Secure big data sharing with hybrid encryption and deep learning

Securing and efficiently sharing large-scale data is a significant challenge, particularly in blockchain environments where ensuring data integrity and access control is crucial. This study introduces an innovative security framework that combines attribute-based and identity-based encryption (IABHE...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of King Saud University. Computer and information sciences Jg. 37; H. 8; S. 216 - 29
Hauptverfasser: Siyal, Reshma, Long, Jun, Khan, Sajid Ullah, Ayouni, Sarra, Maddeh, Mohamed
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Cham Springer International Publishing 01.10.2025
Springer Nature B.V
Springer
Schlagworte:
ISSN:1319-1578, 2213-1248, 1319-1578
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Securing and efficiently sharing large-scale data is a significant challenge, particularly in blockchain environments where ensuring data integrity and access control is crucial. This study introduces an innovative security framework that combines attribute-based and identity-based encryption (IABHE), Honey Encryption, and a deep-learning-based attack detection system (SConvA-Net). The proposed model improves privacy, security, and trust in decentralized networks by employing an advanced encryption mechanism (IABHE + Honey Encryption) that provides fine-grained access control and improves resilience against cryptographic attacks. Furthermore, the SConvA-Net model enhances threat detection accuracy while minimizing false positives. By integrating these technologies, the framework reinforces blockchain-based data-sharing by ensuring confidentiality, authentication, and integrity. The performance evaluations indicate that the proposed approach outperforms conventional security methods in terms of encryption efficiency, cyber threat detection, and scalability. This study presents a robust, adaptable, and intelligent security solution for securing big data in blockchain ecosystems.
AbstractList Securing and efficiently sharing large-scale data is a significant challenge, particularly in blockchain environments where ensuring data integrity and access control is crucial. This study introduces an innovative security framework that combines attribute-based and identity-based encryption (IABHE), Honey Encryption, and a deep-learning-based attack detection system (SConvA-Net). The proposed model improves privacy, security, and trust in decentralized networks by employing an advanced encryption mechanism (IABHE + Honey Encryption) that provides fine-grained access control and improves resilience against cryptographic attacks. Furthermore, the SConvA-Net model enhances threat detection accuracy while minimizing false positives. By integrating these technologies, the framework reinforces blockchain-based data-sharing by ensuring confidentiality, authentication, and integrity. The performance evaluations indicate that the proposed approach outperforms conventional security methods in terms of encryption efficiency, cyber threat detection, and scalability. This study presents a robust, adaptable, and intelligent security solution for securing big data in blockchain ecosystems.
Abstract Securing and efficiently sharing large-scale data is a significant challenge, particularly in blockchain environments where ensuring data integrity and access control is crucial. This study introduces an innovative security framework that combines attribute-based and identity-based encryption (IABHE), Honey Encryption, and a deep-learning-based attack detection system (SConvA-Net). The proposed model improves privacy, security, and trust in decentralized networks by employing an advanced encryption mechanism (IABHE + Honey Encryption) that provides fine-grained access control and improves resilience against cryptographic attacks. Furthermore, the SConvA-Net model enhances threat detection accuracy while minimizing false positives. By integrating these technologies, the framework reinforces blockchain-based data-sharing by ensuring confidentiality, authentication, and integrity. The performance evaluations indicate that the proposed approach outperforms conventional security methods in terms of encryption efficiency, cyber threat detection, and scalability. This study presents a robust, adaptable, and intelligent security solution for securing big data in blockchain ecosystems.
