{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:54:16Z","timestamp":1773179656105,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The cloud industry has evolved significantly, driven by advancements in network infrastructure and business applications. However, security concerns, especially attack-defense scenarios related to hacker computing attacks, remain a critical challenge. Despite existing detection systems, sophisticated attacks continue to evade identification. This study presents a novel, optimization-based resource allocation strategy designed to mitigate the worst-case impacts of hacker computing attacks in cloud computing centers. The proposed model integrates Virtual Machine (VM) initiation decisions and employs the Contest Success Function (CSF) within a two-player max\u2013min game framework to dynamically allocate resources. This approach effectively balances security, cost, and service quality. The model not only enhances defense mechanisms against attacks but also optimizes resource utilization, reducing operational costs by 25% while maintaining high levels of security and improving resource efficiency by 30%. Its dual-solution methodology ensures scalability, making it applicable to both small and large-scale cloud environments. The innovative integration of economic theory and multi-objective optimization offers cloud service providers a powerful tool to enhance reliability, security, and cost-effectiveness.<\/jats:p>","DOI":"10.1186\/s13677-025-00749-6","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T14:30:36Z","timestamp":1754490636000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks"],"prefix":"10.1186","volume":"14","author":[{"given":"Yu-Fang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Frank Yeong-Sung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Kuang-Yen","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Chiu-Han","family":"Hsiao","sequence":"additional","affiliation":[]},{"given":"Wei-Hsin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming-Chi","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Tzu-Lung","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"issue":"4","key":"749_CR1","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/COMST.2019.2934468","volume":"21","author":"N Agrawal","year":"2019","unstructured":"Agrawal N, Tapaswi S (2019) Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials 21(4):3769\u20133795","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"749_CR2","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.future.2019.11.037","volume":"105","author":"J Enes","year":"2020","unstructured":"Enes J, Exp\u00f3sito RR, Touri\u00f1o J (2020) Real-time resource scaling platform for Big Data workloads on serverless environments. Futur Gener Comput Syst 105:361\u2013379","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"749_CR3","doi-asserted-by":"publisher","first-page":"12509","DOI":"10.1007\/s10586-024-04604-2","volume":"27","author":"EM Kandoussi","year":"2024","unstructured":"Kandoussi EM, Houmairi A, El Mir I, Bellafkih M (2024) Enhancing cloud security: Harnessing Bayesian game theory for a dynamic defense mechanism. Clust Comput 27(9):12509\u201312526","journal-title":"Clust Comput"},{"key":"749_CR4","doi-asserted-by":"publisher","first-page":"107617","DOI":"10.1016\/j.ress.2021.107617","volume":"211","author":"X Zhang","year":"2021","unstructured":"Zhang X, Ding S, Ge B, Xia B, Pedrycz W (2021) Resource allocation among multiple targets for a defender-attacker game with false targets consideration. Reliab Eng Syst Saf 211:107617","journal-title":"Reliab Eng Syst Saf"},{"issue":"2","key":"749_CR5","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TPDS.2020.3017001","volume":"32","author":"S Yang","year":"2020","unstructured":"Yang S, Li F, Trajanovski S, Yahyapour R, Fu X (2020) Recent advances of resource allocation in network function virtualization. IEEE Trans Parallel Distrib Syst 32(2):295\u2013314","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"749_CR6","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s00607-021-01045-2","volume":"104","author":"A