1.
K. Solomon Doss and S. Kamalakkannan, “Hybrid optimization-based privacy preservation of database publishing in cloud environment,” Concurr Comput, vol. 34, no. 11, May 2022, doi: 10.1002/cpe.6844.
2.
R. T. Moreno, J. Garcia-Rodriguez, J. B. Bernabe, and A. Skarmeta, “A Trusted Approach for Decentralised and Privacy-Preserving Identity Management,” IEEE Access, vol. 9, pp. 105788–105804, 2021, doi: 10.1109/ACCESS.2021.3099837.
3.
X. Ma, J. Ma, H. Li, Q. Jiang, and S. Gao, “ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks,” Future Generation Computer Systems, vol. 79, pp. 82–94, Feb. 2018, doi: 10.1016/J.FUTURE.2017.09.060.
4.
L. Xu, T. Bao, L. Zhu, and Y. Zhang, “Trust-based privacy-preserving photo sharing in online social networks,” IEEE Trans Multimedia, vol. 21, no. 3, pp. 591–602, Mar. 2019, doi: 10.1109/TMM.2018.2887019.
5.
L. Guo, C. Zhang, and Y. Fang, “A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks,” IEEE Trans Dependable Secure Comput, vol. 12, no. 4, pp. 413–427, Jul. 2015, doi: 10.1109/TDSC.2014.2355824.
6.
Y. Pu, T. Xiang, C. Hu, A. Alrawais, and H. Yan, “An efficient blockchain-based privacy preserving scheme for vehicular social networks,” Inf Sci (N Y), vol. 540, pp. 308–324, Nov. 2020, doi: 10.1016/J.INS.2020.05.087.
7.
Z. Geng, Y. He, C. Wang, G. Xu, K. Xiao, and S. Yu, “A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service,” IEEE International Conference on Communications, Jun. 2021, doi: 10.1109/ICC42927.2021.9500841.
8.
P. Sharma, R. Jindal, and M. D. Borah, “Blockchain-based decentralized architecture for cloud storage system,” Journal of Information Security and Applications, vol. 62, p. 102970, Nov. 2021, doi: 10.1016/J.JISA.2021.102970.
9.
H. Cheng, C. Rong, M. Qian, and W. Wang, “Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption,” IEEE Access, vol. 6, pp. 37869–37882, Jun. 2018, doi: 10.1109/ACCESS.2018.2851599.
10.
M. Vivekanandan, V. N. Sastry, and U. Srinivasulu Reddy, “Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment,” Peer Peer Netw Appl, vol. 14, no. 3, pp. 1572–1595, May 2021, doi: 10.1007/S12083-020-01065-3/FIGURES/11.
11.
H. Al-Balasmeh, M. Singh, and R. Singh, “Framework of data privacy preservation and location obfuscation in vehicular cloud networks,” Concurr Comput, vol. 34, no. 5, p. e6682, Feb. 2022, doi: 10.1002/CPE.6682.
12.
M. Kumar et al., “A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm,” Scientific Reports 2023 13:1, vol. 13, no. 1, pp. 1–17, Apr. 2023, doi: 10.1038/s41598-023-32098-2.
13.
A. K. Singh and R. Gupta, “A privacy-preserving model based on differential approach for sensitive data in cloud environment,” Multimed Tools Appl, vol. 81, no. 23, pp. 33127–33150, Sep. 2022, doi: 10.1007/S11042-021-11751-W/TABLES/10.
14.
M. Firdaus and K. H. Rhee, “A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13720 LNCS, pp. 156–167, Aug. 2022, doi: 10.1007/978-3-031-25659-2_12.
15.
P. Silva, C. Gonçalves, N. Antunes, M. Curado, and B. Walek, “Privacy risk assessment and privacy-preserving data monitoring,” Expert Syst Appl, vol. 200, p. 116867, Aug. 2022, doi: 10.1016/J.ESWA.2022.116867.
16.
J. Kaushal, “Research on Privacy-Preserving Technology for Cloud Computing,” International Journal of Scientific Research & Engineering Trends, vol. 8, pp. 2395–566.
17.
J. Yogesh Deshmukh, S. K. Yadav, and G. M. Bhandari, “Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing,” Mater Today Proc, vol. 80, pp. 1786–1791, Jan. 2023, doi: 10.1016/J.MATPR.2021.05.609.
18.
N. R. Nayak, A. Kumar, S. Ray, and A. K. Tamrakar, “Blockchain-Based Cloud Resource Allocation Mechanism for Privacy Preservation.” EasyChair, Feb. 14, 2023.
19.
Y. Xu, M. Xiao, J. Wu, H. Tan, and G. Gao, “A Personalized Privacy Preserving Mechanism for Crowdsourced Federated Learning,” IEEE Trans Mob Comput, pp. 1–17, Jan. 2023, doi: 10.1109/TMC.2023.3237636.
