{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:38:06Z","timestamp":1760056686817,"version":"build-2065373602"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00779-0","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T13:05:09Z","timestamp":1760015109000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating machine learning and encryption for effective data management in blood bank supply chains"],"prefix":"10.1186","volume":"14","author":[{"given":"K. M.","family":"Kirupa Shankar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V.","family":"Santhi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"issue":"4","key":"779_CR1","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1111\/trf.12391","volume":"54","author":"F Masiello","year":"2014","unstructured":"Masiello F, Tirelli V, Sanchez M, van den Akker E, Gabriella G, Marconi M, Villa MA, Rebulla P, Hashmi G, Whitsett C, Migliaccio AR (2014) Mononuclear cells from a rare blood donor, after freezing under good manufacturing practice conditions, generate red blood cells that recapitulate the rare blood phenotype. Transfusion 54(4):1059\u20131070. https:\/\/doi.org\/10.1111\/trf.12391","journal-title":"Transfusion"},{"key":"779_CR2","doi-asserted-by":"publisher","unstructured":"Sumithra MG, Ramu A, Onn CC, editors. Advances in Computing(2020) Communication, Automation and Biomedical Technology. IJAICT India Publications Dec 30. https:\/\/doi.org\/10.46532\/978-81-950008-1-4","DOI":"10.46532\/978-81-950008-1-4"},{"key":"779_CR3","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wu B, Liu S, Zhao T, Tan Z, Zhu X, Yan X, Qi X, Tang J, Li W, Li Z (2023) The Patch-type Multi-lead electrocardio Multiparameter Monitoring Diagnostic Instruments and Their New-type Wireless Remote Connected Ecosystem","DOI":"10.21203\/rs.3.rs-3024863\/v1"},{"key":"779_CR4","doi-asserted-by":"publisher","first-page":"1384775","DOI":"10.3389\/fnano.2024.1384775","volume":"6","author":"MF Fleury Rosa","year":"2024","unstructured":"Fleury Rosa MF, Santos LM, Grabois Gadelha CA, Martins de Toledo A, Carregaro RL, Almeida da Silva AK (2024) Mota Da Costa LB, Ferreira Da Rocha A, de Siqueira Rodrigues fleury Rosa S. Translational pathway of a novel PFF2 respirator with Chitosan nanotechnology: from the concept to the practical applications. Front Nanatechnol 6:1384775. https:\/\/doi.org\/10.3389\/fnano.2024.1384775","journal-title":"Front Nanatechnol"},{"key":"779_CR5","unstructured":"Kinuthia LN Role of entrepreneurial (Eo) in marketing strategy implementation by garment making micro enterprises in Nakuru, Kenya. 6th Annual International Conference-2023, Kirinyaga University, Virtual"},{"key":"779_CR6","unstructured":"Hunt GD (2019) Development of an improved backpack container to enhance vaccine distribution in the cold chain systems of rural Southeast Asia. LeTourneau University"},{"issue":"1","key":"779_CR7","doi-asserted-by":"publisher","first-page":"15811","DOI":"10.1038\/s41598-022-19968-x","volume":"12","author":"MD Patrick","year":"2022","unstructured":"Patrick MD, Keys JF, Suresh Kumar H, Annamalai RT (2022) Injectable nanoporous microgels generate vascularized constructs and support bone regeneration in critical-sized defects. Sci Rep 12(1):15811. https:\/\/doi.org\/10.1038\/s41598-022-19968-x","journal-title":"Sci Rep"},{"key":"779_CR8","unstructured":"Habbous S Measuring the Efficiency of the Living Kidney Donor Candidate Evaluation Process (Doctoral dissertation, The University of Western Ontario (Canada)). https:\/\/ir.lib.uwo.ca\/etd\/5940\/"},{"issue":"1","key":"779_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/biot.202300256","volume":"19","author":"J Wang","year":"2024","unstructured":"Wang J, Chen L, Qin S, Xie M, Luo SZ, Li W (2024) Advances in biosynthesis of peptide drugs: technology and industrialization. Biotechnol J 19(1):2300256. https:\/\/doi.org\/10.1002\/biot.202300256","journal-title":"Biotechnol J"},{"key":"779_CR10","doi-asserted-by":"publisher","unstructured":"Fischerkeller MP, Goldman EO, Harknett RJ (2022) Cyber persistence theory: Redefining national security in cyberspace. Oxford University Press; May 6. https:\/\/doi.org\/10.1093\/oso\/9780197638255.001.0001","DOI":"10.1093\/oso\/9780197638255.001.0001"},{"key":"779_CR11","unstructured":"Iacuzzi V Design of detection systems for the therapeutic drug monitoring of anticancer drugs. https:\/\/arts.units.it\/handle\/11368\/2967986"},{"key":"779_CR12","doi-asserted-by":"crossref","unstructured":"Wang Y, Qu J, Xiong C, Chen B, Xie K, Wang M, Liu Z, Yue Z, Liang Z, Wang F, Zhang T. Transdermal microarrayed electroporation for enhanced cancer immunotherapy based on DNA vaccination. Proceedings of the National Academy of Sciences. ;121(25):e2322264121.