32","unstructured":"Li Q, Gao R, Xia Y (2023) Encrypted data-driven predictive cloud control with disturbance observer. ArXiv. \/abs\/2301.00322"},{"key":"606_CR33","doi-asserted-by":"publisher","unstructured":"Goldberg I, Wagner D, Brewer E (1997) Privacy-enhancing technologies for the Internet, p 103\u2013109. https:\/\/doi.org\/10.1109\/CMPCON.1997.584680","DOI":"10.1109\/CMPCON.1997.584680"},{"key":"606_CR34","unstructured":"IDC (2008) IT cloud services forecast. Retrieved from http:\/\/blogs.idc.com\/ie\/?p=224"},{"key":"606_CR35","unstructured":"IDC (2010) IDC predictions 2011: welcome to the new mainstream. Retrieved from www.idc.com\/research\/predictions11\/downloads\/IDCPredictions2011_WelcometotheNewMainstream.pdf"},{"key":"606_CR36","unstructured":"IBM (2015) Identity mixer. Retrieved from www.zurich.ibm.com\/security\/idemix\/"},{"key":"606_CR37","unstructured":"ITU-T Technology Watch Report (2009) Distributed computing: utilities, grid & clouds. Retrieved from www.itu.int\/dms_pub\/itu-t\/oth\/23\/01\/T23010000090001PDFE.pdf"},{"key":"606_CR38","doi-asserted-by":"publisher","unstructured":"Shahid Husain M, Zunnun Khan M, Siddiqui T (2023) Big data concepts, technologies, and applications, 1st edn. Auerbach Publications. https:\/\/doi.org\/10.1201\/9781003441595","DOI":"10.1201\/9781003441595"},{"key":"606_CR39","doi-asserted-by":"crossref","unstructured":"Lee MC (2007) A method of performance evaluation by using the analytic network process and balanced score card. In: International conference on convergence information technology","DOI":"10.1109\/ICCIT.2007.216"},{"issue":"23","key":"606_CR40","doi-asserted-by":"publisher","first-page":"33127","DOI":"10.1007\/s11042-021-11751-w","volume":"81","author":"AK Singh","year":"2022","unstructured":"Singh AK, Gupta R (2022) A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl 81(23):33127\u201333150","journal-title":"Multimed Tools Appl"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00606-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00606-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00606-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T11:07:16Z","timestamp":1707908836000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00606-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,14]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["606"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00606-y","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,14]]},"assertion":[{"value":"10 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper does not include animal or human data, hence it is not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"42"}}