{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:31Z","timestamp":1725808411381},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_15","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T11:09:45Z","timestamp":1414753785000},"page":"127-134","source":"Crossref","is-referenced-by-count":3,"title":["Handling Data Integrity Issue in SaaS Cloud"],"prefix":"10.1007","author":[{"given":"Anandita Singh","family":"Thakur","sequence":"first","affiliation":[]},{"given":"P. K.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Punit","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Shaikh, F.B., Haider, S.: Security Threats in Cloud Computing. In: 6th International Conference on Internet Technology and Secured Transactions, UAE, pp. 11\u201314 (2011)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Kumar, S., Goudar, R.H.: Cloud Computing \u2013 Research Issues, Challenges, Architecture, Platforms and Applications: A Survey. International Journal of Future Computer and Communication\u00a01(4) (December 2012)","DOI":"10.7763\/IJFCC.2012.V1.95"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Springer (2010)","DOI":"10.1007\/s13174-010-0007-6"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Naruchitparames, J., Giines, M.H.: Enhancing Data Privacy and Integrity in the Cloud. IEEE (2011)","DOI":"10.1109\/HPCSim.2011.5999856"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Sun, D., Chang, G., Sun, L., Wang, X.: Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments. Published by Elsevier Ltd. (2011)","DOI":"10.1016\/j.proeng.2011.08.537"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chalse, R., Selokara, A., Katara, A.: A New Technique of Data Integrity for Analysis of the Cloud Computing Security. In: 2013 5th International Conference on Computational Intelligence and Communication Networks (2013)","DOI":"10.1109\/CICN.2013.103"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Sravan Kumar, R., Saxena, A.: Data integrity proofs in cloud storage. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20134. IEEE (2011)","DOI":"10.1109\/COMSNETS.2011.5716422"},{"key":"15_CR8","unstructured":"Raju, R.V., Vasanth, M., Udaykumar, P.: Data integrity using encryption in cloud computing. Journal of Global Research in Computer Science\u00a04(5) (2013)"},{"key":"15_CR9","unstructured":"Kumar, P., Sehgal, V.K., Chauhan, D.S., Gupta, P.K., Diwakar, M.: Effective Ways of Secure, Private and Trusted Cloud Computing. IJCSI International Journal of Computer Science Issues\u00a08(3(2)) (2011)"},{"key":"15_CR10","unstructured":"Eswaran, S., Abburu, S.: Identifying Data Integrity in the Cloud Storage. IJCSI International Journal of Computer Science Issues\u00a09(1) (March 2012)"},{"key":"15_CR11","series-title":"AISC","first-page":"1","volume-title":"2012 Second International Conference on Soft Computing for Problem Solving (SocProS 2012)","author":"P. Rana","year":"2014","unstructured":"Rana, P., Gupta, P.K., Siddavatam, R.: Combined and Improved Framework of Infrastructure as a Service and Platform as a Service in Cloud Computing. In: Babu, B.V., Nagar, A., Deep, K., Pant, M., Bansal, J.C., Ray, K., Gupta, U. (eds.) 2012 Second International Conference on Soft Computing for Problem Solving (SocProS 2012). AISC, vol.\u00a0236, pp. 1\u20138. Springer, Heidelberg (2014)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Thakur, A.S., Gupta, P.K.: Framework to Improve Data Integrity in Multi Cloud Environment. International Journal of Computer Applications\u00a087(10) (February 2014)","DOI":"10.5120\/15245-3788"},{"key":"15_CR13","unstructured":"Mehta, A., Sahu, R.K., Awasthi, L.K.: Robust Data Security for Cloud while using Third Party Auditor. International Journal of Advanced Research in Computer Science and Software Engineering\u00a02(2) (February 2012)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T08:23:21Z","timestamp":1559031801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}