ArticleNumber 216
Author Khan, Sajid Ullah
Ayouni, Sarra
Maddeh, Mohamed
Long, Jun
Siyal, Reshma
Author_xml – sequence: 1
  givenname: Reshma
  surname: Siyal
  fullname: Siyal, Reshma
  organization: School of Computer Science and Engineering, Central South University
– sequence: 2
  givenname: Jun
  surname: Long
  fullname: Long, Jun
  email: jlong@csu.edu.cn, khansajidmalik@gmail.com
  organization: School of Computer Science and Engineering, Central South University
– sequence: 3
  givenname: Sajid Ullah
  surname: Khan
  fullname: Khan, Sajid Ullah
  organization: Department of Information Systems, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University
– sequence: 4
  givenname: Sarra
  surname: Ayouni
  fullname: Ayouni, Sarra
  organization: Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University
– sequence: 5
  givenname: Mohamed
  surname: Maddeh
  fullname: Maddeh, Mohamed
  organization: College of Applied Computer Science, King Saud University
BookMark eNp9kMtKAzEUhoNUsNa-gKuA69FcJ5OdUrwUCi7UdTi5TDulzozJFOnbmzqiO7M5EL7_O4f_HE3arg0IXVJyTQlRN0nkxwvCZEEI0bwQJ2jKGOUFZaKaoCnlVBdUquoMzVPaZoiqUgpeTtHtS3D7GLBt1tjDADhtIDbtGn82wwZvDjY2HofWxUM_NF2LofXYh9DjXYDYZvACndawS2H-M2fo7eH-dfFUrJ4fl4u7VeF4xYZCl0Qy5mxNvdXaQWldYIJWvALlqPeCOC09WEeUqFmduTpQEWoBTNRalXyGlqPXd7A1fWzeIR5MB435_uji2kAcGrcLBiizvAxCWavE0aqssiUoXzFmGVTZdTW6-th97EMazLbbxzafbziTXEupucwUGykXu5RiqH-3UmKOxZuxeJOLN9_FG5FDfAyl_lhjiH_qf1JfnXGG9g
Cites_doi 10.32604/csse.2023.037545
10.1109/CISDA.2009.5356528
10.1016/j.dibe.2023.100128
10.1007/s10586-020-03222-y
10.1007/s44443-025-00021-6
10.1145/382912.382923
10.1109/TDSC.2023.3251345
10.23919/JCC.2020.09.002
10.1016/j.imu.2021.100624
10.32604/cmc.2023.045588
10.1109/TDSC.2023.3304890
10.1155/2022/7272405
10.1109/ACCESS.2020.3034260
10.1109/JIOT.2021.3085714
10.1109/JIOT.2023.3245531
10.1186/s40854-023-00490-6
10.1109/TVT.2024.3385916
10.7717/peerj-cs.259
10.1109/TIFS.2024.3367821
10.1109/TII.2022.3156111
10.1504/IJICS.2023.10055729
10.3390/sym13020227
10.1186/s40708-023-00184-w
10.1155/2022/1317626
10.3390/su151813887
10.1155/2022/7719036
ContentType Journal Article
Copyright The Author(s) 2025 corrected publication 2025
The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2025 corrected publication 2025
– notice: The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOA
DOI 10.1007/s44443-025-00093-4
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Technology Collection (via ProQuest SciTech Premium Collection)
ProQuest One
ProQuest Central
ProQuest Central Student
SciTech Premium Collection (via ProQuest)
ProQuest Computer Science Collection
Computer Science Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database


Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2213-1248
1319-1578
EndPage 29
ExternalDocumentID oai_doaj_org_article_a12b36e47bb7495da7b7b6a7d822b2a8
10_1007_s44443_025_00093_4
GrantInformation_xml – fundername: Princess Nourah Bint Abdulrahman University
