{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:46:47Z","timestamp":1777704407772,"version":"3.51.4"},"reference-count":20,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T00:00:00Z","timestamp":1531353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10,27]]},"abstract":"<jats:p>When the current algorithm encrypts cloud computing user behavior data, it cannot effectively resist external attacks. When there are many feature data, the encryption performance is poor. To solve this problem, a secondary encryption algorithm for data based on coupled control game mechanism is proposed. The piecewise linear chaotic maps and Fibonacci sequence perturbations are utilized to obtain pseudo-random numbers and improve the key\u2019s mapping space, and can effectively defend against threats and attacks. Based on the piecewise linear chaotic map encryption algorithm, the discrete chaotic integrated map encryption algorithm based on the coupled control game mechanism is adopted. After group-based encryption, the user behavior feature data is mapped into the encryption source-optimization evolution structure, and encrypted mapping is performed piecewisely. The encrypted data is used as the seed-derived set in the coupled control game mechanism, and the competition mechanism is adopted to perform the second discrete chaotic optimization on the encrypted data. The encrypted data ciphertext with the lowest chaotic discrete coefficient and the best game performance is selected as the output results of the coupled control game. Experimental results show that the proposed algorithm can effectively improve the encryption performance and improve the operation security of cloud computing network.<\/jats:p>","DOI":"10.3233\/jifs-169751","type":"journal-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T13:33:11Z","timestamp":1531488791000},"page":"4309-4317","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Intelligent encryption algorithm for cloud computing user behavior feature data"],"prefix":"10.1177","volume":"35","author":[{"given":"Kai","family":"Ye","sequence":"first","affiliation":[{"name":"Zhengzhou Institute of Technology, Zhengzhou, China"}]},{"given":"M.","family":"Ng","sequence":"additional","affiliation":[{"name":"John Innes Ctr, Norwich Res Pk, Norwich, Norfolk, England"}]}],"member":"179","published-online":{"date-parts":[[2018,7,12]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1039\/C7CC00769H"},{"issue":"99","key":"e_1_3_1_3_2","first-page":"1","article-title":"Design and evaluation of a spintronic in-memory processing platform for non-volatile data encryption","author":"Angizi S.","year":"2017","unstructured":"AngiziS., HeZ. and BagherzadehN., Design and evaluation of a spintronic in-memory processing platform for non-volatile data encryption, IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsPP (99) (2017), 1\u20131.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2615870"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1080\/00387010.2015.1089447"},{"issue":"2","key":"e_1_3_1_6_2","first-page":"799","article-title":"EncryScation: An secure approach for data security using encryption and obfuscation techniques for IaaS and DaaS services in cloud environment","volume":"663","author":"Suthar K.","year":"2017","unstructured":"SutharK. and PatelJ., EncryScation: An secure approach for data security using encryption and obfuscation techniques for IaaS and DaaS services in cloud environment, Astrophysical Journal663 (2) (2017), 799\u2013807.","journal-title":"Astrophysical Journal"},{"issue":"99","key":"e_1_3_1_7_2","first-page":"1","article-title":"Chaotic constellation mapping for physical-layer data encryption in OFDM-PON","author":"Sultan A.","year":"2018","unstructured":"SultanA., YangX., HajomerA.A.E., et al., Chaotic constellation mapping for physical-layer data encryption in OFDM-PON, IEEE Photonics Technology LettersPP (99) (2018), 1\u20131.","journal-title":"IEEE Photonics Technology Letters"},{"issue":"2","key":"e_1_3_1_8_2","first-page":"277","article-title":"An encryption algorithm of double chaos with mutual feedback based on the features of social networks","volume":"38","author":"Yi C.Q.","year":"2016","unstructured":"YiC.Q., JiangJ.C. and XueY.B., An encryption algorithm of double chaos with mutual feedback based on the features of social networks, Computer Engineering and Science38 (2) (2016), 277\u2013283.","journal-title":"Computer Engineering and Science"},{"issue":"8","key":"e_1_3_1_9_2","first-page":"338","article-title":"Big data encryption to protect privacy data environment improvement and simulation of the algorithm","volume":"33","author":"Guo L.","year":"2016","unstructured":"GuoL., Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation33 (8) (2016), 338\u2013341.","journal-title":"Computer Simulation"},{"issue":"5","key":"e_1_3_1_10_2","first-page":"1537","article-title":"Data encryption algorithm of cloud-assisted WBAN using multi-valued and ambiguous attribute","volume":"33","author":"Zhang W.J.","year":"2016","unstructured":"ZhangW.J., WuC. and YuM.S., Data encryption algorithm of cloud-assisted WBAN using multi-valued and ambiguous attribute, Application Research of Computers33 (5) (2016), 1537\u20131541.","journal-title":"Application Research of Computers"},{"issue":"23","key":"e_1_3_1_11_2","first-page":"70","article-title":"Encryption algorithm based on hadoop and non-degenerate high-dimensional discrete hyperchaotic system","volume":"66","author":"Wen H.P.","year":"2017","unstructured":"WenH.P., QiS.M. and LuJ.H., Encryption algorithm based on hadoop and non-degenerate high-dimensional discrete hyperchaotic system, Acta Physica Sinica66 (23) (2017), 70\u201383.","journal-title":"Acta Physica Sinica"},{"issue":"99","key":"e_1_3_1_12_2","first-page":"1","article-title":"How to protect ADS-B: confidentiality framework and efficient realization based on staged identity-based encryption","author":"Baek J.","year":"2017","unstructured":"BaekJ., HableelE., ByonY.J., et al., How to protect ADS-B: confidentiality framework and efficient realization based on staged identity-based encryption, IEEE Transactions on Intelligent Transportation SystemsPP (99) (2017), 1\u201311.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1137\/110858835"},{"issue":"1","key":"e_1_3_1_14_2","first-page":"100","article-title":"&ITIn-silico &ITstudy of potential carboxylic acid derivatives as D-glutamate ligase inhibitors in &ITSalmonella typhi&IT","volume":"45","author":"Qadir M.I.","year":"2018","unstructured":"QadirM.I., MushtaqH. and MobeenT., &ITIn-silico &ITstudy of potential carboxylic acid derivatives as D-glutamate ligase inhibitors in &ITSalmonella typhi&IT, Kuwait Journal of Science45 (1) (2018), 100\u2013107.","journal-title":"Kuwait Journal of Science"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720502.2015.1123439"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2015.1085738"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.3934\/dcdss.2018022"},{"issue":"84611","key":"e_1_3_1_18_2","article-title":"Research on the phenomenon of chinese residents\u2019 spiritual contagion for the reuse of recycled water based on SC-IAT","volume":"9","author":"Fu H.","year":"2017","unstructured":"FuH. and LiuX., Research on the phenomenon of chinese residents\u2019 spiritual contagion for the reuse of recycled water based on SC-IAT, Water9 (84611) (2017).","journal-title":"Water"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjbs.2017.08.006"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.2.00028"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.2.00030"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169751","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169751","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:07Z","timestamp":1777455667000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,12]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10,27]]}},"alternative-id":["10.3233\/JIFS-169751"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169751","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,12]]}}}