{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:21:49Z","timestamp":1771701709068,"version":"3.50.1"},"reference-count":33,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060836","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:46:58Z","timestamp":1742953618000},"page":"719-738","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud"],"prefix":"10.32604","volume":"83","author":[{"given":"Tajinder","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Purushottam","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Sachin","family":"Lalar","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sandhya","family":"Bansal","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"672","article-title":"A new lightweight symmetric searchable encryption scheme for string identification","volume":"8","author":"Ghosh Ray","year":"2020","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"103760","DOI":"10.1016\/j.jnca.2023.103760","article-title":"Deep transfer learning for intrusion detection in industrial control networks: a comprehensive review","volume":"220","author":"Kheddar","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref3","article-title":"Hybrid public key encryption","author":"Barnes","year":"2022","journal-title":"Internet Research Task Force (IRTF)"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"8","DOI":"10.3390\/cryptography6010008","article-title":"A searchable encryption scheme with biometric authentication and authorization for cloud environments","volume":"6","author":"Mihailescu","year":"2022","journal-title":"Cryptography"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"6972","DOI":"10.1109\/TII.2022.3199944","article-title":"Privacy-preserving preselection for protected biometric identification using public-key encryption with keyword search","volume":"19","author":"Bauspie\u00df","year":"2023","journal-title":"IEEE Trans Ind Inform."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"e4108","DOI":"10.1002\/ett.4108","article-title":"Integrating encryption techniques for secure data storage in the cloud","volume":"33","author":"Seth","year":"2022","journal-title":"Trans Emerging Tel Tech"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"102580","DOI":"10.1016\/j.cose.2021.102580","article-title":"Cloud computing security: a survey of service-based models","volume":"114","author":"Khoda Parast","year":"2022","journal-title":"Comput Secur"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"102553","DOI":"10.1016\/j.cose.2021.102553","article-title":"Towards differential access control and privacy-preserving for secure media data sharing in the cloud","volume":"113","author":"Zheng","year":"2022","journal-title":"Comput Secur"},{"key":"ref9","first-page":"113","author":"Khan","year":"2024","journal-title":"Improving security, privacy, and trust in cloud computing"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TSC.2023.3327816","article-title":"Boolean searchable attribute-based signcryption with search results self-verifiability mechanism for data storage and retrieval in clouds","volume":"17","author":"Rao","year":"2024","journal-title":"IEEE Trans Serv Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"103603","DOI":"10.1016\/j.csi.2021.103603","article-title":"A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA","volume":"81","author":"Chenam","year":"2022","journal-title":"Comput Stand Interfaces"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s12652-022-03889-8","article-title":"Privacy-preserving multi-keyword hybrid search over encrypted data in cloud","volume":"15","author":"Singh","year":"2024","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref13","first-page":"62","article-title":"Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique","volume":"4","author":"Kousalya","year":"2023","journal-title":"Int J Intell Netw"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"353","DOI":"10.52783\/jes.776","article-title":"Privacy-preserving and ranked search using advanced multi-keyword scheme over the encrypted cloud environment","volume":"20","author":"Joshi","year":"2024","journal-title":"J Electr Syst"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.aej.2024.09.030","article-title":"TL-ABKS: traceable and lightweight attribute-based keyword search in edge-cloud assisted IoT environment","volume":"107","author":"Varri","year":"2024","journal-title":"Alex Eng J"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"133274","DOI":"10.1109\/ACCESS.2019.2941560","article-title":"R-PEKS: RBAC enabled PEKS for secure access of cloud data","volume":"7","author":"Rao","year":"2019","journal-title":"IEEE Access"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"39744","DOI":"10.1109\/JIOT.2024.3450192","article-title":"Encryption as a service (EaaS): introducing the full-cloud-fog architecture for enhanced performance and security","volume":"11","author":"Javadpour","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1080\/0952813X.2022.2135611","article-title":"Blockchain-based privacy preservation framework for healthcare data in cloud environment","volume":"36","author":"Verma","year":"2024","journal-title":"J Exp Theor Artif Intell"},{"key":"ref19","first-page":"1","article-title":"Identity-based integrity auditing scheme with sensitive information hiding for proxy-server-assisted cloud storage applications","author":"Hu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/OJCOMS.2024.3367461","article-title":"Attribute-based management of secure Kubernetes cloud bursting","volume":"5","author":"Femminella","year":"2024","journal-title":"IEEE Open J Commun Soc"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/OJCS.2024.3506114","article-title":"ECMO: an efficient and confidential outsourcing protocol for medical data","volume":"6","author":"Meng","year":"2024","journal-title":"IEEE Open J Comput Soc"},{"key":"ref22","first-page":"537","article-title":"A secure and efficient framework for multi-user encrypted cloud databases supporting single and multiple keyword searches","volume":"15","author":"Arundathi","year":"2024","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1108\/IJPCC-02-2022-0041","article-title":"Cloud-based secure data storage and access control for Internet of medical things using federated learning","volume":"20","author":"Bhansali","year":"2024","journal-title":"Int J Pervasive Comput Commun"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"8867","DOI":"10.1007\/s11042-023-15427-5","article-title":"A novel two phase data sensitivity based access control framework for healthcare data","volume":"83","author":"Saha","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"46","DOI":"10.3991\/ijoe.v20i02.45693","article-title":"Transforming healthcare data management: a blockchain-based cloud EHR system for enhanced security and interoperability","volume":"20","author":"Samala","year":"2024","journal-title":"Int J Onl Eng"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1007\/s12652-018-1093-8","article-title":"LR-HIDS: logistic regression host-based intrusion detection system for cloud environments","volume":"10","author":"Besharati","year":"2019","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"87322","DOI":"10.1109\/ACCESS.2022.3200084","article-title":"Autonomous path identity-based broadcast proxy re-encryption for data sharing in clouds","volume":"10","author":"Hu","year":"2022","journal-title":"IEEE Access"},{"key":"ref28","article-title":"Reinforcement-learning-based intrusion detection in communication networks: a review","author":"Kheddar","year":"2024","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/j.future.2023.11.017","article-title":"A novel verifiable Chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments","volume":"153","author":"Xie","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"e437","DOI":"10.7717\/peerj-cs.437","article-title":"Classification model for accuracy and intrusion detection using machine learning approach","volume":"7","author":"Agarwal","year":"2021","journal-title":"PeerJ Comput Sci"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"3168","DOI":"10.1109\/TIFS.2020.2985532","article-title":"Identity-based encryption transformation for flexible sharing of encrypted data in public cloud","volume":"15","author":"Deng","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1007\/s13198-023-01896-2","article-title":"Role-based access using partial homomorphic encryption for securing cloud data","volume":"14","author":"Saxena","year":"2023","journal-title":"Int J Syst Assur Eng Manag"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"e4960","DOI":"10.1002\/ett.4960","article-title":"A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment","volume":"35","author":"Zhou","year":"2024","journal-title":"Trans Emerging Tel Tech"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_60836\/TSP_CMC_60836.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:36:59Z","timestamp":1763102219000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060836","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}