  funderid: http://dx.doi.org/10.13039/501100004242
GroupedDBID --K
0R~
4.4
457
5VS
AAEDT
AAEDW
AAIKJ
AAJSJ
AALRI
AASML
AAXUO
AAYWO
ABEEZ
ABMAC
ACGFS
ACULB
ADBBV
ADEZE
ADVLN
AEXQZ
AFFHD
AFGXO
AFJKZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
APXCP
BCNDV
BGLVJ
C6C
CCPQU
EBS
FDB
GROUPED_DOAJ
IXB
K7-
KQ8
O-L
O9-
OK1
PHGZM
PHGZT
PIMPY
PQGLB
ROL
SES
SOJ
SSZ
XH2
AAQXK
AAYXX
ABWVN
AFKRA
AGQPQ
ARAPS
ASPBG
AVWKF
AZFZN
BENPR
CITATION
EJD
FEDTE
FGOYB
HCIFZ
HVGLF
HZ~
IPNFZ
M41
R2-
RIG
8FE
8FG
ABUWG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c382t-960522cbf1db99ca6bce241838a7c1dd40c95dabc074f2fbf1fe14ef4a24f9763
IEDL.DBID K7-
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001580618600007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1319-1578
IngestDate Mon Nov 10 19:21:33 EST 2025
Sat Nov 01 15:18:30 EDT 2025
Sat Nov 29 06:56:04 EST 2025
Thu Oct 30 01:16:02 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords Attack detection
Blockchain security
Deep stacked autoencoder
Z-score normalization
Siamese convolutional neural network
Multiple data security
Relief method
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c382t-960522cbf1db99ca6bce241838a7c1dd40c95dabc074f2fbf1fe14ef4a24f9763
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/3253955935?pq-origsite=%requestingapplication%
PQID 3253955935
PQPubID 7424686
PageCount 29
ParticipantIDs doaj_primary_oai_doaj_org_article_a12b36e47bb7495da7b7b6a7d822b2a8
proquest_journals_3253955935
crossref_primary_10_1007_s44443_025_00093_4
springer_journals_10_1007_s44443_025_00093_4
PublicationCentury 2000
PublicationDate 2025-10-01
PublicationDateYYYYMMDD 2025-10-01
PublicationDate_xml – month: 10
  year: 2025
  text: 2025-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: Amsterdam
PublicationTitle Journal of King Saud University. Computer and information sciences
PublicationTitleAbbrev J. King Saud Univ. Comput. Inf. Sci
PublicationYear 2025
Publisher Springer International Publishing
Springer Nature B.V
Springer
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
– name: Springer
References P Gupta (93_CR14) 2022; 18
T Nguyen (93_CR30) 2022; 6
B Jia (93_CR18) 2020; 17
Y Guo (93_CR12) 2024; 19
M Akhtar (93_CR1) 2023; 18
H Xie (93_CR44) 2024; 21
PR Bhaladhare (93_CR8) 2014; 1
MA Alohali (93_CR5) 2023; 46
93_CR42
MZ Al-Faiz (93_CR4) 2018; 1
93_CR49
Y Yu (93_CR46) 2023; 14
H Chen (93_CR9) 2023; 10
C Zhang (93_CR48) 2022; 18
Y Shi (93_CR35) 2023; 10
Z Feng (93_CR11) 2023; 9
93_CR33
93_CR36
S Wani (93_CR43) 2021; 13
AA Battah (93_CR7) 2020; 8
93_CR31
93_CR32
P Yadav (93_CR45) 2023; 32
J Wang (93_CR41) 2022; 12
S Sharma (93_CR34) 2023; 11
93_CR37
93_CR6
93_CR39
J McHugh (93_CR28) 2000; 3
S Krishnaveni (93_CR22) 2021; 24
S Jain (93_CR17) 2023; 124
L Zhang (93_CR47) 2022; 138
B Suresh (93_CR38) 2023; 9
A Albakri (93_CR3) 2023; 15
93_CR24
93_CR25
M Alam (93_CR2) 2021; 9
93_CR20
93_CR21
93_CR26
93_CR27
93_CR29
93_CR50
G Kapil (93_CR19) 2020; 6
93_CR13
XQ Wang (93_CR40) 2024; 22
93_CR10
