Retraction

A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing

Paper Information

Record ID:
44978
Publication Date:
September 19, 2017
Retraction Date:
December 07, 2022 (3.0 years years ago)
Subjects:
Article Type:
Publisher:
Springer
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed

Citations (19)

19
Total Citations
4
Post-Retraction
(21.1%)
15
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
2 Within 30 days
2 Within 1 year
0 After 2+ years
695 Days since retraction (latest)
CDNA-CCS: Splitting and Compression Based Chaotic-DNA Cryptography Framework for Cloud Computing Security
J.R. Ancy Jero, Dr D.S. Misbha
Knowledge-Based Systems
Published: Nov 2024
1 citation
695 days after retraction
Secure query processing and optimization in cloud environment: a review
Divya VL, Job PA, Preetha Mathew K
Information Security Journal A Global Perspective
Published: Dec 2023
378 days after retraction
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
S. Prince Chelladurai, T. Rajagopalan
Computer Systems Science and Engineering Open Access
Published: Jan 2023
5 citations
25 days after retraction
Predicting Consumer Intention using Logistic regression by analyzing Social media data
T. Saravanan, D. Venkatesan
Unknown Journal
Published: Dec 2022
2 citations
9 days after retraction
An Empirical View of Genetic Machine Learning based on Evolutionary Learning Computations
M. Chandraprabha, Rajesh Kumar Dhanaraj
BENTHAM SCIENCE PUBLISHERS eBooks
Published: Nov 2022
1 citation
28 days before retraction
Cutting Edge Techniques of Adaptive Machine Learning for Image Processing and Computer Vision
P Sasikumar, T. Saravanan
BENTHAM SCIENCE PUBLISHERS eBooks
Published: Nov 2022
28 days before retraction
Transfer Learning Approach to Detect and Classify Glioma Tumors
Vinaya RM, Geeta C Mara
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)
Published: Mar 2022
2 citations
257 days before retraction
Investigation Of Comparison on Modified CNN Techniques to Classify Fake Face in Deepfake Videos
Abhishek Gowda S, N. Thillaiarasu
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)
Published: Mar 2022
11 citations
257 days before retraction
An IOT Driven Eyeball And Gesture-Controlled Smart Wheelchair System for Disabled Person
Rani.V Udaya, S Poojasree
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)
Published: Mar 2022
10 citations
257 days before retraction
Design of a Confidentiality Model Using Semantic-Based Information Segmentation (SBIS) and Scattered Storage in Cloud Computing
N. Thillaiarasu, Naveenbalaji Gowthaman, S. Chenthur Pandian
EAI/Springer Innovations in Communication and Computing
Published: Dec 2021
4 citations
357 days before retraction
Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML
S. Ranjithkumar, S. Chenthur Pandian
Computers, materials & continua/Computers, materials & continua (Print) Open Access
Published: Oct 2021
6 citations
422 days before retraction
Novel Heuristic Scheme to Enforce Safety and Confidentiality Using Feature-Based Encryption in Multi-cloud Environment (MCE)
N. Thillaiarasu, S. Chenthur Pandian, Naveenbalaji Gowthaman
EAI/Springer Innovations in Communication and Computing
Published: Oct 2021
5 citations
426 days before retraction
Comparative Analysis of Software Life Cycle Models
T. Saravanan, Sumit Jha, Gautam Sabharwal et al. (4 authors)
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
Published: Dec 2020
31 citations
719 days before retraction
An approach towards making Honey Encryption easily available
S. Nagraj, Apoorv Singh, Chandraket Singh et al. (4 authors)
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
Published: Dec 2020
2 citations
719 days before retraction
Crop Selection Using Data Analytics
Manish Kumar Sharma, Shashank Agrahari, Shivam Tyagi et al. (4 authors)
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
Published: Dec 2020
1 citation
719 days before retraction
Green Computing in Cloud Computing
Tanu Shree, Rajiv Kumar, Nikhil Kumar
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
Published: Dec 2020
11 citations
719 days before retraction
Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud
Ramesh Chandran, S. Rakesh Kumar, N. Gayathri
Wireless Personal Communications
Published: Apr 2020
6 citations
971 days before retraction
Private computation of the Schulze voting method over the cloud
Vijay Kumar Yadav, Anshul Anand, Shekhar Verma et al. (4 authors)
Cluster Computing
Published: Dec 2019
7 citations
1094 days before retraction
Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment
N. Thillaiarasu, S. Chenthur Pandian, V. Vijayakumar et al. (6 authors)
Wireless Networks
Published: Aug 2019
16 citations
1209 days before retraction
Quick Stats
Total Citations: 19
Years Since Retraction: 3.0 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Model for software quality evaluation with hesitant fuzzy u…
Journal of Intelligent & Fuzzy Systems • 57 citations
A consensus approach to multi-granular linguistic MCGDM wit…
Journal of Intelligent & Fuzzy Systems • 24 citations
Independent hesitant fuzzy group decision making methods wi…
Journal of Intelligent & Fuzzy Systems • 7 citations
HGPSO: An efficient scientific workflow scheduling in cloud…
Journal of Intelligent & Fuzzy Systems • 5 citations
A novel hash based feature descriptors for content based im…
Journal of Intelligent & Fuzzy Systems • 4 citations