{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:39:54Z","timestamp":1775421594078,"version":"3.50.1"},"reference-count":110,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T00:00:00Z","timestamp":1763769600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"vor","delay-in-days":37,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00774-5","type":"journal-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T03:26:25Z","timestamp":1763781985000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cloud data privacy protection with homomorphic algorithm: a systematic literature review"],"prefix":"10.1186","volume":"14","author":[{"given":"Michael Ayitey","family":"Junior","sequence":"first","affiliation":[]},{"given":"Peter","family":"Appiahene","sequence":"additional","affiliation":[]},{"given":"Obed","family":"Appiah","sequence":"additional","affiliation":[]},{"given":"Kwabena","family":"Adu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"774_CR1","unstructured":"Abrera J (2024) Data privacy and security in cloud computing: a comprehensive review. J Comput Sci Inform: 1\u201313. https:\/\/doi.org\/10.61424\/jcsit"},{"key":"774_CR2","unstructured":"Accenture (2023) How cybersecurity boosts enterprise reinvention to drive business resilience 2023, pp. 1\u201339. Available at: https:\/\/www.accenture.com\/content\/dam\/accenture\/final\/accenture-com\/document\/Accenture-State-Cybersecurity.pdf#zoom=40"},{"key":"774_CR3","doi-asserted-by":"crossref","unstructured":"Aissaoua H et al. (2024). Ing\u00e9nierie des Syst\u00e8mes d\u2019Information. 29(5).\u00a0https:\/\/www.iieta.org\/journals\/isi\/paper\/10.18280\/isi.290501","DOI":"10.18280\/isi.290501"},{"key":"774_CR4","doi-asserted-by":"publisher","first-page":"136822","DOI":"10.1109\/ACCESS.2019.2942424","volume":"7","author":"MO Alassafi","year":"2019","unstructured":"Alassafi MO et al (2019) Determining factors pertaining to cloud security adoption framework in government organizations: an exploratory study. IEEE Access 7:136822\u2013136835. https:\/\/doi.org\/10.1109\/ACCESS.2019.2942424","journal-title":"IEEE Access"},{"issue":"2","key":"774_CR5","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.11591\/ijece.v13i2.pp1867-1879","volume":"13","author":"Y Alemami","year":"2023","unstructured":"Alemami Y et al (2023) Cloud data security and various cryptographic algorithms. International Journal of Electrical and Computer Engineering (IJECE) 13(2):1867\u20131879. https:\/\/doi.org\/10.11591\/ijece.v13i2.pp1867-1879","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"key":"774_CR6","doi-asserted-by":"publisher","unstructured":"Ali NN, Zeebaree SR (2024). Distributed resource management in cloud computing: a review of allocation, scheduling, and provisioning techniques. Indones J Comput Sci. https:\/\/doi.org\/10.33022\/ijcs.v13i2.3823","DOI":"10.33022\/ijcs.v13i2.3823"},{"key":"774_CR7","doi-asserted-by":"publisher","unstructured":"Alonso J, Orue-Echevarria L, Casola V, Torre AI, Huarte M, Osaba E et al (2023) Understanding the challenges and novel architectural models of multi\u2011cloud native applications \u2013 a systematic literature review. Journal of Cloud Computing 12(1), Article\u202f6. https:\/\/doi.org\/10.1186\/s13677-022-00367-6","DOI":"10.1186\/s13677-022-00367-6"},{"key":"774_CR8","doi-asserted-by":"crossref","unstructured":"Al-Sharif M, Bushnag A (2024) Enhancing cloud security: A study on ensemble learning-based intrusion detection systems. IET Communications 18(16):950\u2013965. https:\/\/doi.org\/10.1049\/cmu2.12801","DOI":"10.1049\/cmu2.12801"},{"issue":"3","key":"774_CR9","doi-asserted-by":"publisher","first-page":"967","DOI":"10.32604\/csse.2022.024854","volume":"43","author":"A Alsirhani","year":"2022","unstructured":"Alsirhani A, Ezz M, Mostafa AM (2022) Advanced authentication mechanisms for identity and access management in cloud computing. Comput Syst Sci Eng 43(3):967\u2013984. https:\/\/doi.org\/10.32604\/csse.2022.024854","journal-title":"Comput Syst Sci Eng"},{"key":"774_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/sym15101931","author":"S Alsubai","year":"2023","unstructured":"Alsubai S, Garg H, Alqahtani A (2023) A novel hybrid MSA-CSA algorithm for cloud computing task scheduling problems. Symmetry. https:\/\/doi.org\/10.3390\/sym15101931","journal-title":"Symmetry"},{"issue":"2","key":"774_CR11","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.11591\/ijece.v11i2.pp1771-1779","volume":"11","author":"MMS Altaee","year":"2021","unstructured":"Altaee MMS, Alanezi M (2021) Enhancing cloud computing security by Paillier homomorphic encryption. Int J Electr Comput Eng 11(2):1771\u20131779. https:\/\/doi.org\/10.11591\/ijece.v11i2.pp1771-1779","journal-title":"Int J Electr Comput