{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:06:33Z","timestamp":1772449593353,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"vor","delay-in-days":28,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00844-2","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T09:47:24Z","timestamp":1770025644000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards security and efficiency in distributed fitness recommendation with hashing"],"prefix":"10.1186","volume":"15","author":[{"given":"Fang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Maryam Saberi","family":"Anari","sequence":"additional","affiliation":[]},{"given":"Khosro","family":"Rezaee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"key":"844_CR1","doi-asserted-by":"crossref","unstructured":"Dou W, Tang W, Wu X, Qi L, Xu X, Zhang X, Hu C (2020) An insurance theory based optimal cyber-insurance contract against moral hazard. Inf Sci 527:576\u2013589.","DOI":"10.1016\/j.ins.2018.12.051"},{"key":"844_CR2","doi-asserted-by":"crossref","unstructured":"Qi L, Wang R, Hu C, Li S, He Q, Xu X (2019) Time-aware distributed service recommendation with privacy-preservation. Inf Sci 480:354\u2013364.","DOI":"10.1016\/j.ins.2018.11.030"},{"key":"844_CR3","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhou X, Kou H et al. (2024) Privacy-preserving point-of-interest recommendation based on simplified graph convolutional network for geological traveling. ACM Trans On Intell Syst And Technol 15(4):1\u201317.","DOI":"10.1145\/3620677"},{"key":"844_CR4","doi-asserted-by":"publisher","unstructured":"Qi L, Xie J, Hu C, Xu X, Xiang H, Dai H, Dou W (2025) Knowledge-driven reasoning for compatible and interpretable api recommendation via teacher llm distillation. ACM Trans Inf Syst. https:\/\/doi.org\/10.1145\/3771772.","DOI":"10.1145\/3771772"},{"issue":"2","key":"844_CR5","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TSUSC.2017.2733018","volume":"4","author":"F Fei","year":"2019","unstructured":"Fei F, Li S, Dai H, Hu C, Dou W, Ni Q (2019) A k-anonymity based schema for location privacy preservation. IEEE Trans Sustain Comput 4(2):156\u2013167.","journal-title":"IEEE Trans On Sustain Comput"},{"key":"844_CR6","doi-asserted-by":"crossref","unstructured":"Liu W, Chen C, Liao X et al. (2024) Learning accurate and bidirectional transformation via dynamic embedding transportation for cross-domain recommendation. In Proceedings of the AAAI Conference on Artificial Intelligence, vol 38. pp 8815\u20138823.","DOI":"10.1609\/aaai.v38i8.28728"},{"issue":"10","key":"844_CR7","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1109\/JSAC.2023.3310077","volume":"41","author":"L Qi","year":"2023","unstructured":"Qi L, Xu X, Wu X, Ni Q, Yuan Y, Zhang X (2023) Digital-twin-enabled 6g mobile network video streaming using mobile crowdsourcing. IEEE J On Sel Areas In Commun 41(10):3161\u20133174.","journal-title":"IEEE J On Sel Areas In Commun"},{"issue":"3","key":"844_CR8","doi-asserted-by":"publisher","first-page":"818","DOI":"10.26599\/TST.2023.9010051","volume":"29","author":"H Li","year":"2023","unstructured":"Li H, Sun M, Xia F, Xu X, Bilal M (2023) A survey of edge caching: key issues and challenges. Tsinghua Sci Technol 29(3):818\u2013842.","journal-title":"Tsinghua Sci Technol"},{"key":"844_CR9","doi-asserted-by":"crossref","unstructured":"Yang M, Huang L, Tang C (2023) K-means clustering with local distance privacy, big data mining and analytics 6(4):433\u2013442.","DOI":"10.26599\/BDMA.2022.9020050"},{"issue":"2","key":"844_CR10","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TCC.2015.2511764","volume":"8","author":"L Qi","year":"2020","unstructured":"Qi L, Dou W, Hu C, Zhou Y, Yu J (2020) A context-aware service evaluation approach over big data for cloud applications. IEEE Trans On Cloud Comput 8(2):338\u2013348.","journal-title":"IEEE Trans On Cloud Comput"},{"issue":"5s","key":"844_CR11","first-page":"1","volume":"12","author":"T Wu","year":"2016","unstructured":"Wu T, Dou W, Wu F, Tang S, Hu C, Chen J (2016) A deployment optimization scheme over multimedia big data for large-scale media streaming application. ACM Trans On Multimedia Comput, Commun, And Appl 12(5s):1\u201323.","journal-title":"ACM Trans On Multimedia Comput, Commun, And Appl"},{"issue":"4","key":"844_CR12","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.26599\/TST.2023.9010080","volume":"29","author":"A Alzu\u2019bi","year":"2024","unstructured":"Alzu\u2019bi A, Alomar A, Alkhaza\u2019leh S, Abuarqoub A, Hammoudeh M (2024) A review of privacy and security of edge computing in smart healthcare systems: issues, challenges, and research directions. Tsinghua Sci Technol 