{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T04:04:33Z","timestamp":1709265873044},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11277-021-09013-x","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T07:02:52Z","timestamp":1629788572000},"page":"2585-2601","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementing Integrity Assurance System for Big Data"],"prefix":"10.1007","volume":"122","author":[{"given":"Fawaz","family":"Alyami","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1320-4665","authenticated-orcid":false,"given":"Saad","family":"Almutairi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"issue":"3","key":"9013_CR1","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2500873","volume":"57","author":"G-H Kim","year":"2014","unstructured":"Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the Government sector. Communications of the ACM, 57(3), 78\u201385.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9013_CR2","first-page":"15","volume":"2","author":"A Nath","year":"2015","unstructured":"Nath, A. (2015). Big data security issues and challenges. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2(2), 15\u201320.","journal-title":"International Journal of Innovative Research in Advanced Engineering (IJIRAE)"},{"issue":"3","key":"9013_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.5121\/ijnsa.2014.6304","volume":"6","author":"VN Inukollu","year":"2014","unstructured":"Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security Issues associated with big data in cloud computing. International Journal of Network Security & Its Applications (IJNSA), 6(3), 45\u201356.","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"9013_CR4","doi-asserted-by":"crossref","unstructured":"Lebdaoui, S. El Hajji and Orhanou, G., \"Managing big data integrity,\" in 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 2016.","DOI":"10.1109\/ICEMIS.2016.7745332"},{"key":"9013_CR5","doi-asserted-by":"crossref","unstructured":"Liu, C., Ranjan, R., Zhang, X., Yang, C, Georgakopoulos, D, and Chen, J. (2013) \"Public Auditing for Big Data Storage in Cloud Computing - A Survey,\" 2013 IEEE 16th International Conference on Computational Science and Engineering.","DOI":"10.1109\/CSE.2013.164"},{"key":"9013_CR6","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., Membrey, C. de Laat, P., and Grosso, P., (2013) \u201cAddressing Big Data Issues in Scientific Data Infrastructure,\u201d in 2013 International Conference on Collaboration Technologies and Systems (CTS), San Diego, CA, USA.","DOI":"10.1109\/CTS.2013.6567203"},{"key":"9013_CR7","doi-asserted-by":"crossref","unstructured":"Lagoze, C. (2014). \u201cBig Data, data integrity, and the fracturing of the control zone.\u201d Big Data & Society, 1\u201311.","DOI":"10.1177\/2053951714558281"},{"key":"9013_CR8","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1016\/j.procs.2016.07.286","volume":"93","author":"AP Sing","year":"2016","unstructured":"Sing, A. P., & Pasupuleti, S. K. (2016). Optimized public auditing and data dynamics for data storage security in cloud computing. Procedia Computer Science, 93, 751\u2013759.","journal-title":"Procedia Computer Science"},{"key":"9013_CR9","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X. L., Chen, S., Xu, X., and Zhu, L., (2017) \"Blockchain-Based Data Integrity Service Framework for IoT Data,\" 2017 IEEE International Conference on Web Services (ICWS), pp. 468\u2013475.","DOI":"10.1109\/ICWS.2017.54"},{"issue":"1","key":"9013_CR10","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","volume":"16","author":"Y Li","year":"2019","unstructured":"Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., & Choo, K.-K.R. (2019). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing, 16(1), 72\u201383.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9013_CR11","unstructured":"Iarocci, N., \"Cerberus,\" 2016. [Online]. Available: python-cerberus.org."},{"key":"9013_CR12","doi-asserted-by":"publisher","unstructured":"Zhou, L., Fu, A., Yu, S., Su, M., & Kuang, B. (2018). Data integrity verification of the outsourced big data in the cloud environment. Journal of Network and Computer Applications. https:\/\/doi.org\/10.1016\/j.jnca.2018.08.003","DOI":"10.1016\/j.jnca.2018.08.003"},{"key":"9013_CR13","doi-asserted-by":"crossref","unstructured":"Mantzoukas, K., Kloukinas, C., & Spanoudakis, G. (2018). Monitoring Data Integrity in Big Data Analytics Services. IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 904\u2013907). IEEE.","DOI":"10.1109\/CLOUD.2018.00132"},{"key":"9013_CR14","doi-asserted-by":"crossref","unstructured":"Mukhtaj, K., Maozhen, L., Phillip, A., Gareth, T., & Junyong, L. (2014). Big Data Analytics on PMU Measurements. 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2014. p. 715\u2013719.","DOI":"10.1109\/FSKD.2014.6980923"},{"key":"9013_CR15","doi-asserted-by":"publisher","first-page":"26990","DOI":"10.1109\/ACCESS.2017.2776275","volume":"5","author":"S Peng","year":"2017","unstructured":"Peng, S., Zhou, F., & Wang, Q. (2017). Identity-based public multi-replica provable data possession. IEEE Access, 5, 26990\u201327001.","journal-title":"IEEE Access"},{"issue":"5","key":"9013_CR16","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1109\/TPDS.2017.2784423","volume":"29","author":"M Sookhak","year":"2018","unstructured":"Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2018). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distr. Syst, 29(5), 999\u20131012.","journal-title":"IEEE Trans Parallel Distr. Syst"},{"key":"9013_CR17","first-page":"012008","volume":"1574","author":"S Yin","year":"2020","unstructured":"Yin, S. (2020). Research on the detection algorithm of data integrity verification results in big data storage. J Phys: Conf Ser., 1574, 012008.","journal-title":"J Phys: Conf Ser."