\u00a0https:\/\/www.pnas.org\/doi\/10.1073\/pnas.2322264121","DOI":"10.1073\/pnas.2322264121"},{"key":"779_CR13","doi-asserted-by":"crossref","unstructured":"Ziabari AH, Jahandideh A, Akbarzadeh A, Mortazavi P. Poly (\u0395-Caprolactone)(PCL) Nanofibers as a Potent Platform for Co-Delivery of Vancomycin and Curcumin: Drug Release Profiling and Biophysically In-Vitro Investigating. BioNanoScience. 2024 Jun 18:1-. https:\/\/www.researchgate.net\/publication\/381518683_PolyE-Caprolactone_PCL_Nanofibers_as_a_Potent_Platform_for_Co-Delivery_of_Vancomycin_and_Curcumin_Drug_Release_Profiling_and_Biophysically_In-Vitro_Investigating","DOI":"10.1007\/s12668-024-01488-9"},{"key":"779_CR14","unstructured":"Hu W Fabrication of Silicon Out-of-Plane Microneedles for Potential Drug Delivery and Interstitial Fluid Extraction (Doctoral dissertation, University of Waterloo). https:\/\/uwspace.uwaterloo.ca\/items\/7aebcbdd-09a4-4840-883f-d06419eb12b4"},{"key":"779_CR15","doi-asserted-by":"publisher","unstructured":"Sibu GA, Gayathri P, Akila T, Marnadu R, Balasubramani V (2024 Mar) Manifestation on the choice of a suitable combination of MIS for proficient Schottky diodes for optoelectronics applications: A comprehensive review. Nano Energy 26:109534. https:\/\/doi.org\/10.1016\/j.nanoen.2024.109534","DOI":"10.1016\/j.nanoen.2024.109534"},{"key":"779_CR16","doi-asserted-by":"publisher","unstructured":"Praneeth Y, Singhania J An intelligent blood bank management and blood monitoring system using machine learning. https:\/\/doi.org\/10.33472\/AFJBS.6.10.2024.960-966","DOI":"10.33472\/AFJBS.6.10.2024.960-966"},{"issue":"4","key":"779_CR17","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1108\/JM2-06-2023-0131","volume":"19","author":"M Jami","year":"2024","unstructured":"Jami M, Izadbakhsh H, Arshadi Khamseh A (2024) Developing an integrated blood supply chain network in disaster conditions considering multi-purpose capabilities. J Model Manage 19(4):1316\u20131342. https:\/\/doi.org\/10.1108\/JM2-06-2023-0131","journal-title":"J Model Manage"},{"key":"779_CR18","doi-asserted-by":"publisher","DOI":"10.1111\/itor.13569","author":"MS Moshtagh","year":"2024","unstructured":"Moshtagh MS, Zhou Y, Verma M (2024) Coordinating a bi-level blood supply chain with interactions between supply\u2010side and demand\u2010side operational decisions. Int Trans Oper Res. https:\/\/doi.org\/10.1111\/itor.13569","journal-title":"Int Trans Oper Res"},{"issue":"1","key":"779_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijforecast.2023.05.004","volume":"41","author":"M Abolghasemi","year":"2025","unstructured":"Abolghasemi M, Abbasi B, HosseiniFard Z (2025) Machine learning for satisficing operational decision making: a case study in blood supply chain. Int J Forecast 41(1):3\u201319. https:\/\/doi.org\/10.1016\/j.ijforecast.2023.05.004","journal-title":"Int J Forecast"},{"key":"779_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2024.103438","volume":"183","author":"A Diglio","year":"2024","unstructured":"Diglio A, Mancuso A, Masone A, Sterle C (2024) Multi-echelon facility location models for the reorganization of the blood supply chain at regional scale. Transp Res E 183:103438. https:\/\/doi.org\/10.1016\/j.tre.2024.103438","journal-title":"Transp Res E"},{"key":"779_CR21","doi-asserted-by":"publisher","first-page":"473","DOI":"10.2147\/JMDH.S443674","volume":"17","author":"SA Elhaj","year":"2024","unstructured":"Elhaj SA, Odeh Y, Tbaishat D, Rjoop A, Mansour A, Odeh M (2024) Informing the state of process modeling and automation of blood banking and transfusion services through a systematic mapping study. J Multidiscip Healthc 17:473\u2013489. https:\/\/doi.org\/10.2147\/JMDH.S443674","journal-title":"J