Eng"},{"key":"774_CR12","doi-asserted-by":"publisher","unstructured":"Alzahrani A (2024) An optimized approach to deep learning for botnet detection and classification for cybersecurity in Internet of Things environment. Computers, Materials & Continua 80(2):2331\u20132349. https:\/\/doi.org\/10.32604\/cmc.2024.052804\u00a0","DOI":"10.32604\/cmc.2024.052804"},{"issue":"2","key":"774_CR13","doi-asserted-by":"publisher","first-page":"360","DOI":"10.11591\/ijres.v13.i2.pp360-371","volume":"13","author":"R Ananth","year":"2024","unstructured":"Ananth R, Ramaiah NS (2024) An exhaustive review of the stream ciphers and their performance analysis. Int J Reconfigurable Embedded Syst 13(2):360\u2013371. https:\/\/doi.org\/10.11591\/ijres.v13.i2.pp360-371","journal-title":"Int J Reconfigurable Embedded Syst"},{"key":"774_CR14","doi-asserted-by":"publisher","unstructured":"Ang'udi JJ (2023) Security challenges in cloud computing: a comprehensive analysis. World J Adv Eng Technol Sci 10(2):155\u2013181. https:\/\/doi.org\/10.30574\/wjaets.2023.10.2.0304","DOI":"10.30574\/wjaets.2023.10.2.0304"},{"key":"774_CR15","doi-asserted-by":"publisher","unstructured":"Ashitha U, Amulya AH, Sushma G, Irfana S, Saibaba CM (2024) Strengthening cloud security through multi-factor authentication: a comprehensive integration of diverse approaches. https:\/\/doi.org\/10.1109\/iceccc61767.2024.10593923","DOI":"10.1109\/iceccc61767.2024.10593923"},{"issue":"01","key":"774_CR16","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.58414\/scientifictemper.2024.15.1.30","volume":"15","author":"JM Aslam","year":"2024","unstructured":"Aslam JM, Kumar KM (2024) Enhancing security of cloud using static IP techniques. Sci Temper 15(01):1790\u20131798. https:\/\/doi.org\/10.58414\/scientifictemper.2024.15.1.30","journal-title":"Sci Temper"},{"issue":"6","key":"774_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.36948\/ijfmr.2022.v04i06.1140","volume":"4","author":"ARP, RVT, RAK","year":"2022","unstructured":"ARP, RVT, RAK (2022) Comparative study of top cloud providers on basis of service availability and cost. Int J Multidiscip Res 4(6):1\u20138. https:\/\/doi.org\/10.36948\/ijfmr.2022.v04i06.1140","journal-title":"Int J Multidiscip Res"},{"key":"774_CR18","doi-asserted-by":"publisher","unstructured":"Assanelli D et al (1995) Portable cardiological workstation designed for acute coronary events. Comput Cardiol: 361\u2013364. https:\/\/doi.org\/10.1109\/cic.1995.482660","DOI":"10.1109\/cic.1995.482660"},{"key":"774_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/app13179588","author":"H Attou","year":"2023","unstructured":"Attou H et al (2023) Towards an intelligent intrusion detection system to detect malicious activities in cloud computing. Appl Sci. https:\/\/doi.org\/10.3390\/app13179588","journal-title":"Appl Sci"},{"issue":"1","key":"774_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.56286\/ntujet.v3i1.861","volume":"3","author":"SA Baker","year":"2024","unstructured":"Baker SA (2024) Preserving big data privacy in cloud environments based on homomorphic encryption and distributed clustering. NTU J Eng Technol 3(1):35\u201344. https:\/\/doi.org\/10.56286\/ntujet.v3i1.861","journal-title":"NTU J Eng Technol"},{"key":"774_CR21","unstructured":"Cloud Security Alliance (2020) The Six Pillars of DevSecOps: Automation (Cloud Security Alliance publication\/white paper). Cloud Security Alliance. (July 7, 2020 press\/release \/ CSA artifact). Retrieved from Cloud Security Alliance artifact pages"},{"key":"774_CR22","doi-asserted-by":"publisher","unstructured":"Davletova A, Yatskiv V, Ivasiev S, Karpinskyi M (2024) Encryption method based on codes. ACPS 9(1):24\u201331. https:\/\/doi.org\/10.23939\/acps2024.01.024","DOI":"10.23939\/acps2024.01.024"},{"issue":"11","key":"774_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym15111981","volume":"15","author":"M Dawood","year":"2023","unstructured":"Dawood M et al (2023) Cyberattacks and security of cloud computing: a complete guideline. Symmetry 15(11):1\u201333. https:\/\/doi.org\/10.3390\/sym15111981","journal-title":"Symmetry"},{"issue":"8","key":"774_CR24","doi-asserted-by":"publisher","first-page":"91","DOI":"10.31449\/inf.v46i8.4305","volume":"46","author":"JK Dawson","year":"2022","unstructured":"Dawson JK et al (2022) Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme. Informatica 46(8):91\u2013104. https:\/\/doi.org\/10.31449\/inf.v46i8.4305","journal-title":"Informatica"},{"key":"774_CR25","doi-asserted-by":"publisher","unstructured":"Dawson JK et al (2023) Ensuring privacy and confidentiality of cloud data: a comparative analysis of diverse cryptographic solutions based on run time trend. PLoS ONE 18(9 