R Kumar (93_CR23) 2023; 10
93_CR15
93_CR16
References_xml – volume: 9
  start-page: 128447
  year: 2021
  ident: 93_CR2
  publication-title: IEEE Access
– volume: 46
  start-page: 3583
  issue: 3
  year: 2023
  ident: 93_CR5
  publication-title: Comput Syst Sci Eng
  doi: 10.32604/csse.2023.037545
– volume: 32
  start-page: 284
  issue: 4
  year: 2023
  ident: 93_CR45
  publication-title: Inf Secur J
– volume: 1
  start-page: 396529
  year: 2014
  ident: 93_CR8
  publication-title: Adv Comput Eng
– ident: 93_CR39
  doi: 10.1109/CISDA.2009.5356528
– volume: 14
  start-page: 100128
  year: 2023
  ident: 93_CR46
  publication-title: Dev Built Environ
  doi: 10.1016/j.dibe.2023.100128
– ident: 93_CR49
– volume: 24
  start-page: 1761
  issue: 3
  year: 2021
  ident: 93_CR22
  publication-title: Clust Comput
  doi: 10.1007/s10586-020-03222-y
– ident: 93_CR27
  doi: 10.1007/s44443-025-00021-6
– volume: 3
  start-page: 262
  issue: 4
  year: 2000
  ident: 93_CR28
  publication-title: ACM Trans Inf Syst Secur (TISSEC)
  doi: 10.1145/382912.382923
– volume: 22
  start-page: 134
  issue: 1
  year: 2024
  ident: 93_CR40
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2023.3251345
– volume: 124
  start-page: 102917
  year: 2023
  ident: 93_CR17
  publication-title: Comput Secur
– volume: 11
  start-page: 15200
  year: 2023
  ident: 93_CR34
  publication-title: IEEE Access
– volume: 17
  start-page: 11
  issue: 9
  year: 2020
  ident: 93_CR18
  publication-title: China Commun
  doi: 10.23919/JCC.2020.09.002
– volume: 138
  start-page: 380
  year: 2022
  ident: 93_CR47
  publication-title: Futur Gener Comput Syst
– ident: 93_CR31
– ident: 93_CR36
  doi: 10.1016/j.imu.2021.100624
– ident: 93_CR26
  doi: 10.32604/cmc.2023.045588
– volume: 6
  start-page: 147
  issue: 3
  year: 2022
  ident: 93_CR30
  publication-title: J Cyber Secur Technol
– ident: 93_CR20
– volume: 21
  start-page: 4404
  issue: 5
  year: 2024
  ident: 93_CR44
  publication-title: IEEE Trans Dependable Secure Comput
  doi: 10.1109/TDSC.2023.3304890
– ident: 93_CR13
– ident: 93_CR32
  doi: 10.1155/2022/7272405
– volume: 1
  start-page: 42
  issue: 3
  year: 2018
  ident: 93_CR4
  publication-title: Iraqi J Inf Commun Technol
– volume: 8
  start-page: 196813
  year: 2020
  ident: 93_CR7
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3034260
– volume: 12
  start-page: 34
  issue: 1
  year: 2022
  ident: 93_CR41
  publication-title: J Cloud Comput
– volume: 10
  start-page: 1691
  issue: 3
  year: 2023
  ident: 93_CR9
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2021.3085714
– volume: 10
  start-page: 1123
  issue: 2
  year: 2023
  ident: 93_CR35
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2023.3245531
– volume: 9
  start-page: 81
  issue: 1
  year: 2023
  ident: 93_CR11
  publication-title: Financial Innov
  doi: 10.1186/s40854-023-00490-6
– ident: 93_CR24
– ident: 93_CR21
  doi: 10.1109/TVT.2024.3385916
– volume: 9
  start-page: 100508
  year: 2023