Belgacem","year":"2022","unstructured":"Belgacem A (2022) Dynamic resource allocation in cloud computing: analysis and taxonomies. Computing 104(3):681\u2013710","journal-title":"Computing"},{"key":"749_CR7","doi-asserted-by":"publisher","first-page":"103244","DOI":"10.1016\/j.compind.2020.103244","volume":"120","author":"C Morariu","year":"2020","unstructured":"Morariu C, Morariu O, R\u0103ileanu S, Borangiu T (2020) Machine learning for predictive scheduling and resource allocation in large scale manufacturing systems. Comput Ind 120:103244","journal-title":"Comput Ind"},{"issue":"2","key":"749_CR8","first-page":"1","volume":"1","author":"M Abouelyazid","year":"2021","unstructured":"Abouelyazid M (2021) Machine learning algorithms for dynamic resource allocation in cloud computing: optimization techniques and real-world applications. J AI-Assisted Scientific Discovery 1(2):1\u201358","journal-title":"J AI-Assisted Scientific Discovery"},{"issue":"11","key":"749_CR9","doi-asserted-by":"publisher","first-page":"5621","DOI":"10.1109\/TCOMM.2018.2850303","volume":"66","author":"M Chen","year":"2018","unstructured":"Chen M, Saad W, Yin C (2018) Virtual reality over wireless networks: Quality-of-service model and learning-based resource management. IEEE Trans Commun 66(11):5621\u20135635","journal-title":"IEEE Trans Commun"},{"key":"749_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Comput Commun 107:30\u201348","journal-title":"Comput Commun"},{"key":"749_CR11","doi-asserted-by":"crossref","unstructured":"Hu W, Cao Q, Darbandi M, Jafari Navimipour N (2024) A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud\/edge and IoT: state-of-the-art techniques, challenges, and future directions. Clust Comput 27:8789\u20138815","DOI":"10.1007\/s10586-024-04385-8"},{"issue":"9","key":"749_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474552","volume":"54","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera P, Jurcut A, Liyanage M (2021) MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures. ACM Computing Surveys (CSUR) 54(9):1\u201337","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"749_CR13","doi-asserted-by":"crossref","unstructured":"Akbar H, Zubair M, Malik MS (2023) The security issues and challenges in cloud computing. Int J Electronic Crime Invest 7(1):13\u201332","DOI":"10.54692\/ijeci.2023.0701125"},{"key":"749_CR14","doi-asserted-by":"publisher","first-page":"103322","DOI":"10.1016\/j.adhoc.2023.103322","volume":"152","author":"R Uddin","year":"2024","unstructured":"Uddin R, Kumar SAP, Chamola V (2024) Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions. Ad Hoc Netw 152:103322","journal-title":"Ad Hoc Netw"},{"key":"749_CR15","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.comcom.2020.02.030","volume":"153","author":"V Moorthy","year":"2020","unstructured":"Moorthy V, Venkataraman R, Rao TR (2020) Security and privacy attacks during data communication in software defined mobile clouds. Comput Commun 153:515\u2013526","journal-title":"Comput Commun"},{"key":"749_CR16","unstructured":"Nilsson F, Mihajlovic D (2022) Optimizing databases in the cloud based on performance and cost savings. https:\/\/lup.lub.lu.se\/student-papers\/search\/publication\/9097159"},{"key":"749_CR17","doi-asserted-by":"publisher","first-page":"103462","DOI":"10.1016\/j.cose.2023.103462","volume":"134","author":"MA Ribeiro","year":"2023","unstructured":"Ribeiro MA, Fonseca MSP, de Santi J (2023) Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks. Comput Secur 134:103462","journal-title":"Comput Secur"},{"issue":"14","key":"749_CR18","doi-asserted-by":"publisher","first-page":"19879","DOI":"10.1007\/s11042-021-11859-z","volume":"81","author":"A Verma","year":"2022","unstructured":"Verma A, Saha R, Kumar N, Kumar G (2022) A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development. Multimedia Tools and Applications 81(14):19879\u201319944","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"749_CR19","doi-asserted-by":"publisher","first-page":"3170","DOI":"10.1109\/TNSM.2021.3061486","volume":"18","author":"O