{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T18:30:10Z","timestamp":1722537010739},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11277-020-07989-6","type":"journal-article","created":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T22:34:50Z","timestamp":1605825290000},"page":"3309-3325","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication"],"prefix":"10.1007","volume":"117","author":[{"given":"Silambarasan","family":"Elkana Ebinazer","sequence":"first","affiliation":[]},{"given":"Nickolas","family":"Savarimuthu","sequence":"additional","affiliation":[]},{"given":"S.","family":"Mary Saira Bhanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,19]]},"reference":[{"key":"7989_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jnca.2018.03.017","volume":"110","author":"C Tan","year":"2018","unstructured":"Tan, C., Hijazi, M., Lim, Y., & Gani, A. (2018). A survey on proof of retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends. Journal of Network and Computer Applications, 110, 75\u201386.","journal-title":"Journal of Network and Computer Applications"},{"key":"7989_CR2","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.ins.2018.02.019","volume":"479","author":"B Li","year":"2019","unstructured":"Li, B., Huang, Y., Liu, Z., Li, J., Tian, Z., & Yiu, S. (2019). HybridORAM: practical oblivious cloud storage with constant bandwidth. Information Sciences, 479, 651\u2013663.","journal-title":"Information Sciences"},{"key":"7989_CR3","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.pisc.2016.04.052","volume":"8","author":"R Bedi","year":"2016","unstructured":"Bedi, R., Singh, J., & Gupta, S. (2016). Analysis of multi cloud storage applications for resource constrained mobile devices. Perspectivesin Science, 8, 279\u2013282.","journal-title":"Perspectivesin Science"},{"key":"7989_CR4","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1016\/j.proeng.2017.01.286","volume":"174","author":"R Wang","year":"2017","unstructured":"Wang, R. (2017). Research on data security technology based on cloud storage. Procedia Engineering, 174, 1340\u20131355.","journal-title":"Procedia Engineering"},{"issue":"6","key":"7989_CR5","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1093\/comjnl\/bxu122","volume":"58","author":"H Li","year":"2015","unstructured":"Li, H., Dong, M., Liao, X., & Jin, H. (2015). Deduplication-based energy efficient storage system in cloud environment. The Computer Journal, 58(6), 1373\u20131383.","journal-title":"The Computer Journal"},{"key":"7989_CR6","unstructured":"Wen, Z., Luo, J., Chen, H., Meng, J., Li, X., Li, J. (2014). A verifiable data deduplication scheme in cloud computing. In: Proceedings of 6th international conference on intelligent networking and collaborative systems, 2014; Salerno, Italy."},{"issue":"2","key":"7989_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.4018\/IJGHPC.2018040106","volume":"10","author":"J Li","year":"2018","unstructured":"Li, J., & Hou, M. (2018). Improving data availability for deduplication in cloud storage. International Journal of Grid and High Performance Computing, 10(2), 70\u201389.","journal-title":"International Journal of Grid and High Performance Computing"},{"key":"7989_CR8","unstructured":"Agarwala, A., Singh, P., Atrey, P. (2017). DICE: A dual integrity convergent encryption protocol for client side secure data deduplication. In: Proceddings of IEEE international conference on systems, man, and cybernetics (SMC); 2017; Banff, AB, Canada."},{"issue":"6","key":"7989_CR9","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Chen, X., Li, M., Li, J., Lee, P., & