References
- Ali, G., Ahmad, N., Cao, Y., Asif, M., Cruickshank, H., & Ali, Q. E. (2019). Blockchain based permission delegation and access control in internet of things (BACI). Computers & Security, 86, 318–334. https://doi.org/https://doi.org/10.1016/j.cose.2019.06.010
- Ananthi, M., Sabitha, R., Karthik, S., & Shanthini, J. (2020). FSS-SDD: Fuzzy-based semantic search for secure data discovery from outsourced cloud data. Soft Computing, 1-10. https://doi.org/https://doi.org/10.1007/s00500-020-04701-5
- Athollahi-Fard, A. M., Hajiaghaei-Keshteli, M., & Tavakkoli-Moghaddam, R. (2020). Red deer algorithm (RDA): A new nature-inspired meta-heuristic. Soft Computing, 24(19), 14637–14665. https://doi.org/https://doi.org/10.1007/s00500-020-04812-z
- Basu, S., Karp, A. H., Li, J., Pruyne, J., Rolia, J., Singhal, S., Suermondt, J., & Swaminathan, R. (2012). Fusion: Managing healthcare records at cloud scale. IEEE Computer, 45(11), 42–49. https://doi.org/https://doi.org/10.1109/MC.2012.291
- Breast Cancer Data Set. UCI Machine Repository. Retrieved October, 2020, from https://archive.ics.uci.edu/ml/datasets/breast+cancer
- Chu, C.-K., Chow, S. S. M., Tzeng, W.-G., Zhou, J., & Deng, R. H. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(2), 468–477. https://doi.org/https://doi.org/10.1109/TPDS.2013.112
- Dagher, G. G., Mohler, J., Milojkovic, M., & Marella, P. B. (2018). Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable Cities and Society, 39(1), 283–297. https://doi.org/https://doi.org/10.1016/j.scs.2018.02.014
- Dijk, M. V., & Juels, A. (2010). On the impossibility of cryptography alone for privacy-preserving cloud computing. Proceedings of 5th USENIX conference on Hot topics in security, 1-8, 10.
- Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102, 101653. https://doi.org/https://doi.org/10.1016/j.sysarc.2019.101653
- Engle, R. F., & Manganelli, S. (2004). CAViaR: Conditional autoregressive value at risk by regression quantiles. Journal of Business and Economic Statistics, 22(4), 367–381. https://doi.org/https://doi.org/10.1198/073500104000000370
- Gai, K., Choo, K. K. R., & Zhu, L. (2018). Blockchain-enabled reengineering of cloud datacenters. IEEE Cloud Computing, 5(6), 21–25. https://doi.org/https://doi.org/10.1109/MCC.2018.064181116
- Hayyolalam, V., & Kazem, A. A. P. (2020). Black widow optimization algorithm: A novel meta-heuristic approach for solving engineering optimization problems, Heart Disease Data Set, Engineering Applications of Artificial Intelligence, Retrieved October, 2020, from https://archive.ics.uci.edu/ml/datasets/heart+disease
- Khashan, O. A. (2020). Secure outsourcing and sharing of cloud data using a user-side encrypted file system. IEEE Access, 8, 210855–210867. https://doi.org/https://doi.org/10.1109/ACCESS.2020.3039163
- Lai, C., Pintus, A., & Serra, A. (2017). Using the web of data in semantic sensor networks. Conference on Complex, Intelligent, and Software Intensive Systems, 106–116.
- Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., & Shi, Y. (2021). An encrypted coverless information hiding method based on generative models. Information Sciences, 553, 19–30. https://doi.org/https://doi.org/10.1016/j.ins.2020.12.002
- Lin, C., He, D., Huang, X., Choo, K. K. R., & Vasilakos, A. V. (2018). BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of Network and Computer Applications, 116, 42–52. https://doi.org/https://doi.org/10.1016/j.jnca.2018.05.005
- Liu, X., Zhang, Y., Wang, B., & Yan, J. (2012). Mona: Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6), 1182–1191. https://doi.org/https://doi.org/10.1109/TPDS.2012.331
- Meng, X., Gao, X. Z., Lu, L., Liu, Y., & Zhang, H. (2016). A new bio-inspired optimisation algorithm: Bird Swarm Algorithm. Journal of Experimental and Theoretical Artificial Intelligence, 28(4), 673–687. https://doi.org/https://doi.org/10.1080/0952813X.2015.1042530
- Mohan, A., Bauer, D., Blough, D. M., Ahamad, M., Bamba, B., Krishnan, R., Liu, L., Mashima, D., & Palanisamy, B. (2009). A patient-centric, attribute-based, source-verifiable framework for health record sharing (Techreport). Georgia Institute of Technology.
- Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2019). Blockchain for secure ehrs sharing of mobile cloud based e-health systems. IEEE Access, 7, 66792–66806. https://doi.org/https://doi.org/10.1109/ACCESS.2019.2917555
- Parsopoulos, K. E., & Vrahatis, M. N. (2002). Particle swarm optimization method in multiobjective problems. Proceedings of the 2002 ACM symposium on Applied computing, 603–607. Madrid, Spain.
- Revathi, S. T., Ramaraj, N., & Chithra, S. (2020). Tracy–singh product and genetic whale optimization algorithm for retrievable data perturbation for privacy preserved data publishing in cloud computing. The Computer Journal, 63(2), 239–253. https://doi.org/https://doi.org/10.1093/comjnl/bxz101
- Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., & Xiang, Y. (2017). Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, 14(5), 463–477. https://doi.org/https://doi.org/10.1109/TDSC.2015.2484326
- Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2), 331–346. https://doi.org/https://doi.org/10.1109/TIFS.2018.2850312
- Sun, J., & Fang, Y. (2010). Cross-domain data sharing in distributed electronic health record systems. IEEE Transactions on Parallel and Distributed Systems, 21(6), 754–764. https://doi.org/https://doi.org/10.1109/TPDS.2009.124
- Sundareswaran, S., Squicciarini, A., & Lin, D. (2012). Ensuring distributed accountability for data sharing in the cloud. IEEE Transactions on Dependable and Secure Computing, 9(4), 556–568. https://doi.org/https://doi.org/10.1109/TDSC.2012.26
- Wang, S., Zhang, Y., & Zhang, Y. (2018). A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 6, 38437–38450. https://doi.org/https://doi.org/10.1109/ACCESS.2018.2851611
- Wang, X., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences, 486, 340–358. https://doi.org/https://doi.org/10.1016/j.ins.2019.02.049
- Wang, X., & Gao, S. (2020a). Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences, 539, 195–214. https://doi.org/https://doi.org/10.1016/j.ins.2020.06.030
- Wang, X., & Gao, S. (2020b). Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Information Sciences, 507, 16–36. https://doi.org/https://doi.org/10.1016/j.ins.2019.08.041
- Wei, G., Lu, R., & Shao, J. (2014). EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. Journal of Computer and System Sciences, 80(8), 1549–1562. https://doi.org/https://doi.org/10.1016/j.jcss.2014.04.021
- Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. CollaborateCom, 711–718.
- Xian, Y., & Wang, X. (2021). Fractal sorting matrix and its application on chaotic image encryption. Information Sciences, 547, 1154–1169. https://doi.org/https://doi.org/10.1016/j.ins.2020.09.055
- Yang, J. J., Li, J. Q., & Niu, Y. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43, 74–86. https://doi.org/https://doi.org/10.1016/j.future.2014.06.004
- Yang, X. S., & Deb, S. (2010). Engineering optimisation by cuckoo search. International Journal of Mathematical Modelling and Numerical Optimisation, 1(4), 330–343. https://doi.org/https://doi.org/10.1504/IJMMNO.2010.035430
- Zhang, R., & Liu, L. (2010). Security models and requirements for healthcare application clouds. IEEE CLOUD, 268–275.
- Zhang, X., Tang, Y., Cao, S., Huang, C., & Zheng, S. (2020). Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems. Journal of Information Security and Applications, 54, 102568. https://doi.org/https://doi.org/10.1016/j.jisa.2020.102568
- Zhang, Z., Chen, X., Ma, J., & Shen, J. (2020). SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted cyber-physical systems. Future Generation Computer Systems, 108, 1338–1349. https://doi.org/https://doi.org/10.1016/j.future.2018.01.025
- Zhu, L., Wu, Y., Gai, K., & Choo, K. K. R. (2019). Controllable and trustworthy blockchain-based cloud data management. Future Generation Computer Systems, 91(99), 527–535. https://doi.org/https://doi.org/10.1016/j.future.2018.09.019