{"id":"https://openalex.org/W4391822340","doi":"https://doi.org/10.1186/s13677-024-00606-y","title":"Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach","display_name":"Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach","publication_year":2024,"publication_date":"2024-02-14","ids":{"openalex":"https://openalex.org/W4391822340","doi":"https://doi.org/10.1186/s13677-024-00606-y"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-024-00606-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00606-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00606-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00606-y","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102581929","display_name":"Mohammad Zunnun Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammad Zunnun Khan","raw_affiliation_strings":["Department of Information Science and Cybersecurity, College of Computing and Information System, University of Bisha, P.O. Box 551, Bisha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Cybersecurity, College of Computing and Information System, University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064571230","display_name":"Mohd Shoaib","orcid":"https://orcid.org/0000-0002-0023-8620"},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohd Shoaib","raw_affiliation_strings":["Department of Computer Engineering, Zakir Husain College of Engineering and Technology, Aligarh Muslim University, Aligarh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Zakir Husain College of Engineering and Technology, Aligarh Muslim University, Aligarh, India","institution_ids":["https://openalex.org/I171210897"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056592935","display_name":"Mohd. Shahid Husain","orcid":"https://orcid.org/0000-0003-4864-9485"},"institutions":[{"id":"https://openalex.org/I4210114546","display_name":"College of Applied Sciences, Nizwa","ror":"https://ror.org/01xf31a71","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210114546"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Mohd Shahid Husain","raw_affiliation_strings":["College of Computing and Information Sciences, University of Technology and Applied Sciences, Ibri, Sultanate of Oman"],"affiliations":[{"raw_affiliation_string":"College of Computing and Information Sciences, University of Technology and Applied Sciences, Ibri, Sultanate of Oman","institution_ids":["https://openalex.org/I4210114546"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056683241","display_name":"Khair Ul Nisa","orcid":"https://orcid.org/0000-0001-8931-2374"},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khair Ul Nisa","raw_affiliation_strings":["Department of Computer Science and Artificial Intelligence, College of Computing and Information System,  University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","Department of Information Science and Cybersecurity, College of Computing and Information System, University of Bisha, P.O. Box 551, Bisha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intelligence, College of Computing and Information System,  University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]},{"raw_affiliation_string":"Department of Information Science and Cybersecurity, College of Computing and Information System, University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005804750","display_name":"Mohammad Tabrez Quasim","orcid":"https://orcid.org/0000-0002-5546-0405"},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad. Tabrez Quasim","raw_affiliation_strings":["Department of Computer Science and Artificial Intelligence, College of Computing and Information System,  University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","Department of Information Science and Cybersecurity, College of Computing and Information System, University of Bisha, P.O. Box 551, Bisha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intelligence, College of Computing and Information System,  University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]},{"raw_affiliation_string":"Department of Information Science and Cybersecurity, College of Computing and Information System, University of Bisha, P.O. Box 551, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102581929"],"corresponding_institution_ids":["https://openalex.org/I4210136004"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":9.9247,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.97924251,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"13","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8282331228256226},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8092930316925049},{"id":"https://openalex.org/keywords/topsis","display_name":"TOPSIS","score":0.7958860397338867},{"id":"https://openalex.org/keywords/analytic-hierarchy-process","display_name":"Analytic hierarchy process","score":0.6949615478515625},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6011470556259155},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34285640716552734},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.20754942297935486},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06545937061309814}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8282331228256226},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8092930316925049},{"id":"https://openalex.org/C51566761","wikidata":"https://www.wikidata.org/wiki/Q1235853","display_name":"TOPSIS","level":2,"score":0.7958860397338867},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.6949615478515625},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6011470556259155},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34285640716552734},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.20754942297935486},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06545937061309814},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-024-00606-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00606-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00606-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5f3fe264d06f4eaf9cb1be1e2495bc06","is_oa":true,"landing_page_url":"https://doaj.org/article/5f3fe264d06f4eaf9cb1be1e2495bc06","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-15 