September):1\u201315. https:\/\/doi.org\/10.1371\/journal.pone.0290831","DOI":"10.1371\/journal.pone.0290831"},{"key":"774_CR26","doi-asserted-by":"crossref","unstructured":"Dell'Olio A, Biasioli F, Fogliano V, Rubert J (2025) Decoding microbial volatile signals in host\u2013microbiome crosstalk. Trends in Endocrinology & Metabolism. Advance online publication. https:\/\/doi.org\/10.1016\/j.tem.2025.08.004","DOI":"10.1016\/j.tem.2025.08.004"},{"key":"774_CR27","doi-asserted-by":"publisher","unstructured":"Dhote S, Maidamwar P, Thakur S (2024). Integrating blockchain and multi-factor authentication for enhanced cloud security in certificate verification systems. pp. 1\u20137. https:\/\/doi.org\/10.1109\/icdcot61034.2024.10516190","DOI":"10.1109\/icdcot61034.2024.10516190"},{"key":"774_CR28","unstructured":"Dworkin M (2005) Recommendation for Block Cipher Modes of Operation, National Institute of Standards and Technology Special Publication 800\u201338A 2001 ED, X(December), pp. 1\u201323. Available at: http:\/\/csrc.nist.gov\/publications\/drafts\/800-38g\/sp800_38g_draft.pdf"},{"issue":"2","key":"774_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.34010\/injiiscom.v3i2.8446","volume":"3","author":"WKA Erlangga","year":"2022","unstructured":"Erlangga WKA, Ramadhan MR (2022) Potential security issues in implementing IaaS and PaaS cloud service models. International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) 3(2):143\u2013162. https:\/\/doi.org\/10.34010\/injiiscom.v3i2.8446","journal-title":"International Journal of Informatics, Information System and Computer Engineering (INJIISCOM)"},{"key":"774_CR30","unstructured":"Fahina et al (2022) Securing the data in cloud using Algebra Homomorphic Encryption scheme based on updated Elgamal(AHEE), arXiv 6(3):287\u2013292"},{"key":"774_CR31","unstructured":"Faneela S, Jayanthi R, Alhassan S (2025) Comparative study of OpenFHE and Microsoft SEAL for homomorphic encryption in cloud-based systems. arXiv preprint [arXiv:2503.11216]. https:\/\/arxiv.org\/abs\/2503.11216"},{"key":"774_CR32","doi-asserted-by":"crossref","unstructured":"Fang C et al (2022) R epttack\u202f: exploiting cloud schedulers to guide co-location attacks","DOI":"10.14722\/ndss.2022.23149"},{"issue":"6","key":"774_CR33","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.3837\/tiis.2019.06.025","volume":"13","author":"S Fatima","year":"2019","unstructured":"Fatima S, Ahmad S (2019) An exhaustive review on security issues in cloud computing. KSII Trans Internet Inf Syst 13(6):3219\u20133237. https:\/\/doi.org\/10.3837\/tiis.2019.06.025","journal-title":"KSII Trans Internet Inf Syst"},{"key":"774_CR34","unstructured":"Framework G (2015) A general framework for building noise-free homomorphic cryptosystems. Eprint.Iacr.Org. pp. 45\u201370"},{"key":"774_CR35","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) A Fully Homomorphic Encryption Scheme, Dissertation, (September), p. 169. Available at: http:\/\/cs.au.dk\/~stm\/local-cache\/gentry-thesis.pdf.","DOI":"10.1145\/1536414.1536440"},{"issue":"4","key":"774_CR36","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s12599-023-00830-x","volume":"66","author":"J Gl\u00f6ckler","year":"2024","unstructured":"Gl\u00f6ckler J et al (2024) A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity. Bus Inf Syst Eng 66(4):421\u2013440. https:\/\/doi.org\/10.1007\/s12599-023-00830-x","journal-title":"Bus Inf Syst Eng"},{"key":"774_CR37","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-023-00187-4","author":"Y Gong","year":"2024","unstructured":"Gong Y et al (2024) Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Cybersecurity. https:\/\/doi.org\/10.1186\/s42400-023-00187-4","journal-title":"Cybersecurity"},{"key":"774_CR38","doi-asserted-by":"crossref","unstructured":"Guimar\u00e3es A, Pereira HVL (2025) Fast amortized bootstrapping with small keys and polynomial noise overhead. To appear in the Proceedings of the ACM Conference on Computer and Communications Security (CCS 2025)","DOI":"10.1145\/3719027.3765181"},{"key":"774_CR39","doi-asserted-by":"publisher","unstructured":"Hachim EAW (2024) Cloud data protection based on a crypto-steganography approach. Journal La Multiapp 5(4):324\u2013331. https:\/\/doi.org\/10.37899\/journallamultiapp.v5i4.1337","DOI":"10.37899\/journallamultiapp.v5i4.1337"},{"key":"774_CR40","unstructured":"Hangan A et al (2024) Privacy-Preserving Anomaly Detection on Homomorphically Encrypted IoT Data (preprint). arXiv. https:\/\/arxiv.org\/abs\/2403.09322"},{"issue":"1","key":"774_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume K et al (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):1\u201313. https:\/\/doi.org\/10.1186\/1869-0238-4-5","journal-title":"J Internet Serv Appl"},{"key":"774_CR42","unstructured":"Hossain MS et al (2023) IEEE Internet of Things Journal, PubMed ID: 37571545"},{"key":"774_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01805-9","author":"A Hosseingholizadeh","year":"2024","unstructured":"Hosseingholizadeh A, Rahmati F, Ali M, Liu X (2024) Homomorphic multi-party computation for internet of medical things. Peer-to-Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-024-01805-9","journal-title":"Peer-to-Peer Netw Appl"},{"key":"774_CR44","doi-asserted-by":"publisher","unstructured":"Humayun M (2022) Software-as-a-Service security challenges and best practices: A multivocal literature review. Applied Sciences. 