},{"issue":"3","key":"9013_CR18","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.35940\/ijeat.C5407.029320","volume":"9","author":"S Rai","year":"2020","unstructured":"Rai, S., & Sharma, A. (2020). Research perspective on security-based algorithm in big data concepts. International Journal of Engineering and Advanced Technology, 9(3), 2138\u20132143.","journal-title":"International Journal of Engineering and Advanced Technology"},{"key":"9013_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02723-3","author":"S Manimurugan","year":"2021","unstructured":"Manimurugan, S. (2021). IoT-fog-cloud model for anomaly detection using improved naive bayes and principal component analysis. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-02723-3","journal-title":"J Ambient Intell Human Comput"},{"key":"9013_CR20","doi-asserted-by":"publisher","first-page":"103261","DOI":"10.1016\/j.micpro.2020.103261","volume":"79","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan, S., Majdi, A.-Q., Mohmmed, M., Narmatha, C., & Varatharajan, R. (2020). \u00e2\u20ac\u0153Intrusion detection in network, adaptive neuro-fuzzy inference system-ANFIS, crow search optimization- CSO, NSL-KDD\". Microprocessors and Microsystems, 79, 103261. https:\/\/doi.org\/10.1016\/j.micpro.2020.103261","journal-title":"Microprocessors and Microsystems"},{"key":"9013_CR21","doi-asserted-by":"publisher","unstructured":"Narmatha, C., Eljack, S. M., Tuka, A. A. R. M., et al. (2020). A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI Images. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-020-02470-5","DOI":"10.1007\/s12652-020-02470-5"},{"key":"9013_CR22","doi-asserted-by":"publisher","unstructured":"Manimurugan, S., Almutairi, S., Aborokbah, M., Ganesan, S., Varatharajan, R. (2020). A review on advanced computational approaches on multiple sclerosis segmentation and classification. IET signal Processing, 14(6), 333\u2013341. https:\/\/doi.org\/10.1049\/iet-spr.2019.0543","DOI":"10.1049\/iet-spr.2019.0543"},{"key":"9013_CR23","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan, S., Almutairi, S., Mohammed Aborokbah, M., Ganesan, N. C. S., & Patan, R. (2020). Effective attack detection in internet of things smart environment using deep belief neural network. IEEE Access., 8, 77396\u201377404.","journal-title":"IEEE Access."},{"key":"9013_CR24","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1186\/s13638-019-1399-z","volume":"2019","author":"S Almutairi","year":"2019","unstructured":"Almutairi, S., Manimurugan, S., & Aborokbah, M. (2019). A new secure transmission scheme between senders and receiver using HVCHC without Any Loss. EURASIP Journal on Wireless Communications and Networking, 2019, 88. https:\/\/doi.org\/10.1186\/s13638-019-1399-z","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"2","key":"9013_CR25","doi-asserted-by":"publisher","first-page":"52","DOI":"10.21833\/ijaas.2017.02.010","volume":"4","author":"S Al-Mutairi","year":"2017","unstructured":"Al-Mutairi, S., & Manimurugan, S. (2017). The clandestine image transmission scheme to prevent from the intruders. International Journal of Advanced and Applied Sciences, 4(2), 52\u201360.","journal-title":"International Journal of Advanced and Applied Sciences"},{"issue":"1","key":"9013_CR26","first-page":"166","volume":"95","author":"S Manimurugan","year":"2017","unstructured":"Manimurugan, S., & Mutari, S. A. (2017). A novel secret image hiding technique for secure transmission. Journal of Theoretical and Applied Information Technology, 95(1), 166\u2013176.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"1","key":"9013_CR27","doi-asserted-by":"publisher","first-page":"26","DOI":"10.4018\/IJDCF.2015010102","volume":"7","author":"S Manimurugan","year":"2015","unstructured":"Manimurugan, S., & Narmatha, C. (2015). Secure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressions. International Journal of Digital Crime and Forensics (IJDCF), 7(1), 26\u201350.","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"issue":"8","key":"9013_CR28","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1179\/1743131X14Y.0000000078","volume":"62","author":"S Manimurugan","year":"2014","unstructured":"Manimurugan, S., Porkumaran, K., & Narmatha, C. (2014). The new block pixel sort algorithm for TVC encrypted medical image. Imaging Science Journal., 62(8), 403\u2013414.","journal-title":"Imaging Science Journal."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09013-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09013-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09013-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T15:26:09Z","timestamp":1642519569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09013-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["9013"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09013-x","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-485987\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,24]]},"assertion":[{"value":"16 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest, financial or otherwise.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"The authors confirm that the data supporting the findings of this research are available within the article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"Custom code.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"No animals\/humans were used for studies that are basis of this research.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}}]}}