Multidiscip Healthc"},{"key":"779_CR22","doi-asserted-by":"publisher","first-page":"109899","DOI":"10.1016\/j.cie.2023.109899","volume":"188","author":"S Entezari","year":"2024","unstructured":"Entezari S, Abdolazimi O, Fakhrzad MB, Shishebori D, Ma J (2024) A Bi-objective stochastic blood type supply chain configuration and optimization considering time-dependent routing in post-disaster relief logistics. Comput Ind Eng 188:109899. https:\/\/doi.org\/10.1016\/j.cie.2023.109899","journal-title":"Comput Ind Eng"},{"key":"779_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107403","volume":"127","author":"N Mohamadi","year":"2024","unstructured":"Mohamadi N, Niaki ST, Taher M, Shavandi A (2024) An application of deep reinforcement learning and vendor-managed inventory in perishable supply chain management. Eng Appl Artif Intell 127:107403. https:\/\/doi.org\/10.1016\/j.engappai.2023.107403","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"779_CR24","doi-asserted-by":"publisher","first-page":"9986541","DOI":"10.1155\/2024\/9986541","volume":"2024","author":"AM Esfandabadi","year":"2024","unstructured":"Esfandabadi AM, Shishebori D, Fakhrzad MB, Zare HK (2024) A Two-Objective model for the multilevel supply chain of blood products with the approach of reducing the rate of contagion under the (COVID\u201019) epidemic outbreak conditions. J Math 2024(1):9986541. https:\/\/doi.org\/10.1155\/2024\/9986541","journal-title":"J Math"},{"key":"779_CR25","doi-asserted-by":"publisher","unstructured":"Jahin MA, Shovon MS, Shin J, Ridoy IA, Mridha MF Big Data\u2014Supply Chain Management Framework for Forecasting: Data Preprocessing and Machine Learning Techniques. Archives Comput Methods Eng 2024 Mar 24:1\u201327. https:\/\/doi.org\/10.1007\/s11831-024-10092-9","DOI":"10.1007\/s11831-024-10092-9"},{"key":"779_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127584","volume":"279","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Jagadish Kumar N, Ponnuviji NP, Praveen kumar B (Jun.2025) Safeguarding confidentiality and privacy in cloud-enabled healthcare systems with spectrasafe encryption and dynamic k-anonymity algorithm. Expert Syst Appl 279:127584. https:\/\/doi.org\/10.1016\/j.eswa.2025.127584","journal-title":"Expert Syst Appl"},{"issue":"2","key":"779_CR27","doi-asserted-by":"publisher","first-page":"635","DOI":"10.3837\/tiis.2025.02.014","volume":"19","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Prabaharan G, Valarmathi K, Sankar SMU, Sugumar R (2025) Safeguarding privacy by utilizing SC-D\u2113DA algorithm in cloud-enabled multi party computation. KSII Trans Internet Inf Syst TIIS 19(2):635\u2013656. https:\/\/doi.org\/10.3837\/tiis.2025.02.014","journal-title":"KSII Trans Internet Inf Syst TIIS"},{"issue":"04","key":"779_CR28","doi-asserted-by":"publisher","DOI":"10.4015\/S1016237224500601","volume":"37","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Srinivasan L, Selvaraj D, Anish TP (Feb.2025) A novel privacy preservation of healthcare data with information entropy-based multi-scheme fully homomorphic encryption and Rivest Shamir Adleman techniques. Biomed Eng Appl Basis Commun 2450060. https:\/\/doi.org\/10.4015\/S1016237224500601","journal-title":"Biomed Eng Appl Basis Commun"},{"issue":"3 & 4","key":"779_CR29","doi-asserted-by":"publisher","first-page":"227","DOI":"10.26421\/QIC24.3-4-3","volume":"24","author":"D Dhinakaran","year":"2024","unstructured":"Dhinakaran D, Srinivasan L, Udhaya Sankar SM, Selvaraj D (2024) Quantum-based privacy-preserving techniques for secure and trustworthy internet of medical things an extensive analysis. Quantum Inf Comput 24(3 & 4):227\u2013266. https:\/\/doi.org\/10.26421\/QIC24.3-4-3","journal-title":"Quantum Inf Comput"},{"key":"779_CR30","doi-asserted-by":"publisher","unstructured":"Maathavan KS, Venkatraman SA, Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment (2022) Intell Autom Soft Comput 32(2). https:\/\/doi.org\/10.32604\/iasc.2022.022276","DOI":"10.32604\/iasc.2022.022276"},{"issue":"5","key":"779_CR31","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s12083-021-01162-x","volume":"14","author":"M Masud","year":"2021","unstructured":"Masud M, Gaba GS, Choudhary