Fonseca","year":"2021","unstructured":"Fonseca O, Cunha \u00cd, Fazzion E, Meira W, da Silva BA, Ferreira RA, Katz-Bassett E (2021) Identifying networks vulnerable to IP spoofing. IEEE Trans Netw Serv Manage 18(3):3170\u20133183","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"9","key":"749_CR20","doi-asserted-by":"publisher","first-page":"4989","DOI":"10.1002\/rnc.6171","volume":"33","author":"O Bernard","year":"2023","unstructured":"Bernard O, Lu LD, Salomon J (2023) Optimal periodic resource allocation in reactive dynamical systems: Application to microalgal production. Int J Robust Nonlinear Control 33(9):4989\u20135010","journal-title":"Int J Robust Nonlinear Control"},{"issue":"6","key":"749_CR21","doi-asserted-by":"publisher","first-page":"e2163","DOI":"10.1002\/nem.2163","volume":"31","author":"BL Dalmazo","year":"2021","unstructured":"Dalmazo BL, Marques JA, Costa LR, Bonfim MS, Carvalho RN, da Silva AS, Cordeiro W (2021) A systematic review on distributed denial of service attack defense mechanisms in programmable networks. Int J Network Manag 31(6):e2163","journal-title":"Int J Network Manag"},{"issue":"5","key":"749_CR22","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1108\/IMDS-06-2019-0327","volume":"120","author":"A Khayer","year":"2020","unstructured":"Khayer A, Bao Y, Nguyen B (2020) Understanding cloud computing success and its impact on firm performance: an integrated approach. Ind Manag Data Syst 120(5):963\u2013985","journal-title":"Ind Manag Data Syst"},{"issue":"6","key":"749_CR23","doi-asserted-by":"publisher","first-page":"e4290","DOI":"10.1002\/dac.4290","volume":"33","author":"F Zahedi","year":"2020","unstructured":"Zahedi F, Farzaneh N (2020) An evolutionary game theory\u2013based security model in vehicular ad hoc networks. Int J Commun Syst 33(6):e4290","journal-title":"Int J Commun Syst"},{"key":"749_CR24","doi-asserted-by":"publisher","first-page":"101732","DOI":"10.1016\/j.cose.2020.101732","volume":"92","author":"KS Gill","year":"2020","unstructured":"Gill KS, Saxena S, Sharma A (2020) GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot. Comput Secur 92:101732","journal-title":"Comput Secur"},{"key":"749_CR25","first-page":"1","volume":"2020","author":"S Kim","year":"2020","unstructured":"Kim S (2020) Cooperative game-based virtual machine resource allocation algorithms in cloud data centers. Mob Inf Syst 2020:1\u201311","journal-title":"Mob Inf Syst"},{"key":"749_CR26","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jpdc.2022.10.004","volume":"172","author":"J Chen","year":"2023","unstructured":"Chen J, Deng Q, Yang X (2023) Non-cooperative game algorithms for computation offloading in mobile edge computing environments. Journal of Parallel and Distributed Computing 172:18\u201331","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"749_CR27","doi-asserted-by":"publisher","first-page":"2811038","DOI":"10.1155\/2023\/2811038","volume":"2023","author":"A Ait Temghart","year":"2023","unstructured":"Ait Temghart A, Mbarek M, Baslam M (2023) Stackelberg security game for optimizing cybersecurity decisions in cloud computing. Security and Communication Networks. 2023:2811038","journal-title":"Security and Communication Networks."},{"key":"749_CR28","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/g15040028","volume":"15","author":"K Hausken","year":"2024","unstructured":"Hausken K, Welburn JW, Zhuang J (2024) A review of attacker\u2013defender games and cyber security. Games 15:28","journal-title":"Games"},{"key":"749_CR29","doi-asserted-by":"publisher","first-page":"78482","DOI":"10.1109\/ACCESS.2020.2989353","volume":"8","author":"H Zhang","year":"2020","unstructured":"Zhang H, Hao J, Li X (2020) A method for deploying distributed denial of service attack defense strategies on edge servers using reinforcement learning. IEEE Access 8:78482\u201378491","journal-title":"IEEE Access"},{"key":"749_CR30","doi-asserted-by":"crossref","unstructured":"Gill KS, Sharma A, Saxena S (2024) A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities. Arch Computational Methods Eng 34:3857\u20133890","DOI":"10.1007\/s11831-024-10095-6"},{"key":"749_CR31","doi-asserted-by":"crossref","unstructured":"Tsaknakis I, Hong M, Liu S (2020) Decentralized min-max optimization: formulations, algorithms and applications in network poisoning attack. ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 5755\u20135759","DOI":"10.1109\/ICASSP40776.2020.9054056"},{"key":"749_CR32","doi-asserted-by":"crossref","unstructured":"Subasini CA, Bushra SN (2021) Securing of cloud data with duplex data encryption algorithm. 5th International Conference on Computing Methodologies and Communication (ICCMC), 252\u2013256","DOI":"10.1109\/ICCMC51019.2021.9418247"},{"key":"749_CR33","doi-asserted-by":"crossref","unstructured":"Verma V, Kumar P, Verma RK, Priya S (2021) A novel approach for security in cloud data storage using AES-DES-RSA hybrid cryptography. Emerging Trends in Industry 4.0 (ETI 4.0), 1\u20136","DOI":"10.1109\/ETI4.051663.2021.9619274"},{"key":"749_CR34","doi-asserted-by":"crossref","unstructured":"Zhang B, Ma G, Lu X, Xu W (2022) Study on hybrid encryption technology of power gateway based on AES and RSA algorithm. 14th International Conference on Signal Processing Systems (ICSPS), 640\u2013644","DOI":"10.1109\/ICSPS58776.2022.00118"},{"key":"749_CR35","doi-asserted-by":"crossref","unstructured":"Ashitha U, Amulya AHLS, Sushma G, Irfana S, Saibaba CHMH (2024) Strengthening cloud security through multi-factor authentication: a comprehensive integration of diverse approaches. International Conference on Electronics, Computing, Communication and Control Technology (ICECCC), 1\u20138","DOI":"10.1109\/ICECCC61767.2024.10593923"},{"key":"749_CR36","doi-asserted-by":"crossref","unstructured":"Krishna RS, Mohan VM (2024) A novel user authentication and access control model in enhancing cloud security. 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), 1\u20137","DOI":"10.1109\/ICCCNT61001.2024.10724423"},{"key":"749_CR37","first-page":"1","volume":"2024","author":"C Theodoropoulos","year":"2024","unstructured":"Theodoropoulos C, Koutras D, Douligeris C, Kotzanikolaou P (2024) An edge multi factor authentication system for cyber physical systems based on OTP. IEEE Symposium on Computers and Communications (ISCC) 2024:1\u20133","journal-title":"IEEE Symposium on Computers and Communications (ISCC)"},{"key":"749_CR38","doi-asserted-by":"crossref","unstructured":"Coppola G, Varde AS, Shang J (2023) Enhancing cloud security posture for ubiquitous data access with a cybersecurity framework based management tool. IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 0590\u20130594","DOI":"10.1109\/UEMCON59035.2023.10316003"},{"key":"749_CR39","first-page":"188","volume":"2024","author":"S Sahoo","year":"2024","unstructured":"Sahoo S, Swain A, Mohapatra SK, Pattanaik S, Senapati A (2024) Utilizing AWS Cloud-Enhanced VPN and VPC integration to improve data security and access control in library management systems. Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI) 2024:188\u2013194","journal-title":"Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)"},{"key":"749_CR40","doi-asserted-by":"crossref","unstructured":"Brum\u0103 LM (2021) Cloud security audit\u2013 issues and challenges. 16th International Conference on Computer Science & Education (ICCSE), 263\u2013266","DOI":"10.1109\/ICCSE51940.2021.9569654"},{"issue":"4","key":"749_CR41","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1109\/TDSC.2021.3062204","volume":"19","author":"S Majumdar","year":"2022","unstructured":"Majumdar S, Chawla GS, Alimohammadifar A, Madi T, Jarraya Y, Pourzandi M, Wang L, Debbabi M (2022) ProSAS: Proactive security auditing system for clouds. IEEE Trans Dependable Secure Comput 19(4):2517\u20132534","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"749_CR42","doi-asserted-by":"crossref","unstructured":"Seetharamarao RY (2023) A Unified Approach Towards Security Audit and Compliance in Cloud Computing Environment. 