20.
M. Zhang, M. Yang, G. Shen, Z. Xia, and Y. Wang, “A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things,” Inf Sci (N Y), vol. 623, pp. 293–310, Apr. 2023, doi: 10.1016/J.INS.2022.11.169.
21.
M. A. El-Shorbagy and A. M. El-Refaey, “Hybridization of Grasshopper Optimization Algorithm with Genetic Algorithm for Solving System of Non-Linear Equations,” IEEE Access, vol. 8, pp. 220944–220961, 2020, doi: 10.1109/ACCESS.2020.3043029.
22.
A. G. Gad, “Particle Swarm Optimization Algorithm and Its Applications: A Systematic Review,” Archives of Computational Methods in Engineering 2022 29:5, vol. 29, no. 5, pp. 2531–2561, Apr. 2022, doi: 10.1007/S11831-021-09694-4.
23.
L. M. R. Rere, M. I. Fanany, and A. M. Arymurthy, “Simulated Annealing Algorithm for Deep Learning,” Procedia Comput Sci, vol. 72, pp. 137–144, Jan. 2015, doi: 10.1016/J.PROCS.2015.12.114.
24.
N. Nayar, S. Gautam, P. Singh, and G. Mehta, “Ant Colony Optimization: A Review of Literature and Application in Feature Selection,” Lecture Notes in Networks and Systems, vol. 173 LNNS, pp. 285–297, 2021, doi: 10.1007/978-981-33-4305-4_22/COVER.
25.
M. Dubey, V. Kumar, M. Kaur, and T. P. Dao, “A Systematic Review on Harmony Search Algorithm: Theory, Literature, and Applications,” Math Probl Eng, vol. 2021, 2021, doi: 10.1155/2021/5594267.
26.
M. F. Ahmad, N. A. M. Isa, W. H. Lim, and K. M. Ang, “Differential evolution: A recent review based on state-of-the-art works,” Alexandria Engineering Journal, vol. 61, no. 5, pp. 3831–3872, May 2022, doi: 10.1016/J.AEJ.2021.09.013.
27.
L. Shen, J. Li, Y. Wu, Z. Tang, and Y. Wang, “Optimization of Artificial Bee Colony Algorithm Based Load Balancing in Smart Grid Cloud,” 2019 IEEE PES Innovative Smart Grid Technologies Asia, ISGT 2019, pp. 1131–1134, May 2019, doi: 10.1109/ISGT-ASIA.2019.8881232.
28.
S. Saremi, S. Mirjalili, and A. Lewis, “Grasshopper Optimisation Algorithm: Theory and application,” Advances in Engineering Software, vol. 105, pp. 30–47, Mar. 2017, doi: 10.1016/J.ADVENGSOFT.2017.01.004.
29.
A. Praveena and B. Bharathi, “An approach to remove duplication records in healthcare dataset based on Mimic Deep Neural Network (MDNN) and Chaotic Whale Optimization (CWO),” Concurr Eng Res Appl, vol. 29, no. 1, pp. 58–67, Mar. 2021, doi: 10.1177/1063293X21992014/ASSET/IMAGES/LARGE/10.1177_1063293X21992014-FIG6.JPEG.
30.
A. Ahmad et al., “Toward modeling and optimization of features selection in Big Data based social Internet of Things,” Future Generation Computer Systems, vol. 82, pp. 715–726, May 2018, doi: 10.1016/J.FUTURE.2017.09.028.
31.
S. Jiang, J. Cao, H. Wu, K. Chen, and X. Liu, “Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems,” Inf Sci (N Y), vol. 635, pp. 72–85, Jul. 2023, doi: 10.1016/J.INS.2023.03.121.
32.
Dikshit Pratyush, Sengupta Jayasree, Bajpai Vaibhav, “Recent Trends on Privacy-Preserving Technologies under Standardization at the IETF,” ACM SIGCOMM Computer Communication Review, vol. 53, no. 2, pp. 22–30, Jul. 2023, doi: 10.1145/3610381.3610385.
33.
Y. Meraihi, A. B. Gabis, S. Mirjalili, and A. Ramdane-Cherif, “Grasshopper optimization algorithm: Theory, variants, and applications,” IEEE Access, vol. 9, pp. 50001–50024, 2021, doi: 10.1109/ACCESS.2021.3067597.
34.
S. Kumar, M. K. Chaube, S. N. Nenavath, S. K. Gupta, and S. K. Tetarave, “Privacy preservation and security challenges: a new frontier multimodal machine learning research,” International Journal of Sensor Networks, vol. 39, no. 4, pp. 227–245, 2022, doi: 10.1504/IJSNET.2022.125113.