K, Alroobaea R, Hossain MS (2021) A robust and lightweight secure access scheme for cloud based E-healthcare services. Peer-to-peer Netw Appl 14(5):3043\u20133057. https:\/\/doi.org\/10.1007\/s12083-021-01162-x","journal-title":"Peer-to-peer Netw Appl"},{"key":"779_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10723-4","author":"R Denis","year":"2021","unstructured":"Denis R, Madhubala P (2021) Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems . Multimedia Tools Appl 80(14):21165\u201321202. https:\/\/doi.org\/10.1007\/s11042-021-10723-4"},{"key":"779_CR33","doi-asserted-by":"publisher","first-page":"8820","DOI":"10.1109\/ACCESS.2021.3049564","volume":"9","author":"M Shabbank ir","year":"2021","unstructured":"Shabbank ir M, Shabbank ir A, Iwendi C, Javed AR, Rizwan M, Herencsar N, Lin JC (2021) Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access 9:8820\u20138834. https:\/\/doi.org\/10.1109\/ACCESS.2021.3049564","journal-title":"IEEE Access"},{"key":"779_CR34","doi-asserted-by":"publisher","unstructured":"Vedaraj M, Ezhumalai PA, Secure IoT-Cloud Based Healthcare System for Disease Classification Using Neural Network (2022) Comput Syst Sci Eng 41(1). https:\/\/doi.org\/10.32604\/csse.2022.019976","DOI":"10.32604\/csse.2022.019976"},{"issue":"4","key":"779_CR35","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/LNET.2022.3215248","volume":"4","author":"R Gupta","year":"2022","unstructured":"Gupta R, Saxena D, Gupta I, Singh AK (2022) Differential and triphase adaptive learning-based privacy-preserving model for medical data in cloud environment. IEEE Networking Lett 4(4):217\u2013221. https:\/\/doi.org\/10.1109\/LNET.2022.3215248","journal-title":"IEEE Networking Lett"},{"key":"779_CR36","doi-asserted-by":"publisher","unstructured":"Gupta R, Saxena D, Gupta I, Makkar A, Kumar Singh A (2022) Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications, in IEEE Networking Letters, vol. 4, no. 4, pp. 174\u2013178, Dec. https:\/\/doi.org\/10.1109\/LNET.2022.3200724","DOI":"10.1109\/LNET.2022.3200724"},{"key":"779_CR37","doi-asserted-by":"publisher","first-page":"33127","DOI":"10.1007\/s11042-021-11751-w","volume":"81","author":"AK Singh","year":"2022","unstructured":"Singh AK, Gupta R (2022) A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multimed Tools Appl 81:33127\u201333150. https:\/\/doi.org\/10.1007\/s11042-021-11751-w","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"779_CR38","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s00354-022-00185-z","volume":"40","author":"R Gupta","year":"2022","unstructured":"Gupta R, Singh AK (2022) A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment. New Gener Comput 40(3):737\u2013764. https:\/\/doi.org\/10.1007\/s00354-022-00185-z","journal-title":"New Gener Comput"},{"issue":"2","key":"779_CR39","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1109\/JSYST.2022.3218894","volume":"17","author":"R Gupta","year":"2023","unstructured":"Gupta R, Gupta I, Singh AK, Saxena D, Lee C-N (2023) An IoT-centric data protection method for preserving security and privacy in cloud. IEEE Syst J 17(2):2445\u20132454. https:\/\/doi.org\/10.1109\/JSYST.2022.3218894","journal-title":"IEEE Syst J"},{"issue":"1","key":"779_CR40","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s10586-022-03953-0","volume":"27","author":"X Wu","year":"2024","unstructured":"Wu X, Zhou W, Fei M, Du Y, Zhou H (2024) Banyan tree growth optimization and application. Cluster Comput 27(1):411\u2013441. https:\/\/doi.org\/10.1007\/s10586-022-03953-0","journal-title":"Cluster Comput"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00779-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00779-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00779-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T13:05:17Z","timestamp":1760015117000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00779-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["779"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00779-0","relation":{"references":[{"id-type":"doi","id":"10.1007\/s11042-021-10723-4","asserted-by":"subject"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"15 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"56"}}