{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:42:26Z","timestamp":1726188146076},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031250873"},{"type":"electronic","value":"9783031250880"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25088-0_31","type":"book-chapter","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T14:06:45Z","timestamp":1676383605000},"page":"348-358","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Factors Influencing Security Issues in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Vanshika","family":"Maheshwari","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9183-2237","authenticated-orcid":false,"given":"Subrata","family":"Sahana","sequence":"additional","affiliation":[]},{"given":"Sanjoy","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0761-0878","authenticated-orcid":false,"given":"Indrani","family":"Das","sequence":"additional","affiliation":[]},{"given":"Ankush","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,15]]},"reference":[{"key":"31_CR1","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology. Information Technology Laboratory, Version, 15(10.07) (2009)"},{"key":"31_CR2","unstructured":"Gens, F., Mahowald, R.P., Richard, L.: Villars. 2009. IDC Cloud Computing 2010 (2010)"},{"key":"31_CR3","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107 (2016)"},{"key":"31_CR4","unstructured":"Enisa, C.C.: Benefits, risks and recommendations for information security. Eur. Netw. Inform. Secur. 23, 1\u20136 (2009)"},{"key":"31_CR5","unstructured":"Stavinoha, K.E.: What is Cloud Computing and Why Do We Need It (2010). Retrieved 18 Sep 2015"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Kandukuri, B.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517\u2013520. IEEE (2009)","DOI":"10.1109\/SCC.2009.84"},{"key":"31_CR7","unstructured":"Popovi\u0107, K., Hocenski, \u017d.: Cloud computing security issues and challenges. In: The 33rd International Convention Mipro, pp. 344\u2013349. IEEE (2010)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.L.: On technical security issues in cloud computing. In: 2009 IEEE International Conference on Cloud Computing, pp. 109\u2013116. IEEE (2009)","DOI":"10.1109\/CLOUD.2009.60"},{"issue":"2","key":"31_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2010","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50\u201357 (2010)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"31_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, pp. 199\u2013212 (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"31_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-50011-9_28","volume-title":"Information and Communications Security","author":"W Zhang","year":"2016","unstructured":"Zhang, W., et al.: A comprehensive study of co-residence threat in multi-tenant public PaaS clouds. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 361\u2013375. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50011-9_28"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Tajadod, G., Batten, L., Govinda, K.: Microsoft and Amazon: a comparison of approaches to cloud security. In: 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp. 539\u2013544. IEEE (2012)","DOI":"10.1109\/CloudCom.2012.6427581"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Holstein, D.K., Stouffer, K.: Trust but verify critical infrastructure cyber security solutions. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/HICSS.2010.410"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, W.: Integrated security framework for secure web services. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 178\u2013183. IEEE (2010)","DOI":"10.1109\/IITSI.2010.8"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Bin, W., Yuan, H.H., Xi, L.X., Min, X.J.: Open identity management framework for SaaS ecosystem. In: 2009 IEEE International Conference on e-Business Engineering, pp. 512\u2013517. IEEE (2009)","DOI":"10.1109\/ICEBE.2009.82"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Fong, E., Okun, V.: Web application scanners: definitions and functions. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS\u201907), pp. 280b\u2013280b. IEEE (2007)","DOI":"10.1109\/HICSS.2007.611"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5815\/ijwmt.2017.03.04","volume":"3","author":"A Vaibhav","year":"2017","unstructured":"Vaibhav, A., Shukla, D., Das, S., Sahana, S., Johri, P.: Security challenges, authentication, application and trust models for vehicular ad hoc network-a survey. IJ Wireless Microw. Technol. 3, 36\u201348 (2017)","journal-title":"IJ Wireless Microw. Technol."}],"container-title":["Communications in Computer and Information Science","Advanced Communication and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25088-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T14:10:40Z","timestamp":1676383840000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25088-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031250873","9783031250880"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25088-0_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Communication and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"258","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}