{"id":"https://openalex.org/W4414994809","doi":"https://doi.org/10.1186/s13677-025-00779-0","title":"Integrating machine learning and encryption for effective data management in blood bank supply chains","display_name":"Integrating machine learning and encryption for effective data management in blood bank supply chains","publication_year":2025,"publication_date":"2025-10-09","ids":{"openalex":"https://openalex.org/W4414994809","doi":"https://doi.org/10.1186/s13677-025-00779-0"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-025-00779-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00779-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00779-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00779-0","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102935340","display_name":"K. Shankar","orcid":"https://orcid.org/0000-0002-2803-3846"},"institutions":[{"id":"https://openalex.org/I148776243","display_name":"Government of Tamil Nadu","ror":"https://ror.org/013hg1t45","country_code":"IN","type":"government","lineage":["https://openalex.org/I148776243"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K. M. Kirupa Shankar","raw_affiliation_strings":["Department of Computer Science and Engineering, Government College of Engineering, Salem, 636011, Tamilnadu, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Government College of Engineering, Salem, 636011, Tamilnadu, India","institution_ids":["https://openalex.org/I148776243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101975955","display_name":"V. Santhi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109528","display_name":"PSG INSTITUTE OF TECHNOLOGY AND APPLIED RESEARCH","ror":"https://ror.org/01sa9ng67","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109528"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Santhi","raw_affiliation_strings":["Department of Computer Science and Engineering, PSG College of Technology, Coimbatore, 641004, Tamilnadu, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, PSG College of Technology, Coimbatore, 641004, Tamilnadu, India","institution_ids":["https://openalex.org/I4210109528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102935340"],"corresponding_institution_ids":["https://openalex.org/I148776243"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35597694,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12735","display_name":"Blood donation and transfusion practices","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12735","display_name":"Blood donation and transfusion practices","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6104000210762024},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5741000175476074},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5540000200271606},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4269999861717224},{"id":"https://openalex.org/keywords/data-management","display_name":"Data management","score":0.41190001368522644},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3774999976158142},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3619999885559082},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.3580999970436096}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8026999831199646},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6104000210762024},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5741000175476074},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5540000200271606},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4984000027179718},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4269999861717224},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.41190001368522644},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3774999976158142},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3684000074863434},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3619999885559082},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.3580999970436096},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3499999940395355},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3273000121116638},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.3133000135421753},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C61455927","wikidata":"https://www.wikidata.org/wiki/Q1030529","display_name":"Blossom algorithm","level":3,"score":0.30730000138282776},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30230000615119934},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.28600001335144043},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26829999685287476},{"id":"https://openalex.org/C44104985","wikidata":"https://www.wikidata.org/wiki/Q492886","display_name":"Supply chain management","level":3,"score":0.25870001316070557},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-025-00779-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00779-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00779-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c555e9e966f44a5f8146d647dcb6b71e","is_oa":true,"landing_page_url":"https://doaj.org/article/c555e9e966f44a5f8146d647dcb6b71e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 14, Iss 1, Pp 1-28 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-025-00779-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-025-00779-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-025-00779-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414994809.pdf","grobid_xml":"https://content.openalex.org/works/W4414994809.