29(4):1152\u20131180.","journal-title":"Tsinghua Sci Technol"},{"key":"844_CR13","doi-asserted-by":"crossref","unstructured":"Yan R, Zheng Y, Yu N, Liang C (2023) Multi-smart meter data encryption scheme based on distributed differential privacy, big data mining and analytics 7(1):131\u2013141.","DOI":"10.26599\/BDMA.2023.9020008"},{"issue":"3","key":"844_CR14","doi-asserted-by":"publisher","first-page":"795","DOI":"10.26599\/TST.2023.9010052","volume":"29","author":"N Aung","year":"2023","unstructured":"Aung N, Dhelim S, Chen L, Ning H, Atzori L, Kechadi T (2023) Edge-enabled metaverse: the convergence of metaverse and mobile edge computing. Tsinghua Sci Technol 29(3):795\u2013805.","journal-title":"Tsinghua Sci Technol"},{"key":"844_CR15","doi-asserted-by":"crossref","unstructured":"Huang Y, Li YJ, Cai Z (2023) Security and privacy in metaverse: a comprehensive survey, big data mining and analytics 6(2):234\u2013247.","DOI":"10.26599\/BDMA.2022.9020047"},{"key":"844_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.101008","volume-title":"Application of sports wearable sensor based on edge computing in sports industry","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Liu H (2024) Application of sports wearable sensor based on edge computing in sports industry. Sensors, Measurement."},{"key":"844_CR17","doi-asserted-by":"crossref","unstructured":"Wang J, Yang Y, Liu H, Jiang L (2024) Enhancing the college and university physical education teaching and learning experience using virtual reality and particle swarm optimization. Soft Comput.","DOI":"10.1007\/s00500-025-11106-9"},{"key":"844_CR18","doi-asserted-by":"crossref","unstructured":"Thaokar CB, Dongre VV, Hiware HH (2023) Body posture recognition and fitness training. In 2023 OITS International Conference, IEEE.","DOI":"10.1109\/OCIT59427.2023.10430680"},{"key":"844_CR19","doi-asserted-by":"crossref","unstructured":"Alsalhy MJ, Ahmed I, Hussien NA et al. (2023) Application of wearable sensors in physical education for biomedical surveillance and human-machine interface. In 2023 Annual IEEE Conference, IEEE.","DOI":"10.1109\/AICERA\/ICIS59538.2023.10420331"},{"key":"844_CR20","doi-asserted-by":"crossref","unstructured":"Omarov B, Nurmash N et al. (2023) A novel deep neural network to analyze and monitoring the physical training relation to sports activities. J Comput Sci Appl.","DOI":"10.14569\/IJACSA.2023.0140977"},{"key":"844_CR21","doi-asserted-by":"crossref","unstructured":"Chariar M, Rao S, Irani A, Suresh S, CS (2023) Ai trainer: autoencoder based approach for squat analysis and correction. IEEE Access.","DOI":"10.1109\/ACCESS.2023.3316009"},{"key":"844_CR22","doi-asserted-by":"crossref","unstructured":"Xu C, Ren J, She L, Zhang Y, Qin Z, Ren K (2019) Edgesanitizer: locally differentially private deep inference at the edge for mobile data analytics. IEEE Internet Of Things J 6(3):5140\u20135151.","DOI":"10.1109\/JIOT.2019.2897005"},{"issue":"1","key":"844_CR23","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/JSYST.2022.3183153","volume":"17","author":"Z Gong","year":"2022","unstructured":"Gong Z, Li J, Lin Y, Wei J, Lancine C (2022) Efficient privacy-preserving geographic keyword boolean range query over encrypted spatial data. IEEE Syst J 17(1):455\u2013466.","journal-title":"IEEE Syst J"},{"issue":"2","key":"844_CR24","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/JSYST.2022.3197150","volume":"17","author":"W Gao","year":"2022","unstructured":"Gao W, Zhou J, Lin Y, Wei J (2022) Compressed sensing-based privacy preserving in labeled dynamic social networks. IEEE Syst J 17(2):2201\u20132212.","journal-title":"IEEE Syst J"},{"issue":"5","key":"844_CR25","doi-asserted-by":"publisher","first-page":"3550","DOI":"10.1109\/TSC.2023.3242338","volume":"16","author":"C Li","year":"2023","unstructured":"Li C, He A, Wen Y, Liu G, Chronopoulos AT (2023) Optimal trading mechanism based on differential privacy protection and stackelberg game in big data market. IEEE Trans On Serv Comput 16(5):3550\u20133563.","journal-title":"IEEE Trans On Serv Comput"},{"key":"844_CR26","doi-asserted-by":"crossref","unstructured":"Zhang P, Zhu H, Li W, Kim GJ (2023) Secure and efficient data transmission scheme based on physical mechanism, computers. Mater & Continua 75(2).","DOI":"10.32604\/cmc.2023.032097"},{"key":"844_CR27","volume-title":"Zero knowledge bi-party computation using oblivious transfers for recommender systems","author":"A Rajagopalan","year":"2024","unstructured":"Rajagopalan A, Singh K, Jayashrri B, John AE (2024) Zero knowledge bi-party computation using oblivious transfers for recommender systems. Europe PMC."