12(8):3953. https:\/\/doi.org\/10.3390\/app12083953","DOI":"10.3390\/app12083953"},{"key":"774_CR45","doi-asserted-by":"crossref","unstructured":"Hussain AA, Al-Turjman F (2021) Artificial intelligence and blockchain: A review. Transactions on Emerging Telecommunications Technologies 32(9):e4268. https:\/\/doi.org\/10.1002\/ett.4268","DOI":"10.1002\/ett.4268"},{"issue":"1","key":"774_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-019-0131-1","volume":"8","author":"MK Hussein","year":"2019","unstructured":"Hussein MK, Mousa MH, Alqarni MA (2019) A placement architecture for a container as a service (CaaS) in a cloud environment. Journal of Cloud Computing 8(1):1\u201315. https:\/\/doi.org\/10.1186\/s13677-019-0131-1","journal-title":"J Cloud Comput"},{"issue":"4","key":"774_CR47","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/j.jestch.2018.05.010","volume":"21","author":"I Indu","year":"2018","unstructured":"Indu I, Anand PMR, Bhaskar V (2018) Identity and access management in cloud environment: mechanisms and challenges. Eng Sci Technol Int J 21(4):574\u2013588. https:\/\/doi.org\/10.1016\/j.jestch.2018.05.010","journal-title":"Eng Sci Technol Int J"},{"key":"774_CR48","doi-asserted-by":"publisher","unstructured":"Isharufe W, Jaafar F, Butakov S (2020) Study of Security Issues in Platform-as-a-Service (PaaS) Cloud Model. In: 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Istanbul, Turkey. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICECCE49384.2020.9179414","DOI":"10.1109\/ICECCE49384.2020.9179414"},{"issue":"04","key":"774_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.55041\/ijsrem18682","volume":"07","author":"MVB Jadhav","year":"2023","unstructured":"Jadhav MVB, Zade DS (2023) A best approach to load balancing in cloud computing security using SSL in Iaas infrastructure. Int J Sci Res Eng Manag 07(04):1\u20134. https:\/\/doi.org\/10.55041\/ijsrem18682","journal-title":"Int J Sci Res Eng Manag"},{"issue":"6","key":"774_CR50","doi-asserted-by":"publisher","first-page":"184","DOI":"10.48175\/ijetir-1234","volume":"4","author":"S Jasmine Sharon","year":"2024","unstructured":"Jasmine Sharon S, Nagasundaram S (2024) Multi-Tenant IaaS Cloud Security Evaluation Model. Int J Adv Res Sci Commun Technol 4(6):184\u2013188. https:\/\/doi.org\/10.48175\/ijetir-1234","journal-title":"Int J Adv Res Sci Commun Technol"},{"key":"774_CR51","doi-asserted-by":"publisher","unstructured":"Kamble A, Jiet MM, Puri C (2024) Homomorphic encryption and its applications in multi-cloud security. https:\/\/doi.org\/10.1109\/icict60155.2024.10544773","DOI":"10.1109\/icict60155.2024.10544773"},{"key":"774_CR52","doi-asserted-by":"publisher","unstructured":"Kim K, Alshenaifi IM, Ramachandran S, Kim J, Zia T, Almorjan A (2023) Cybersecurity and cyber forensics for smart cities: A comprehensive literature review and survey. Sensors 23(7):3681. https:\/\/doi.org\/10.3390\/s23073681","DOI":"10.3390\/s23073681"},{"key":"774_CR53","doi-asserted-by":"publisher","DOI":"10.1080\/0954898x.2024.2391395","author":"D Komarasamy","year":"2024","unstructured":"Komarasamy D, Ramaganthan SM, Kandaswamy DM, Mony G (2024) Deep learning and optimization enabled multi-objective for task scheduling in cloud computing. Network Comput Neural Syst. https:\/\/doi.org\/10.1080\/0954898x.2024.2391395","journal-title":"Network Comput Neural Syst"},{"key":"774_CR54","doi-asserted-by":"publisher","unstructured":"Ku H et al (2022) Privacy-preserving federated learning in medical diagnosis with homomorphic re-encryption. Comput Standards Interfaces 80(July 2021):103583. https:\/\/doi.org\/10.1016\/j.csi.2021.103583","DOI":"10.1016\/j.csi.2021.103583"},{"issue":"4","key":"774_CR55","doi-asserted-by":"publisher","first-page":"11","DOI":"10.48175\/ijarsct-2682","volume":"2","author":"PD Kulkarni","year":"2022","unstructured":"Kulkarni PD (2022) Cloud security: challenges and solutions. Int J Adv Res Sci Commun Technol 2(4):11\u201322. https:\/\/doi.org\/10.48175\/ijarsct-2682","journal-title":"Int J Adv Res Sci Commun Technol"},{"key":"774_CR56","doi-asserted-by":"publisher","unstructured":"Kumar S, Jain A, Pareek A (2023) Heuristic-driven approach for