  ident: 93_CR38
  publication-title: Mach Learn Appl
– volume: 6
  start-page: 259
  year: 2020
  ident: 93_CR19
  publication-title: PeerJ Comput Sci
  doi: 10.7717/peerj-cs.259
– volume: 10
  start-page: 204
  issue: 3
  year: 2023
  ident: 93_CR23
  publication-title: J Big Data Secur
– ident: 93_CR37
– volume: 19
  start-page: 456
  year: 2024
  ident: 93_CR12
  publication-title: IEEE Trans Inf Forensic Secur
  doi: 10.1109/TIFS.2024.3367821
– ident: 93_CR6
– volume: 18
  start-page: 6872
  issue: 10
  year: 2022
  ident: 93_CR48
  publication-title: IEEE Trans Ind Inform
  doi: 10.1109/TII.2022.3156111
– ident: 93_CR29
– ident: 93_CR25
– ident: 93_CR50
– ident: 93_CR33
  doi: 10.1504/IJICS.2023.10055729
– volume: 13
  start-page: 227
  issue: 2
  year: 2021
  ident: 93_CR43
  publication-title: Symmetry
  doi: 10.3390/sym13020227
– volume: 18
  start-page: 61
  issue: 1
  year: 2023
  ident: 93_CR1
  publication-title: J Appl Secur Res
– ident: 93_CR16
  doi: 10.1186/s40708-023-00184-w
– ident: 93_CR42
  doi: 10.1155/2022/1317626
– volume: 15
  start-page: 13887
  issue: 18
  year: 2023
  ident: 93_CR3
  publication-title: Sustainability
  doi: 10.3390/su151813887
– volume: 18
  start-page: 432
  issue: 5
  year: 2022
  ident: 93_CR14
  publication-title: IEEE Trans Ind Inform
– ident: 93_CR15
– ident: 93_CR10
  doi: 10.1155/2022/7719036
SSID ssj0001765436
Score 2.3186817
Snippet Securing and efficiently sharing large-scale data is a significant challenge, particularly in blockchain environments where ensuring data integrity and access...
Abstract Securing and efficiently sharing large-scale data is a significant challenge, particularly in blockchain environments where ensuring data integrity...
SourceID doaj
proquest
crossref
springer
SourceType Open Website
Aggregation Database
Index Database
Publisher
StartPage 216
SubjectTerms Access control
Accuracy
Algorithms
Attack detection
Big Data
Blockchain
Blockchain security
Collaboration
Computer Imaging
Computer Science
Confidentiality
Cryptography
Data encryption
Data exchange
Data integrity
Database Management
Datasets
Deep learning
Deep stacked autoencoder
Efficiency
Encryption
Feature selection
Information sharing
Integrity
Machine Learning
Multiple data security
Neural networks
Original Paper
Pattern Recognition and Graphics
Performance evaluation
Privacy
Real time
Relief method
Security
Siamese convolutional neural network
Software Engineering/Programming and Operating Systems
Standard scores
Systems and Data Security
Theory of Computation
Threats
Vision
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQxcDCG1EoyAMbRMSPxMnGQ1QMqGIA1M3ys-1SqrYg9d9zdpLSIiEWMjony_rO9t3Z_u4QumAlodbC7ue4oAnXxicQZ9nE2sySXLvCxXI-b0-i1yv6_fJ5pdRXeBNWpQeugLtWhGqWQ09aC3DmrRJa6FwJC5ZNUxVpvqkoV4KpeLoiAmcyUosCS4fAvKwZM5E3x-EL15dZEkP6hK9ZpZi8f83j_HFJGm1Pdxdt104jvq0Gu4c23Hgf7TQFGXC9Pg_QTTw9d1iPBjg8_cSzoQo94nDaioeLwM7CIDpdxI0Cq7HF1rkJrmtHDA7Ra_fh5f4xqUskJIYVdJ5A_AEOlNGeWF2WRuXaOLDJBSuUMMRanpqAmTbgKXjqQc47wp3ninIPngg7Qq3x-9gdI5xTMOfEe8oV5y7Vhc9gbWrCtWM85aSNLhuI5KTKhCGXOY8joBIAlRFQydvoLqC4lAxZrGMD6FbWupV_6baNOo0OZL20ZpLRjIW0eSxro6tGL9-_fx_SyX8M6RRt0TBv4nO-DmrNpx_uDG2az_loNj2Pk_ALVL3cCA