},{"key":"844_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-024-12545-x","volume-title":"Ethical artificial intelligence for teaching-learning in higher education","author":"M Airaj","year":"2024","unstructured":"Airaj M (2024) Ethical artificial intelligence for teaching-learning in higher education. Education and Information Technologies."},{"key":"844_CR29","doi-asserted-by":"crossref","unstructured":"Liang J, Au A, Chen M, Chan C, Zheng J, DeVries Z (2024) Skeleton-based privacy-preserving smart activity sensor for senior care and patient monitoring, preprints.","DOI":"10.20944\/preprints202401.0108.v1"},{"key":"844_CR30","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-0502-7","volume-title":"Advanced applications of generative AI and Natural language processing models","author":"AJ Obaid","year":"2023","unstructured":"Obaid AJ, Bhushan B, Rajest S (2023) Advanced applications of generative AI and Natural language processing models. Google Books."},{"key":"844_CR31","doi-asserted-by":"crossref","unstructured":"Sandeepa C, Siniarski B, Wang S et al. (2023) Rec-def: a recommendation-based defence mechanism for privacy preservation in federated learning systems. IEEE Trans Knowl Data Eng.","DOI":"10.1109\/TCE.2023.3333560"},{"key":"844_CR32","unstructured":"Kazlouski A (2023) Mitigation of cyber attacks in wearable devices, Ph.D. thesis, National Technical University of Athens."},{"issue":"4","key":"844_CR33","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.26599\/TST.2023.9010086","volume":"29","author":"X Yang","year":"2024","unstructured":"Yang X, Esquivel JA (2024) Lstm network-based adaptation approach for dynamic integration in intelligent end-edge-cloud systems. Tsinghua Sci Technol 29(4):1219\u20131231.","journal-title":"Tsinghua Sci Technol"},{"issue":"4","key":"844_CR34","doi-asserted-by":"publisher","first-page":"443","DOI":"10.26599\/BDMA.2023.9020012","volume":"6","author":"Y Qu","year":"2023","unstructured":"Qu Y, Ma L, Ye W, Zhai X, Yu S, Li Y, Smith D (2023) Towards privacy-aware and trustworthy data sharing using blockchain for edge intelligence. Big Data Min And Analytics 6(4):443\u2013464. https:\/\/wsdream.github.io\/.","journal-title":"Big Data Min And Analytics"},{"key":"844_CR35","unstructured":"https:\/\/wsdream.github.io\/."},{"key":"844_CR36","doi-asserted-by":"crossref","unstructured":"Ajaegbu C (2021) An optimized item-based collaborative filtering algorithm. J Ambient Intel And Humanized Comput 12(12):10629\u201310636.","DOI":"10.1007\/s12652-020-02876-1"},{"key":"844_CR37","doi-asserted-by":"crossref","unstructured":"Fkih F (2022) Similarity measures for collaborative filtering-based recommender systems: review and experimental comparison. J King Saud Univ-Comput Inf Sci 34(9):7645\u20137669.","DOI":"10.1016\/j.jksuci.2021.09.014"},{"key":"844_CR38","doi-asserted-by":"crossref","unstructured":"Zheng Z, Li X, Tang M, Xie F, Lyu MR (2020) Web service qos prediction via collaborative filtering: a survey. IEEE Trans Serv Comput 15(4):2455\u20132472.","DOI":"10.1109\/TSC.2020.2995571"},{"key":"844_CR39","doi-asserted-by":"crossref","unstructured":"Tang M, Dai X, Cao B, Liu J (2015) Wswalker: a random walk method for qos-aware web service recommendation. In 2015 IEEE International Conference on Web Services, IEEE, pp. 591\u2013598.","DOI":"10.1109\/ICWS.2015.84"},{"key":"844_CR40","unstructured":"Qi L, Lin W, Zhang X, Dou W, Xu X, Chen J (2023) A correlation graph based approach for personalized and compatible web apis recommendation in mobile app development. IEEE Trans On Knowl And Data Eng 35(6):5444\u20135457."},{"key":"844_CR41","doi-asserted-by":"crossref","unstructured":"Gu R, Wang S, Dai H, Chen X, Wang Z, Bao W, Chen G (2024) Fluid-shuttle: efficient cloud data transmission based on serverless computing compression. IEEE\/ACM Trans On Netw 32(6):4554\u20134569.","DOI":"10.1109\/TNET.2024.3402561"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00844-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00844-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00844-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T10:36:00Z","timestamp":1772447760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00844-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,2]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["844"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00844-2","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,2]]},"assertion":[{"value":"23 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that there are no ethic issues in the submission.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"We consent for publication of our paper after acceptance.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"30"}}