efficient workflow scheduling in infrastructure as a service using hybrid optimization algorithms \u2020. Eng Proceed 59(1). https:\/\/doi.org\/10.3390\/engproc2023059077","DOI":"10.3390\/engproc2023059077"},{"key":"774_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/9210803","volume":"2023","author":"J Kwao Dawson","year":"2023","unstructured":"Kwao Dawson J et al (2023) PRISMA archetype-based systematic literature review of security algorithms in the cloud. Secur Commun Networks 2023:1\u201317. https:\/\/doi.org\/10.1155\/2023\/9210803","journal-title":"Secur Commun Networks"},{"key":"774_CR58","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3493452","author":"AR Lakhan","year":"2024","unstructured":"Lakhan AR, Wu H (2024) A novel homomorphic blockchain scheme for intelligent transport services in fog\/cloud and IoT networks. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2024.3493452","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"774_CR59","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00083-9","volume":"4","author":"RS Leon","year":"2021","unstructured":"Leon RS et al (2021) Hypervisor-assisted dynamic malware analysis. Cybersecurity 4(1):19. https:\/\/doi.org\/10.1186\/s42400-021-00083-9","journal-title":"Cybersecurity"},{"key":"774_CR60","doi-asserted-by":"publisher","unstructured":"Li X, Li H, Gao J, Wang R (2023) Privacy preserving via multi-key homomorphic encryption in cloud computing. Journal of Information Security and Applications. 74:103463. https:\/\/doi.org\/10.1016\/j.jisa.2023.103463\u00a0","DOI":"10.1016\/j.jisa.2023.103463"},{"key":"774_CR61","doi-asserted-by":"crossref","unstructured":"Liu Y (2024) PDPHE: Personal Data Protection for Trans-Border ... Electronics (MDPI) \u2014 article proposing personal data protection using homomorphic encryption. https:\/\/doi.org\/10.3390\/electronics13101959","DOI":"10.3390\/electronics13101959"},{"key":"774_CR62","doi-asserted-by":"publisher","unstructured":"Manchanda A, Kaur A, Kaur A (2023) Cloud computing: resource management, categorization, scalability and taxonomy. https:\/\/doi.org\/10.1109\/DELCON57910.2023.10127319","DOI":"10.1109\/DELCON57910.2023.10127319"},{"key":"774_CR63","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2024.3350232","author":"EA Mantey","year":"2024","unstructured":"Mantey EA, Kwofie S, Agbesi K, Otoo BD, Agbemenu EK (2024) Federated learning with homomorphic encryption for medical recommendation in IoMTs. IEEE J Biomed Health Inform. https:\/\/doi.org\/10.1109\/JBHI.2024.3350232","journal-title":"IEEE J Biomed Health Inform"},{"issue":"7","key":"774_CR64","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.3966\/160792642019122007016","volume":"20","author":"Z Min","year":"2019","unstructured":"Min Z et al (2019) A privacy-preserving BGN-type parallel homomorphic encryption algorithm based on LWE. J Internet Technol 20(7):2189\u20132200. https:\/\/doi.org\/10.3966\/160792642019122007016","journal-title":"J Internet Technol"},{"key":"774_CR65","doi-asserted-by":"publisher","unstructured":"Mishra A, Singh R, Kumar P (2023) Private cloud deployment and management using OpenStack: Security and performance analysis. Journal of Cloud Computing 12(2):45\u201358. https:\/\/doi.org\/10.1186\/s13677-023-00412-3","DOI":"10.1186\/s13677-023-00412-3"},{"issue":"2","key":"774_CR66","doi-asserted-by":"publisher","first-page":"40","DOI":"10.14500\/aro.10590","volume":"8","author":"MA Mohammed","year":"2020","unstructured":"Mohammed MA, Abed FS (2020) Cloud storage protection scheme based on fully homomorphic encryption. Aro-the Scientific Journal of Koya University 8(2):40\u201347. https:\/\/doi.org\/10.14500\/aro.10590","journal-title":"Aro-the Scientific Journal of Koya University"},{"key":"774_CR67","doi-asserted-by":"publisher","unstructured":"Mukherjee AG, Renu K, Gopalakrishnan AV, Veeraraghavan VP, Vinayagam S, Paz-Montelongo S et al (2023) Heavy metal and metalloid contamination in food and emerging technologies for its detection. Sustainability 15(2):1195. https:\/\/doi.org\/10.3390\/su15021195","DOI":"10.3390\/su15021195"},{"issue":"4","key":"774_CR68","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","volume":"9","author":"K Munjal","year":"2023","unstructured":"Munjal K, Bhatia R (2023) A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell Syst 9(4):3759\u20133786. https:\/\/doi.org\/10.1007\/s40747-022-00756-z","journal-title":"Complex Intell Syst"},{"key":"774_CR69","doi-asserted-by":"publisher","first-page":"108","DOI":"10.26636\/jtit.2023.4.1419","volume":"4","author":"A Mycek","year":"2023","unstructured":"Mycek A (2023) Monitoring, management, and analysis of security aspects of IaaS environments. J Telecommun Inf Technol 4:108\u2013116. https:\/\/doi.org\/10.26636\/jtit.2023.4.1419","journal-title":"J