{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:30Z","timestamp":1725795990455},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438619"},{"type":"electronic","value":"9783662438626"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43862-6_2","type":"book-chapter","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T23:51:34Z","timestamp":1403653894000},"page":"15-28","source":"Crossref","is-referenced-by-count":11,"title":["ESPRESSO: An Encryption as a Service for Cloud Storage Systems"],"prefix":"10.1007","author":[{"given":"Seungmin","family":"Kang","sequence":"first","affiliation":[]},{"given":"Bharadwaj","family":"Veeravalli","sequence":"additional","affiliation":[]},{"given":"Khin Mi Mi","family":"Aung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"IMEX: The Promise & Challenges of Cloud Storage. Technical report, IMEX Research (August 2010)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Tian, L.Q., Lin, C., Ni, Y.: Evaluation of User Behavior Trust in Cloud Computing. In: ICCASM 2010, Taiyuan, pp. 567\u2013572 (October 2010)","DOI":"10.1109\/ICCASM.2010.5620636"},{"key":"2_CR3","unstructured":"Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 136\u2013149. Springer, Heidelberg (2010)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Factor, M., Hadas, D., Hamama, A., Har\u2019el, N., Kolodner, E., Kurmus, A., Shulman-Peleg, A., Sorniotti, A.: Secure logical isolation for multi-tenancy in cloud storage. In: IEEE MSST 2013, Long Beach, CA, pp. 1\u20135 (May 2013)","DOI":"10.1109\/MSST.2013.6558424"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Huang, Z., Li, Q., Zheng, D., Chen, K., Li, X.: YI Cloud: Improving User Privacy with Secret Key Recovery in Cloud Storage. In: IEEE SOSE 2011, Irvine, CA, pp. 268\u2013272 (December 2011)","DOI":"10.1109\/SOSE.2011.6139116"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Hao, L., Han, D.: The study and design on secure-cloud storage system. In: ICECE 2011, Yichang, China, pp. 5126\u20135129 (September 2011)","DOI":"10.1109\/ICECENG.2011.6057171"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., Chehab, A.: Privacy as a Service: Privacy-aware Data Storage and Processing in Cloud Computing Architectures. In: IEEE DASC 2009, Chengdu, China, pp. 711\u2013716 (December 2009)","DOI":"10.1109\/DASC.2009.139"},{"key":"2_CR8","unstructured":"Harrin, E.: Cloud Storage Vendors Offering Encryption as a Service. Technical report, Enterprise Networking Planet (February 2012)"},{"key":"2_CR9","unstructured":"Google, \n \n http:\/\/googlecloudplatform.blogspot.sg\/2013\/08\/google-cloud-storage-now-provides.html"},{"key":"2_CR10","unstructured":"Amazon S3, \n \n http:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/Welcome.html"},{"key":"2_CR11","unstructured":"Microsoft Azure (April 2014), \n \n http:\/\/www.windowsazure.com\/en-us\/"},{"key":"2_CR12","unstructured":"GoGrid, \n \n http:\/\/www.gogrid.com\/"},{"key":"2_CR13","unstructured":"RackSpace, \n \n http:\/\/www.rackspace.com\/"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: IEEE INFOCOM 2010, San Diego, CA, pp. 1\u20139 (March 2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"2_CR15","unstructured":"Litzenberger, D.C.: PyCrypto (April 2014), \n \n https:\/\/www.dlitz.net\/software\/pycrypto"},{"key":"2_CR16","unstructured":"OpenStack (April 2014), \n \n http:\/\/swift.openstack.org\/"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Bresnahan, J., Keahey, K., LaBissoniere, D., Freeman, T.: Cumulus: An Open Source Storage Cloud for Science. In: ScienceCloud 2011, CA, pp. 25\u201332 (June 2011)","DOI":"10.1145\/1996109.1996115"},{"key":"2_CR18","unstructured":"cURL, \n \n http:\/\/curl.haxx.se"},{"key":"2_CR19","unstructured":"s3cmd (April 2014), \n \n http:\/\/s3tools.org\/s3cmd"},{"key":"2_CR20","unstructured":"boto (April 2014), \n \n http:\/\/code.google.com\/p\/boto"},{"key":"2_CR21","unstructured":"jets3t (April 2014), \n \n http:\/\/jets3t.s3.amazonaws.com"},{"key":"2_CR22","unstructured":"Wikipedia: Wikipedia archive (February 2014), \n \n http:\/\/dumps.wikipedia.org"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Kang, L., Zhang, X.: Identity-based Authentication in Cloud Storage Sharing. In: MINES 2010, Nanjing, China, pp. 851\u2013855 (November 2010)","DOI":"10.1109\/MINES.2010.180"},{"key":"2_CR24","unstructured":"Gu, Y., Grossman, R.L.: Sector and Sphere: The Design and Implementation of a High Performance Data Cloud. Philosophical Transactions of The Royal Society A: Mathematical Physical and Engineering Sciences\u00a0367 (1897), 2429\u20132445 (2009)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted Data Sharing over Untrusted Cloud Storage Providers. In: IEEE CloudCom 2010, Indianapolis, IN, pp. 97\u2013103 (November 2010)","DOI":"10.1109\/CloudCom.2010.36"}],"container-title":["Lecture Notes in Computer Science","Monitoring and Securing Virtualized Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43862-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:44:27Z","timestamp":1558917867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43862-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438619","9783662438626"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43862-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}