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1805467904","https://openalex.org/W3119460354","https://openalex.org/W3138989185","https://openalex.org/W3158059720","https://openalex.org/W3205627313","https://openalex.org/W3214568582","https://openalex.org/W4223957770","https://openalex.org/W4232192625","https://openalex.org/W4280624485","https://openalex.org/W4284967451","https://openalex.org/W4292825803","https://openalex.org/W4296801856","https://openalex.org/W4309676776","https://openalex.org/W4312854158","https://openalex.org/W4313652645","https://openalex.org/W4380446234","https://openalex.org/W4381056754","https://openalex.org/W4387966466","https://openalex.org/W4388550569","https://openalex.org/W4391401938","https://openalex.org/W4392011277","https://openalex.org/W4392935849","https://openalex.org/W4393119892","https://openalex.org/W4393131345","https://openalex.org/W4393204154","https://openalex.org/W4395004640","https://openalex.org/W4395049634","https://openalex.org/W4399576973","https://openalex.org/W4399785965","https://openalex.org/W4404199054","https://openalex.org/W4407177223","https://openalex.org/W4408040372","https://openalex.org/W4409195401"],"related_works":[],"abstract_inverted_index":{"The":[0,93,163,252,282],"security":[1],"and":[2,22,40,56,114,121,178,194,215,221,236,241,265,297,313],"efficient":[3],"management":[4,247],"of":[5,14,25,68,106,171,289],"healthcare":[6,83,152,245,279,321],"data\u2014especially":[7],"in":[8,34,123,175,182,223,233,248,269,277],"blood":[9],"bank":[10],"supply":[11],"chains":[12],"are":[13],"paramount":[15],"importance":[16],"due":[17],"to":[18,59,102,141,186,210,244,263,303],"the":[19,26,72,96,104,107,146,155,207,227,273],"sensitive,":[20],"diverse,":[21],"time-critical":[23],"nature":[24],"information":[27],"involved.":[28],"Existing":[29],"approaches":[30],"frequently":[31],"fall":[32],"short":[33],"balancing":[35],"data":[36,63,91,124,143,212,246,280],"protection,":[37],"computational":[38],"efficiency,":[39],"compliance":[41,217],"with":[42,258],"privacy":[43],"regulations.":[44],"This":[45],"study":[46],"introduces":[47],"a":[48,131,168,173,179,238,286],"robust,":[49],"privacy-preserving":[50],"framework":[51,70,94,253],"that":[52],"integrates":[53],"AES-GCM":[54,259],"encryption":[55,260],"hash-block":[57],"storage":[58,74,88],"ensure":[60,119],"secure":[61,86,278],"cloud-based":[62,250,320],"handling.":[64],"A":[65],"novel":[66],"component":[67],"this":[69],"is":[71,135],"host-proof":[73],"feature":[75,139],"selector,":[76],"which":[77],"dynamically":[78],"identifies":[79],"sensitive":[80],"features":[81],"from":[82],"datasets":[84,153],"for":[85,319],"cloud":[87,224],"without":[89],"compromising":[90],"usability.":[92],"employs":[95],"Banyan":[97],"Tree":[98],"Growth":[99],"Optimization":[100],"algorithm":[101],"fine-tune":[103],"hyperparameters":[105],"XGBoost":[108,165],"classifier,":[109],"significantly":[110],"enhancing":[111],"prediction":[112],"accuracy":[113,170,288],"minimizing":[115],"processing":[116,183],"time.":[117],"To":[118],"trust":[120],"transparency":[122],"retrieval,":[125],"an":[126],"Integrity":[127],"Verification":[128],"Block":[129],"incorporating":[130],"Third-Party":[132],"Auditor":[133],"(TPA)":[134],"designed,":[136],"using":[137],"SVM-based":[138],"matching":[140],"validate":[142],"authenticity":[144],"within":[145,201],"cloud.":[147],"Experimental":[148],"evaluation":[149],"on":[150],"real-world":[151,249],"demonstrates":[154],"proposed":[156,228,283],"system\u2019s":[157,208],"high":[158],"effectiveness":[159,276],"across":[160],"multiple":[161],"metrics.":[162],"BTGO-optimized":[164],"model":[166,229,284],"achieved":[167,254,285],"classification":[169,256,287],"99%,":[172],"reduction":[174],"error":[176],"rate,":[177],"37%":[180],"improvement":[181],"time":[184],"compared":[185],"baseline":[187,292],"models.":[188],"Encryption":[189],"latency":[190,261,312],"averaged":[191],"0.23":[192],"s,":[193],"integrity":[195],"verification":[196,267],"via":[197],"TPA":[198],"was":[199],"completed":[200],"0.12":[202],"s.":[203],"These":[204],"results":[205],"highlight":[206],"ability":[209],"improve":[211],"reliability,":[213],"security,":[214],"regulatory":[216],"while":[218],"ensuring":[219],"scalability":[220],"efficiency":[222],"environments.":[225],"Overall,":[226],"addresses":[230],"critical":[231],"limitations":[232],"existing":[234],"solutions":[235],"offers":[237],"practical,":[239],"secure,":[240],"high-performance":[242],"approach":[243,308],"applications.":[251,322],"99.72%":[255],"accuracy,":[257],"reduced":[262],"0.23s":[264],"third-party":[266],"performed":[268],"under":[270],"0.12s,":[271],"validating":[272],"model\u2019s":[274],"real-time":[275,314],"management.":[281],"99.72%,":[290],"outperforming":[291],"methods":[293],"such":[294],"as":[295],"SVM":[296],"RF":[298],"by":[299],"over":[300],"6%.":[301],"Compared":[302],"similar":[304],"encryption-integrated":[305],"models,":[306],"our":[307],"demonstrated":[309],"2\u20133\u00d7":[310],"lower":[311],"verifiability,":[315],"confirming":[316],"its":[317],"suitability":[318]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