Telecommun Inf Technol"},{"key":"774_CR70","doi-asserted-by":"publisher","unstructured":"Naik N , Jenkins P (2016) A secure mobile cloud identity: Criteria for effective identity and access management standards. In: Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016. pp. 89\u201390. https:\/\/doi.org\/10.1109\/MobileCloud.2016.22","DOI":"10.1109\/MobileCloud.2016.22"},{"key":"774_CR71","unstructured":"NANDA International (2024) NANDA International nursing diagnoses: Definitions and classification (13th ed.). NANDA International. (Publishing\/edition details as per the 2024 NANDA International publication)"},{"key":"774_CR72","doi-asserted-by":"crossref","unstructured":"Neda N, Ebel A, Reynwar B, Reagen B (2023) CiFlow: Dataflow analysis and optimization of key-switching for homomorphic encryption [Preprint]. arXiv. https:\/\/arxiv.org\/abs\/2311.01598","DOI":"10.1109\/ISPASS61541.2024.00016"},{"key":"774_CR73","doi-asserted-by":"publisher","unstructured":"Ni W, Zhang Y, Li W (2024) Optimal dynamic task scheduling in heterogeneous cloud computing environment. https:\/\/doi.org\/10.1109\/iaict62357.2024.10617649","DOI":"10.1109\/iaict62357.2024.10617649"},{"key":"774_CR74","doi-asserted-by":"publisher","unstructured":"Nowrin IN, Khanam FK (2019) Importance of cloud deployment model and security issues of software as a service (SaaS) for cloud computing. In: Proceedings - 2019 International Conference on Applied Machine Learning, ICAML 2019, (July). pp. 183\u2013186. https:\/\/doi.org\/10.1109\/ICAML48257.2019.00042","DOI":"10.1109\/ICAML48257.2019.00042"},{"issue":"2","key":"774_CR75","doi-asserted-by":"publisher","DOI":"10.22158\/wjer.v11n2p166","volume":"11","author":"PM Okanda","year":"2024","unstructured":"Okanda PM (2024) Leveraging cloud infrastructure for rapid application development and deployment of cloud services. World J Educ Res 11(2):p166. https:\/\/doi.org\/10.22158\/wjer.v11n2p166","journal-title":"World J Educ Res"},{"key":"774_CR76","doi-asserted-by":"publisher","unstructured":"Patel HB, Kansara N (2021) Cloud computing deployment models: a comparative study. Int J Innov Res Comput Sci Technol 9(2):45\u201350. https:\/\/doi.org\/10.21276\/ijircst.2021.9.2.8","DOI":"10.21276\/ijircst.2021.9.2.8"},{"issue":"3","key":"774_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/exsy.13496","volume":"41","author":"S Pathakamuri","year":"2024","unstructured":"Pathakamuri S, Reddy BVR, Kumar APS (2024) PaaS platform security enhancement using fuzzy based access control and trust based signature. Expert Syst 41(3):1\u201318. https:\/\/doi.org\/10.1111\/exsy.13496","journal-title":"Expert Syst"},{"key":"774_CR78","doi-asserted-by":"publisher","unstructured":"Prasad DAVHS, Suresh DK, Chandusha K (2024) Cloud-based data storage that guarantees confidentiality and anonymity. Advances in Cyber Security and Digital Forensics. pp. 34\u201339. https:\/\/doi.org\/10.58532\/nbennurch255","DOI":"10.58532\/nbennurch255"},{"issue":"23","key":"774_CR79","doi-asserted-by":"publisher","DOI":"10.4108\/eetcs.v7i23.3011","volume":"7","author":"F Qazi","year":"2023","unstructured":"Qazi F (2023) Application programming interface (API) security in cloud applications. EAI Endorsed Transactions on Cloud Systems 7(23):e1. https:\/\/doi.org\/10.4108\/eetcs.v7i23.3011","journal-title":"EAI Endorsed Transactions on Cloud Systems"},{"key":"774_CR80","doi-asserted-by":"publisher","unstructured":"Rajagopal M, Karuppasamy SK, Hemalatha S (2024). Optimal management of resources in cloud infrastructure through energy aware collaborative model. https:\/\/doi.org\/10.1109\/accai61061.2024.10601784","DOI":"10.1109\/accai61061.2024.10601784"},{"key":"774_CR81","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/1711756","author":"E Rajwar","year":"2024","unstructured":"Rajwar E et al (2024) A scoping review of income support programs offered to older adults living in South Asian countries between 2000 and 2021. Health Soc Care Community. https:\/\/doi.org\/10.1155\/2024\/1711756","journal-title":"Health Soc Care Community"},{"key":"774_CR82","doi-asserted-by":"publisher","unstructured":"Rao KRM (2024) A secured model for medical data using hybrid fuzzy neural network with modified deer hunt optimization and pallier homomomorphic encryption in cloud computing. 