16th International Conference on Developments in eSystems Engineering (DeSE), 623\u2013629","DOI":"10.1109\/DeSE60595.2023.10469536"},{"key":"749_CR43","doi-asserted-by":"crossref","unstructured":"Al-Haija QA, Brahma S (2019) Optimization of cyber system survivability under attacks using redundancy of components. 53rd Annual Conference on Information Sciences and Systems (CISS), 1\u20136","DOI":"10.1109\/CISS.2019.8692843"},{"key":"749_CR44","doi-asserted-by":"crossref","unstructured":"Al\u2013shammari MM, Alwan AA (2018) Disaster recovery and business continuity for database services in multi-cloud. 1st International Conference on Computer Applications & Information Security (ICCAIS), 1\u20138","DOI":"10.1109\/CAIS.2018.8442005"},{"key":"749_CR45","doi-asserted-by":"crossref","unstructured":"Albalawi A, Vassilakis V, Calinescu R (2022) Side-channel attacks and countermeasures in cloud services and infrastructures. NOMS 2022\u20132022 IEEE\/IFIP Network Operations and Management Symposium, 1\u20134","DOI":"10.1109\/NOMS54207.2022.9789783"},{"issue":"4","key":"749_CR46","first-page":"1933","volume":"18","author":"X Li","year":"2021","unstructured":"Li X, Ji S, Han M, Ji J, Ren Z, Liu Y, Wu C (2021) Adversarial examples versus cloud-based detectors: a black-box empirical study. IEEE Trans Dependable Secure Comput 18(4):1933\u20131949","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"749_CR47","doi-asserted-by":"crossref","unstructured":"Henda NB, Msolli A, Hagui I, Helali A, Maaref H, Mghaieth R (2023) A Novel SVM based CFS for intrusion detection in IoT Network. IEEE International Conference on Advanced Systems and Emergent Technologies (IC_ASET), 1\u20135","DOI":"10.1109\/IC_ASET58101.2023.10150979"},{"key":"749_CR48","doi-asserted-by":"crossref","unstructured":"Alheeti KMA, Alzahrani A, Jasim OH, Al-Dosary D, Ahmed HM, Al-Ani MS (2023) Intelligent detection system for multi-step cyber-attack based on machine learning. 15th International Conference on Developments in eSystems Engineering (DeSE), 510\u2013514","DOI":"10.1109\/DeSE58274.2023.10100226"},{"issue":"2","key":"749_CR49","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1111\/jpet.12475","volume":"23","author":"K Huremovi\u0107","year":"2021","unstructured":"Huremovi\u0107 K (2021) A noncooperative model of contest network formation. J Public Economic Theory 23(2):275\u2013317","journal-title":"J Public Economic Theory"},{"issue":"1","key":"749_CR50","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TPWRS.2023.3258319","volume":"39","author":"Z Liu","year":"2023","unstructured":"Liu Z, Tang P, Hou K, Zhu L, Zhao J, Jia H, Pei W (2023) A Lagrange-multiplier-based reliability assessment for power systems considering topology and injection uncertainties. IEEE Trans Power Syst 39(1):1178\u20131189","journal-title":"IEEE Trans Power Syst"},{"issue":"2","key":"749_CR51","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s12293-022-00362-z","volume":"14","author":"J Blank","year":"2022","unstructured":"Blank J, Deb K (2022) Handling constrained multi-objective optimization problems with heterogeneous evaluation times: proof-of-principle results. Memetic Computing 14(2):135\u2013150","journal-title":"Memetic Computing"},{"key":"749_CR52","doi-asserted-by":"crossref","unstructured":"Gaudioso M (2020) A view of Lagrangian relaxation and its applications.\u00a0Numerical Nonsmooth Optimization: State of the Art Algorithms. 579\u2013617","DOI":"10.1007\/978-3-030-34910-3_17"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00749-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00749-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00749-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T21:48:41Z","timestamp":1757368121000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00749-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,6]]},"references-count":52,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["749"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00749-6","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,6]]},"assertion":[{"value":"2 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"41"}}