{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:20Z","timestamp":1725808400903},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_1","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"1-11","source":"Crossref","is-referenced-by-count":17,"title":["Security and Privacy in Cloud Computing: A Survey"],"prefix":"10.1007","author":[{"given":"Mahesh U.","family":"Shankarwar","sequence":"first","affiliation":[]},{"given":"Ambika V.","family":"Pawar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Information Technology Laboratory (2011), \n http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S. Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications\u00a034(1), 1\u201311 (2011)","journal-title":"Journal of Network and Computer Applications"},{"key":"1_CR3","unstructured":"Top Threats to the Cloud Computing V1.0, Cloud Security Alliance, \n http:\/\/www.cloudsecurityalliance.org\/topthreats\/2010"},{"key":"1_CR4","unstructured":"Babu, J., Kishore, K., Kumar, K.E.: Migration from Single to Multi-Cloud Computing. International Journal of Engg. Research and Tech.\u00a02(4) (April 2013)"},{"key":"1_CR5","unstructured":"Chandran, S., Angepat, M.: CloudComputing: Analyzing the Risk involved in Cloud Computing Environment (2011)"},{"key":"1_CR6","unstructured":"Munir, K., Palaniappan, S.: Security threats\/attacks present in cloud environment. IJCSNS\u00a012(12) (2012)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Munir, K., Palaniappan, S.: Secure Cloud Architecture. ACIJ\u00a04(1) (2013)","DOI":"10.5121\/acij.2013.4102"},{"key":"1_CR8","unstructured":"Sravani, K., Nivedita, K.L.A.: Effective service security schemes in cloud computing. IJCER\u00a03(3)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. In: IEEE International Conference on Computer Science and Electronics Engineering (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"1_CR10","unstructured":"Behl, A.: Emerging Security Challenges in Cloud Computing. In: IEEE International Conference Information and Communication Technologies, WICT (2011)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Mahmood, Z.: Data Location and Security Issues in Cloud Computing. In: IEEE International Conference on Emerging intelligent Data and Web Technologies (2011)","DOI":"10.1109\/EIDWT.2011.16"},{"key":"1_CR12","unstructured":"Attas, D., Batrafi, O.: Efficient integrity checking technique fro securing client data in cloud computing. IJECS-IJENS\u00a011(5) (2011)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Arockiam, L., Parthasarathy, et al.: Privacy in Cloud Computing: Survey. CS&IT (2012)","DOI":"10.5121\/csit.2012.2331"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Hashizume, K., et al.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications, A Springer Open Journal, 1\u201313 (2013)","DOI":"10.1186\/1869-0238-4-5"},{"key":"1_CR15","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-642-22577-2_5","volume-title":"High Performance Architecture and Grid Computing","author":"P. Sharma","year":"2011","unstructured":"Sharma, P., Sood, S.K., Kaur, S.: Security Issues in Cloud Computing. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol.\u00a0169, pp. 36\u201345. Springer, Heidelberg (2011)"},{"key":"1_CR16","unstructured":"Popovic, K., Hocenski, Z.: Cloud Computing security issues and challenges. In: MIPRO, Proceedings of the 33rd International Convention (2010)"},{"key":"1_CR17","unstructured":"Siani, Miranda: Security Threats in cloud computing. In: 6th International Conference on Internet Technologies and Secure Transactions (2011)"},{"key":"1_CR18","unstructured":"Miranda, M., Pearson, S.: A Client-based Privacy Manager for cloud Computing. In: Proceeding of the Fourth International ICST Conference on Comm. and Middleware, COMSWARE 2009 (2009)"},{"key":"1_CR19","unstructured":"Wang, J., Zhao, Y., et al.: Providing Privacy preserving in cloud computing. In: International Conference on Test and Measurement, vol.\u00a02, pp. 213\u2013216 (2009)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully Homomorphic encryption using ideal lattices. In: STOC, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Squicciarini, A., Sundareswaran, S., Lin, D.: Preventing Information Leakage from Indexing in the Cloud. In: 2010 IEEE 3rd International Conference on Cloud Computing, pp. 188\u2013195 (2010)","DOI":"10.1109\/CLOUD.2010.82"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, C., et al.: Enabling public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Mishra, R., Dash, S., Mishra, D.: Privacy preserving Repository for securing data across the Cloud. IEEE (2011)","DOI":"10.1109\/ICECTECH.2011.5941946"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Greveler, U., Justus, B., et al.: A Privacy Preserving System for Cloud Computing. In: 11th IEEE International Conference on Computer and Information Technology, pp. 648\u2013653 (2011)","DOI":"10.1109\/CIT.2011.88"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, M., Mu, Y., et al.: Privacy-Preserved Access Control for Cloud Computing. In: International Joint Conference of IEEE TrustCom 2011\/IEEE ICESS 2011\/FCST 2011, pp. 83\u201390 (2011)","DOI":"10.1109\/TrustCom.2011.14"},{"key":"1_CR26","unstructured":"Singh, J., Kumar, B., Khatri, A.: Securing the Storage Data using RC5 Algorithm. Internatinal Journal of Advanced Computer Research\u00a02(4(6)) (2012)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog Computing: Mitigating Insider Data Theft Attacks in Cloud. In: IEEE CS Security and Privacy Workshop (2012)","DOI":"10.1109\/SPW.2012.19"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Brun, Y., Medvidovic, N.: Keeping Data Private While Computing in Cloud. In: IEEE Fifth International Conference on Cloud Computing (2012)","DOI":"10.1109\/CLOUD.2012.126"},{"key":"1_CR29","unstructured":"Gampala, V., Inuganti, S., Muppidi, S.: Data Security in Cloud Computing using Elliptic Curve Cryptography. International Journal of Soft Computing and Engg\u00a02(3) (July 2012)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., et al.: Privacy-Preserving Public Auditing for Storage Security in Cloud Computing. In: Proceedings of the IEEE INFOCOM 2010 (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"2","key":"1_CR31","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C. Wang","year":"2013","unstructured":"Wang, C., Chow, S., et al.: Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Transactions on Computers\u00a062(2), 362\u2013375 (2013)","journal-title":"IEEE Transactions on Computers"},{"key":"1_CR32","unstructured":"Li, X., He, J., Zhang, T.: A Service Oriented Identity Authentication Privacy Protection Method in Cloud computing. International Journal of Grid and Distributed Computing\u00a06(1) (February 2013)"},{"key":"1_CR33","unstructured":"IDC, It cloud services user survey, pt.2: Top benefits & challenges (2008), \n http:\/\/blogs.idc.com\/ie\/?p=210"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Bohli, J.M., Gruschka, N., Jensen, M., Iacono, L.L., Marnau, N.: Security and Privacy-Enhancing Multi-cloud Architectures. IEEE Transactions on Dependable and Secure Computing\u00a010(4) (July\/August 2013)","DOI":"10.1109\/TDSC.2013.6"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T01:45:46Z","timestamp":1675129546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}