6(14). https:\/\/doi.org\/10.48047\/AFJBS.6.14.2024.79","DOI":"10.48047\/AFJBS.6.14.2024.79"},{"issue":"3","key":"774_CR83","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.11591\/ijeecs.v35.i3.pp1499-1506","volume":"35","author":"GJ Rosline","year":"2024","unstructured":"Rosline GJ, Rani P (2024) Intrusion detection system for cloud environment based on convolutional neural networks and PSO algorithm. Indones J Electr Eng Comput Sci 35(3):1499\u20131506. https:\/\/doi.org\/10.11591\/ijeecs.v35.i3.pp1499-1506","journal-title":"Indones J Electr Eng Comput Sci"},{"issue":"1","key":"774_CR84","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/3624577","volume":"67","author":"M Russinovich","year":"2023","unstructured":"Russinovich M (2023) Confidential computing: elevating cloud security and privacy. Commun ACM 67(1):52\u201353. https:\/\/doi.org\/10.1145\/3624577","journal-title":"Commun ACM"},{"key":"774_CR85","doi-asserted-by":"publisher","unstructured":"Sabbani G (2024) The rise of neobanks: Disrupting the traditional banking landscape. International Journal of Science and Research (IJSR), 13(5):1024\u20131027. https:\/\/doi.org\/10.21275\/SR24516201618 (where provided by the publisher)\u00a0","DOI":"10.21275\/SR24516201618"},{"key":"774_CR86","doi-asserted-by":"crossref","unstructured":"Sanagana DPR, Tummalachervu CK (2024) Securing cloud computing environment via optimal deep learning-based intrusion detection systems [Conference paper \/ article]. ResearchGate. https:\/\/www.researchgate.net\/profile\/Chaitanya-Kanth-Tummalachervu","DOI":"10.1109\/ICDSIS61070.2024.10594404"},{"issue":"2","key":"774_CR87","doi-asserted-by":"publisher","first-page":"67","DOI":"10.9790\/0661-1902046772","volume":"19","author":"AK Sen","year":"2017","unstructured":"Sen AK, Tiwari PK (2017) Security issues and solutions in cloud computing. IOSR J Comput Eng 19(2):67\u201372. https:\/\/doi.org\/10.9790\/0661-1902046772","journal-title":"IOSR J Comput Eng"},{"key":"774_CR88","doi-asserted-by":"publisher","unstructured":"Sen J (2015) Security and privacy issues in cloud computing, Standards and Standardization: Concepts, Methodologies, Tools, and Applications. https:\/\/doi.org\/10.4018\/978-1-4666-8111-8.ch065","DOI":"10.4018\/978-1-4666-8111-8.ch065"},{"issue":"October","key":"774_CR89","doi-asserted-by":"publisher","first-page":"144574","DOI":"10.1109\/ACCESS.2023.3344486","volume":"11","author":"BC Senel","year":"2023","unstructured":"Senel BC et al (2023) Multitenant containers as a service (CaaS) for clouds and edge clouds. IEEE Access 11(October):144574\u2013144601. https:\/\/doi.org\/10.1109\/ACCESS.2023.3344486","journal-title":"IEEE Access"},{"key":"774_CR90","doi-asserted-by":"crossref","unstructured":"Senel BC, Mouchet M, Cappos J, Fourmaux O, Friedman T, McGeer R (2023) Multitenant Containers as a Service (CaaS) for Clouds and Edge Clouds. arXiv preprint arXiv:2304.08927","DOI":"10.1109\/ACCESS.2023.3344486"},{"key":"774_CR91","doi-asserted-by":"publisher","unstructured":"Shanmugam B, Azam S (2023) Risk assessment of heterogeneous IoMT devices: A review. Technologies. 11, Article 31. https:\/\/doi.org\/10.3390\/technologies11010031","DOI":"10.3390\/technologies11010031"},{"key":"774_CR92","doi-asserted-by":"publisher","unstructured":"Shaheen MS, Deeptha R, Gulbake S (2024) Fortifying multi-user cloud security in quantum networking using cryptographic algorithms. Advances in computational intelligence and robotics book series. pp. 163\u2013180. https:\/\/doi.org\/10.4018\/979-8-3693-5832-0.ch011","DOI":"10.4018\/979-8-3693-5832-0.ch011"},{"issue":"3","key":"774_CR93","doi-asserted-by":"publisher","first-page":"135","DOI":"10.55524\/ijircst.2021.9.6.31","volume":"15","author":"R Sikka","year":"2021","unstructured":"Sikka R, Ojha M (2021) An overview of cloud computing. Int J Innov Res Comput Sci Technol 15(3):135\u2013138. https:\/\/doi.org\/10.55524\/ijircst.2021.9.6.31","journal-title":"Int J Innov Res Comput Sci Technol"},{"key":"774_CR94","doi-asserted-by":"publisher","DOI":"10.24018\/ejeng.2023.8.4.3074","author":"C Singh","year":"2023","unstructured":"Singh C, Warraich J, Thakkar R (2023) IAM identity access management \u2014 importance in maintaining security systems within organizations. European Journal of Engineering and Technology Research. https:\/\/doi.org\/10.24018\/ejeng.2023.8.4.3074","journal-title":"European Journal of Engineering and Technology Research"},{"issue":"5","key":"774_CR95","doi-asserted-by":"publisher","first-page":"699","DOI":"10.14569\/IJACSA.2024.0150570","volume":"15","author":"D Sudarsa","year":"2024","unstructured":"Sudarsa D, Nagaraja Rao A, Sivakumar AP (2024) Data security optimization at cloud storage using confidentiality-based data classification. Int J Adv Comput Sci Appl 15(5):699\u2013709. https:\/\/doi.org\/10.14569\/IJACSA.2024.0150570","journal-title":"Int J Adv Comput Sci Appl"},{"key":"774_CR96","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03213-1","journal-title":"J Supercomput"},{"key":"774_CR97","doi-asserted-by":"publisher","unstructured":"Van Beirendonck M, D\u2019Anvers JP, Turan F, Verbauwhede I (2023) FPT: A Fixed Point Accelerator for Torus Fully Homomorphic Encryption. