{"id":"https://openalex.org/W4383370840","doi":"https://doi.org/10.1186/s13677-023-00474-y","title":"File processing security detection in multi-cloud environments: a process mining approach","display_name":"File processing security detection in multi-cloud environments: a process mining approach","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4383370840","doi":"https://doi.org/10.1186/s13677-023-00474-y"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00474-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00474-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00474-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00474-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100746436","display_name":"Xiaolu Zhang","orcid":"https://orcid.org/0009-0007-7508-0956"},"institutions":[{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaolu Zhang","raw_affiliation_strings":["Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China","institution_ids":["https://openalex.org/I74872605"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020062389","display_name":"Lei Cui","orcid":"https://orcid.org/0009-0009-8396-0325"},"institutions":[{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Cui","raw_affiliation_strings":["Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China","institution_ids":["https://openalex.org/I74872605"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038218694","display_name":"Wuqiang Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wuqiang Shen","raw_affiliation_strings":["Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China","institution_ids":["https://openalex.org/I74872605"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084761957","display_name":"Jijun Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jijun Zeng","raw_affiliation_strings":["Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China","institution_ids":["https://openalex.org/I74872605"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023705881","display_name":"Li Du","orcid":"https://orcid.org/0000-0003-2533-2426"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Du","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102001912","display_name":"Haoyang He","orcid":"https://orcid.org/0009-0000-3681-9841"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyang He","raw_affiliation_strings":["School of Control and Computer Engineering, North China Electric Power University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073321754","display_name":"Long Cheng","orcid":"https://orcid.org/0000-0003-1638-059X"},"institutions":[{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]},{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Long Cheng","raw_affiliation_strings":["Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China","School of Control and Computer Engineering, North China Electric Power University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Joint Laboratory on Cyberspace Security, China Southern Power Grid, Guangzhou, China","institution_ids":["https://openalex.org/I74872605"]},{"raw_affiliation_string":"School of Control and Computer Engineering, North China Electric Power University, Beijing, China","institution_ids":["https://openalex.org/I153473198"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100746436"],"corresponding_institution_ids":["https://openalex.org/I74872605"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":6.7156,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.96717535,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8442642092704773},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.788453221321106},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.49844789505004883},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49843716621398926},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4945540130138397},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.45301252603530884},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42804989218711853},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3345654606819153},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2042231261730194}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8442642092704773},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.788453221321106},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.49844789505004883},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49843716621398926},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4945540130138397},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45301252603530884},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42804989218711853},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3345654606819153},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2042231261730194},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-023-00474-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00474-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00474-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c12a2a20700648ba89fcedbd2c351662","is_oa":true,"landing_page_url":"https://doaj.org/article/c12a2a20700648ba89fcedbd2c351662","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-10 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00474-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00474-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00474-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323192","display_name":"China Southern Power Grid","ror":"https://ror.org/03hkh9419"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4383370840.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1536788850","https://openalex.org/W1974891604","https://openalex.org/W2121717903","https://openalex.org/W2396324716","https://openalex.org/W2397657997","https://openalex.org/W2526832688","https://openalex.org/W2772103904","https://openalex.org/W2785057828","https://openalex.org/W2922897133","https://openalex.org/W2955739827","https://openalex.org/W2965882148","https://openalex.org/W2979588709","https://openalex.org/W2994989988","https://openalex.org/W3016340377","https://openalex.org/W3032967604","https://openalex.org/W3035254752","https://openalex.org/W3035930083","https://openalex.org/W3036611291","https://openalex.org/W3082555471","https://openalex.org/W3109047411","https://openalex.org/W3165853173","https://openalex.org/W4205839677","https://openalex.org/W4214624181","https://openalex.org/W4243932450","https://openalex.org/W4283122125","https://openalex.org/W4289716624","https://openalex.org/W4292825863","https://openalex.org/W4294837652","https://openalex.org/W4308093210","https://openalex.org/W4309725909","https://openalex.org/W4318586189"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W4205923274","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W2593645431"],"abstract_inverted_index":{"Abstract":[0],"Cloud":[1],"computing":[2],"has":[3],"gained":[4],"popularity":[5],"in":[6,44,85,124,157],"recent":[7],"years,":[8],"but":[9],"with":[10],"its":[11,125,148],"rise":[12],"comes":[13],"concerns":[14],"about":[15],"data":[16,46,82],"security.":[17],"Unauthorized":[18],"access":[19],"and":[20,26,112,137,146],"attacks":[21],"on":[22],"cloud-based":[23],"data,":[24],"applications,":[25],"infrastructure":[27],"are":[28],"major":[29],"challenges":[30],"that":[31],"must":[32],"be":[33],"addressed.":[34],"While":[35],"machine":[36],"learning":[37],"algorithms":[38],"have":[39],"improved":[40],"intrusion":[41],"detection":[42,107,145],"systems":[43],"cloud":[45],"security,":[47],"they":[48],"often":[49],"fail":[50],"to":[51,63,80,150],"consider":[52],"the":[53,103,120,135],"entire":[54],"life":[55,127],"cycle":[56],"of":[57,119,139],"file":[58,83,95,122,143,155],"processing,":[59],"making":[60],"it":[61],"difficult":[62],"detect":[64],"certain":[65],"issues,":[66],"especially":[67],"insider":[68],"attacks.":[69],"To":[70],"address":[71],"these":[72],"limitations,":[73],"this":[74],"paper":[75],"proposes":[76],"a":[77,93,100,116],"novel":[78],"approach":[79,105],"analyzing":[81],"processing":[84,96,123],"multi-cloud":[86,101,158],"environments":[87],"using":[88],"process":[89,140],"mining.":[90],"By":[91],"generating":[92],"complete":[94],"event":[97],"log":[98],"from":[99,108],"environment,":[102],"proposed":[104],"enables":[106],"both":[109],"control":[110],"flow":[111],"performance":[113],"perspectives,":[114],"providing":[115],"deeper":[117],"understanding":[118],"underlying":[121],"full":[126],"cycle.":[128],"Through":[129],"our":[130],"case":[131],"study,":[132],"we":[133],"demonstrate":[134],"power":[136],"capabilities":[138],"mining":[141],"for":[142],"security":[144,156],"showcase":[147],"ability":[149],"provide":[151],"further":[152],"insights":[153],"into":[154],"environments.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
