{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:39Z","timestamp":1725808419350},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_17","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T11:09:45Z","timestamp":1414753785000},"page":"145-152","source":"Crossref","is-referenced-by-count":1,"title":["Secure Cloud Data Computing with Third Party Auditor Control"],"prefix":"10.1007","author":[{"given":"Apoorva","family":"Rathi","sequence":"first","affiliation":[]},{"given":"Nilesh","family":"Parmar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28 (February 2009)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing (February 2009)","DOI":"10.1145\/1721654.1721672"},{"key":"17_CR3","unstructured":"Brahman, S.K., Patel, B.: Java Based Resource Sharing with Secure Transaction in User Cloud Environment. International Journal of Advanced Computer Research (IJACR)\u00a02(3(5)) (September 2012)"},{"key":"17_CR4","unstructured":"Guha, V., Shrivastava, M.: Review of Information Authentication in Mobile Cloud over SaaS & PaaS Layers. International Journal of Advanced Computer Research (IJACR)\u00a03(1(9)) (March 2013)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Dubey, A.K., Dubey, A.K., Namdev, M., Shrivastava, S.S.: Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment. In: CONSEG 2012 (2012)","DOI":"10.1109\/CONSEG.2012.6349503"},{"key":"17_CR6","unstructured":"Singh, A., Shrivastava, M.: Overview of Security issues in Cloud Computing. International Journal of Advanced Computer Research (IJACR)\u00a02(1) (March 2012)"},{"key":"17_CR7","unstructured":"Ruiz-Agundez, I., Penya, Y.K., Bringas, P.G.: Cloud Computing Services Accounting. International Journal of Advanced Computer Research (IJACR)\u00a02(2) (June 2012)"},{"key":"17_CR8","unstructured":"Prakash, A.K.A.V.: Implement Security using smart card on Cloud. International Journal of Advanced Computer Research (IJACR)\u00a03(1(9)) (March 2013)"},{"key":"17_CR9","unstructured":"So, K.: Cloud computing security issues and challenges. International Journal of Computer Networks (2011)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Gonzalez, et al.: A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications 1, 11 (2012)","DOI":"10.1186\/2192-113X-1-11"},{"key":"17_CR11","unstructured":"Lee, K.: Security Threats in Cloud Computing Environments. International Journal of Security & Its Applications\u00a06(4) (2012)"},{"key":"17_CR12","unstructured":"Shaikh, F.B., Haider, S.: Security threats in cloud computing. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), December 11-14, pp. 214\u2013219 (2011)"},{"key":"17_CR13","unstructured":"Popovi\u0107, K., Hocenski, Z.: Cloud computing security issues and challenges. In: 2010 Proceedings of the 33rd International Convention on MIPRO, May 24-28, pp. 344\u2013349 (2010)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Cao, N., Lou, W.: Authorized Private Keyword Search over Encrypted Data in Cloud Computing. In: 31st International Conference on Distributed Computing Systems (2011)","DOI":"10.1109\/ICDCS.2011.55"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Yang, Y.: Towards multi-user private keyword search for cloud computing. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 758\u2013759. IEEE (2011)","DOI":"10.1109\/CloudCom.2011.43"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Waqar, A., Raza, A., Abbas, H.: User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment. In: International Joint Conference of IEEE TrustCom 2011\/IEEE ICESS 2011\/FCST 2011 (2011)","DOI":"10.1109\/TrustCom.2011.128"},{"key":"17_CR17","unstructured":"Liao, W.-H., Su, S.-C.: A Dynamic VPN Architecture for Private Cloud Computing. In: Fourth IEEE International Conference on Utility and Cloud Computing (2011)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Niyato, D.: Optimization-Based Virtual Machine Manager for Private Cloud Computing. In: Third IEEE International Conference on Coud Computing Technology and Science (2011)","DOI":"10.1109\/CloudCom.2011.23"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Brun, Y., Medvidovic, N.: Keeping Data Private while Computing in the Cloud. In: IEEE Fifth International Conference on Cloud Computing (2012)","DOI":"10.1109\/CLOUD.2012.126"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Liu, X., Qiu, X., Xie, X., Chen, B., Huang, K.: Implement of a Light-Weight Integrated Virtualized Environment Manager for Private Cloud Computing. In: International Conference on Computer Science and Service System (2012)","DOI":"10.1109\/CSSS.2012.137"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T22:34:34Z","timestamp":1675982074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}