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201923) pp. 741\u2013755. ACM. https:\/\/doi.org\/10.1145\/3576915.3623159","DOI":"10.1145\/3576915.3623159"},{"key":"774_CR98","doi-asserted-by":"publisher","unstructured":"Vijayan G, Dharun K, Dhinesh M, Mahalakshmi S (2024). Establishing Cloud Security using Modern Learning Approaches. https:\/\/doi.org\/10.1109\/icict60155.2024.10544686","DOI":"10.1109\/icict60155.2024.10544686"},{"key":"774_CR99","doi-asserted-by":"publisher","unstructured":"Wang H et al (2024) Privacy-preserving multi-party logistic regression in cloud computing. Comput Stand Interfaces 90(July 2023):103857. https:\/\/doi.org\/10.1016\/j.csi.2024.103857","DOI":"10.1016\/j.csi.2024.103857"},{"key":"774_CR100","doi-asserted-by":"publisher","unstructured":"Wang Q et al. (2023) Applied soft computing. 138. https:\/\/doi.org\/10.1016\/j.asoc.2023.110180","DOI":"10.1016\/j.asoc.2023.110180"},{"key":"774_CR101","doi-asserted-by":"publisher","unstructured":"Wei Y et al (2024) Communication optimization for distributed training: architecture, advances, and opportunities. IEEE Network. pp. 1\u20138. https:\/\/doi.org\/10.1109\/MNET.2024.3449276","DOI":"10.1109\/MNET.2024.3449276"},{"key":"774_CR102","unstructured":"World Economic Forum (2024) Global Cybersecurity Outlook 2024 | World Economic Forum. World Economic Forum, (January). Available at: https:\/\/www.weforum.org\/publications\/global-cybersecurity-outlook-2024\/"},{"issue":"1","key":"774_CR103","doi-asserted-by":"publisher","first-page":"282","DOI":"10.3837\/tiis.2014.01.017","volume":"8","author":"J Xiong","year":"2014","unstructured":"Xiong J et al (2014) PRIAM: Privacy preserving identity and access management scheme in cloud. KSII Trans Internet Inf Syst 8(1):282\u2013304. https:\/\/doi.org\/10.3837\/tiis.2014.01.017","journal-title":"KSII Trans Internet Inf Syst"},{"key":"774_CR104","unstructured":"Yadav P et al (2020) Position paper: A systematic framework for categorising IoT devices (AIChallengeIoT '20 conference paper). Proceedings of AIChallengeIoT 2020. Available from White Rose Research Online repository"},{"issue":"5","key":"774_CR105","doi-asserted-by":"publisher","first-page":"78","DOI":"10.15373\/22778179\/may2014\/26","volume":"3","author":"S Yadav","year":"2012","unstructured":"Yadav S, Verma U, Bhardwaj C (2012) Data security in cloud computing using homomorphic encryption. Int J Sci Res 3(5):78\u201381. https:\/\/doi.org\/10.15373\/22778179\/may2014\/26","journal-title":"Int J Sci Res"},{"issue":"7","key":"774_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s23073566","volume":"23","author":"W Yang","year":"2023","unstructured":"Yang W et al (2023) A review of homomorphic encryption for privacy-preserving biometrics. Sensors 23(7):1\u201323. https:\/\/doi.org\/10.3390\/s23073566","journal-title":"Sensors"},{"key":"774_CR107","doi-asserted-by":"publisher","unstructured":"Zhang Y et al (2023) Microprocessors and microsystems. 98. https:\/\/doi.org\/10.1016\/j.micpro.2023.104743","DOI":"10.1016\/j.micpro.2023.104743"},{"key":"774_CR108","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3397343","author":"L Zhang","year":"2024","unstructured":"Zhang L, Wang X, Wang J, Pung R, Wang H, Lam K-Y (2024) An efficient FHE-enabled secure cloud-edge computing architecture for IoMTs data protection with its application to pandemic modelling. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/TII.2024.3397343","journal-title":"IEEE Internet Things J"},{"key":"774_CR109","unstructured":"Zhao D (2025). Hermes: High-throughput SQL query processing over fully homomorphic encrypted databases. arXiv preprint [arXiv:2506.03308]. https:\/\/arxiv.org\/abs\/2506.03308"},{"issue":"3","key":"774_CR110","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.32604\/cmes.2023.026671","volume":"136","author":"M Zhao","year":"2023","unstructured":"Zhao M et al (2023) Many-objective optimization-based task scheduling in hybrid cloud environments. Comput Model Eng Sci 136(3):2425\u20132450. https:\/\/doi.org\/10.32604\/cmes.2023.026671","journal-title":"Comput Model Eng Sci"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00774-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00774-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00774-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T23:04:25Z","timestamp":1767049465000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-025-00774-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,22]]},"references-count":110,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["774"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00774-5","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,22]]},"assertion":[{"value":"21 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"84"}}