  priority: 102
  providerName: Directory of Open Access Journals
Title Secure big data sharing with hybrid encryption and deep learning
URI https://link.springer.com/article/10.1007/s44443-025-00093-4
https://www.proquest.com/docview/3253955935
https://doaj.org/article/a12b36e47bb7495da7b7b6a7d822b2a8
Volume 37
WOSCitedRecordID wos001580618600007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: DOA
  dateStart: 20250101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: K7-
  dateStart: 20250301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: BENPR
  dateStart: 20250301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2213-1248
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001765436
  issn: 1319-1578
  databaseCode: PIMPY
  dateStart: 20250301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LTxsxEB6Vx4FLaQuoARr50FuxiB-73j2VUoFaqY2iqiA4WX4GLkmapEj8-46Nlwik9tI9eq3VaOfhb2Y8MwDvRcu492j9glScSusiRT_LU-8rz2obmpDH-Vx-U8Nhc3XVjkrAbVGuVXY2MRtqP3UpRn4seCVStzRRfZz9omlqVMqulhEaa7DBOBrhlJRVdBVjUalysi61MrliTuKTEpcVzc48lU_Oo9y2_wnWfJYezafO-fb_0vsKXha8ST49CMhreBEmb2C7m-VAimrvwEkOvAdib8ck3RolixuTSCIpUEtu7lNhF8Gt8_tsY4iZeOJDmJEydmK8CxfnZz8_f6FlugJ1ouFLiq4LYi9nI_O2bZ2prQt4nDeiMcox7-XAtZU31iHIiDzivhiYDFEaLiOCGLEH65PpJLwFUnNEAixGLo2UYWCbWKFaWyZtEHIgWQ8-dP9Yzx6aaOjHdsmZIxo5ojNHtOzBaWLD487UADsvTOdjXfRJG8atqFHArFUy0amssrVRHgGP5abpwWHHFl20cqFXPOnBUcfY1eu_k7T_768dwBZPIpXv-B3C-nL-O7yDTXe3vF3M-7BxejYc_ehnd7-fJRTXRl-_j67_AHO469I
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB6VggSXtrxESik-wAks4seudw9VgULVKiHiUFBvxs-0lyQkAZQ_1d_YsbPbqJXg1gN73LUsr_3NN-OxZwbglagZ9x7ZL0jFqbQuUtxneep94VlpQxVyOZ_vfTUYVKen9dc1uGhjYdK1ypYTM1H7sUs-8neCFyJlSxPF_uQnTVWj0ulqW0JjCYteWPzBLdts7_gTru9rzg8_nxwc0aaqAHWi4nOKJjvaHM5G5m1dO1NaF1CNVaIyyjHvZdfVhTfWoXKNPGK7GJgMURouIypvgf3egbtSVCrJVU_RlU9HpUjNsonNyRF6Ep90UFrQ7Dyg8pr-y2UCrtm2N45js5Y73Pzf5mcLNhp7mnxYCsBDWAujR7DZ1qogDXU9hvf5YCEQez4k6VYsmZ2ZNAUkOaLJ2SIFrhFsOl1kDiVm5IkPYUKashrDJ_DtVv7jKayPxqPwDEjJ0dJhMXJppAxdW8UCacsyaYOQXck68KZdUz1ZJgnRV-mgMwI0IkBnBGjZgY9p2a9apgTf-cV4OtQNX2jDuBUlCpC1SqZxKqtsaZRHg85yU3Vgp4WBblhnplcY6MDbFkirz38f0va_e3sJ949OvvR1_3jQew4PeIJzvs-4A-vz6a_wAu653_Pz2XQ3ywOBH7cNsEsickcR
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+big+data+sharing+with+hybrid+encryption+and+deep+learning&rft.jtitle=Journal+of+King+Saud+University.+Computer+and+information+sciences&rft.au=Siyal%2C+Reshma&rft.au=Long%2C+Jun&rft.au=Khan%2C+Sajid+Ullah&rft.au=Ayouni%2C+Sarra&rft.date=2025-10-01&rft.pub=Springer+Nature+B.V&rft.eissn=1319-1578&rft.volume=37&rft.issue=8&rft.spage=216&rft_id=info:doi/10.1007%2Fs44443-025-00093-4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1319-1578&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1319-1578&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1319-1578&client=summon