{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:22:09Z","timestamp":1725826929779},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319229140"},{"type":"electronic","value":"9783319229157"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22915-7_3","type":"book-chapter","created":{"date-parts":[[2015,8,6]],"date-time":"2015-08-06T22:14:54Z","timestamp":1438899294000},"page":"24-35","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Sharing of Data in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Deepnarayan","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"G. R.","family":"Gangadharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,8]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53, 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted data sharing over untrusted cloud storage providers. In: CloudCom-10, pp. 97\u2013103 (2010)","DOI":"10.1109\/CloudCom.2010.36"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Wang, W., Li, Z., Owens, R., Bhargava, B, K.: Secure and efficient access to outsourced data. In: CCSW, pp. 55\u201366 (2009)","DOI":"10.1145\/1655008.1655016"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Kumbhare, A.G., Simmhan, Y., Prasanna, V.: Designing a secure storage repository for sharing scientific datasets using public clouds. In:International workshop on Data intensive computing in the clouds (DataCloud-SC), pp. 31\u201340 (2011)","DOI":"10.1145\/2087522.2087530"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136\u2013149. Springer, Heidelberg (2010)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zhang, Y.: A generic scheme for secure data sharing in cloud. In: International Conference on Parallel Processing Workshops (ICPPW), pp. 145\u2013153 (2011)","DOI":"10.1109\/ICPPW.2011.51"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-38586-5_2","volume-title":"Security, Privacy and Trust in Cloud system","author":"D Thilakanathan","year":"2014","unstructured":"Thilakanathan, D., Chen, S., Nepal, S., Calvo, R.A.: Secure data sharing in the cloud. In: Nepal, S., Pathan, M. (eds.) Security, Privacy and Trust in Cloud system, pp. 45\u201372. Springer, Heidelberg (2014)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B, S.: Pors: Proofs of retrievability for large files. In: CCS, pp. 584\u2013597 (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.cose.2013.12.002","volume":"42","author":"D Xin","year":"2014","unstructured":"Xin, D., Jiadi, Y., Yuan, L., et al.: Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers and Security 42, 151\u2013164 (2014)","journal-title":"Computers and Security"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.is.2013.08.004","volume":"48","author":"KS Bharath","year":"2015","unstructured":"Bharath, K.S., Yousef, E., Gerry, H., Sanjay, K.M.: A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. J. 48, 196\u2013212 (2015)","journal-title":"Inf. Syst. J."},{"key":"3_CR12","unstructured":"Deyan, C., Hong, Z.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647\u2013651 (2012)"},{"key":"3_CR13","unstructured":"Minqi, Z., Rong, Z., Wei Xie., et al.: Security and privacy in cloud computing: a survey. In: Semantics Knowledge and Grid (SKG), pp. 105\u2013112 (2010)"},{"issue":"8","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1016\/j.jcss.2014.04.021","volume":"80","author":"W Guiyi","year":"2014","unstructured":"Guiyi, W., Rongxing, L., Jun, S.: EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption. J. Comput. Syst. Sci. 80(8), 1549\u20131562 (2014)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"3_CR15","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/SURV.2012.060912.00182","volume":"15","author":"X Zhifeng","year":"2013","unstructured":"Zhifeng, X., Yang, X.: Security and privacy in cloud computing. Commun. Surv. Tutorials 15(2), 843\u2013859 (2013)","journal-title":"Commun. Surv. Tutorials"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-10665-1_10","volume-title":"Cloud Computing","author":"\u00c5A Nyre","year":"2009","unstructured":"Nyre, \u00c5.A., Jaatun, M.G.: Privacy in a semantic cloud: what\u2019s trust got to do with it? In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 107\u2013118. Springer, Heidelberg (2009)"},{"issue":"1","key":"3_CR17","first-page":"4560","volume":"19","author":"AY Younis","year":"2014","unstructured":"Younis, A.Y., Kashif, K., Madjid, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19(1), 4560 (2014)","journal-title":"J. Inf. Secur. Appl."},{"key":"3_CR18","unstructured":"Raluca, A.P., Jacob, R.L., et al.: Enabling security in cloud storage SLAs with CloudProof. In: USENIX Annual Technical Conference (2011)"},{"key":"3_CR19","unstructured":"Tysowski, P.K., Hasan, M.A.: Re-encryption-based key management towards secure and scalable mobile applications in clouds. IACR Cryptology ePrint Archive (2011)"},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/TCC.2013.11","volume":"1","author":"PK Tysowski","year":"2013","unstructured":"Tysowski, P.K., Hasan, M.A.: Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE T. Cloud Comput. 1(2), 172\u2013186 (2013)","journal-title":"IEEE T. Cloud Comput."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22915-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T01:23:40Z","timestamp":1676942620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22915-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319229140","9783319229157"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22915-7_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"8 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}