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-024-00606-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00606-y","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00606-y","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.5299999713897705}],"awards":[{"id":"https://openalex.org/G7456232015","display_name":null,"funder_award_id":"Fast-Track","funder_id":"https://openalex.org/F4320319621","funder_display_name":"University of Bisha"}],"funders":[{"id":"https://openalex.org/F4320319621","display_name":"University of Bisha","ror":"https://ror.org/040548g92"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4391822340.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W657448877","https://openalex.org/W1497439563","https://openalex.org/W2028065906","https://openalex.org/W2083547349","https://openalex.org/W2112360405","https://openalex.org/W2160458444","https://openalex.org/W2331663199","https://openalex.org/W2539957464","https://openalex.org/W2745062479","https://openalex.org/W2797551374","https://openalex.org/W3015421697","https://openalex.org/W3111874252","https://openalex.org/W3126344939","https://openalex.org/W3184766724","https://openalex.org/W4223957770","https://openalex.org/W4284967451","https://openalex.org/W4309676776","https://openalex.org/W4312854158","https://openalex.org/W4377969435","https://openalex.org/W4383272408","https://openalex.org/W4386307090","https://openalex.org/W4388719587","https://openalex.org/W4390050894","https://openalex.org/W6831979714"],"related_works":["https://openalex.org/W3006483227","https://openalex.org/W4235282010","https://openalex.org/W2142071684","https://openalex.org/W2385413488","https://openalex.org/W2355536739","https://openalex.org/W2322700324","https://openalex.org/W2295782676","https://openalex.org/W2351959113","https://openalex.org/W4381430929","https://openalex.org/W2191080415"],"abstract_inverted_index":{"Abstract":[0],"Cloud":[1,27,58],"computing":[2],"is":[3,51,238],"a":[4,38,96,147,183],"new":[5,9],"paradigm":[6],"in":[7,19,43,191],"this":[8,20,142,247],"cyber":[10],"era.":[11],"Nowadays,":[12],"most":[13],"organizations":[14],"are":[15,145],"showing":[16],"more":[17],"reliability":[18,24,84],"environment.":[21],"The":[22,90],"increasing":[23],"of":[25,45,85,138,195,201,255,267,284],"the":[26,57,81,86,103,109,117,123,139,193,196,202,210,229,249,253,256,265,273,279,285,290],"also":[28],"makes":[29],"it":[30],"vulnerable.":[31],"As":[32],"vulnerability":[33],"increases,":[34],"there":[35],"will":[36,216],"be":[37,207],"greater":[39],"need":[40],"for":[41,71,111,152,223],"privacy":[42,62,150,190,244,260,270,293],"terms":[44],"data,":[46],"and":[47,67,83,88,108,125,135,174,221,262,276],"utilizing":[48],"secure":[49],"services":[50],"highly":[52],"recommended.":[53],"So,":[54,70],"data":[55,149,189,197,243,259,269,292],"on":[56,122,177],"must":[59,74,206],"have":[60,75,92,155,181],"some":[61,128],"mechanisms":[63],"to":[64,79,94,98,116,228,233,288],"ensure":[65],"personal":[66],"organizational":[68],"privacy.":[69],"this,":[72,153],"we":[73,144,154,180,215],"an":[76,157],"authentic":[77],"way":[78,97],"increase":[80],"trust":[82],"organization":[87],"individuals":[89],"authors":[91],"tried":[93],"create":[95],"rank":[99,266,289],"things":[100],"that":[101,178,186,235],"uses":[102],"Analytical":[104,218],"Hieratical":[105,219],"Process":[106,220],"(AHP)":[107],"Technique":[110,222],"Order":[112,224],"Preference":[113,225],"by":[114,161,226],"Similarity":[115,227],"Ideal":[118,230],"Solution":[119,231],"(TOPSIS).":[120],"Based":[121,176],"result":[124],"comparison,":[126],"produce":[127],"hidden":[129],"advantages":[130],"named":[131],"cost,":[132],"benefit,":[133],"risk":[134],"opportunity-based":[136],"outcomes":[137],"result.":[140],"In":[141,246],"paper,":[143,248],"developing":[146],"cloud":[148,188,242,258,291],"model;":[151],"done":[156],"intensive":[158],"literature":[159],"review":[160],"including":[162],"Privacy":[163],"factors":[164],"such":[165],"as":[166,282],"Access":[167],"Control,":[168],"Authentication,":[169],"Authorization,":[170],"Trustworthiness,":[171],"Confidentiality,":[172],"Integrity,":[173],"Availability.":[175],"review,":[179],"chosen":[182],"few":[184],"parameters":[185],"affect":[187],"all":[192],"phases":[194],"life":[198],"cycle.":[199],"Most":[200],"already":[203],"available":[204],"methods":[205],"revised":[208],"per":[209],"industry\u2019s":[211],"current":[212],"trends.":[213],"Here,":[214],"use":[217],"method":[232,275,287],"prove":[234],"our":[236],"claim":[237],"better":[239],"than":[240],"other":[241],"models.":[245],"author":[250],"has":[251],"selected":[252],"weights":[254,281],"individual":[257,268],"criteria":[261,271],"further":[263],"calculated":[264],"using":[272],"AHP":[274],"subsequently":[277],"utilized":[278],"final":[280],"input":[283],"TOPSIS":[286],"criteria.":[294]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
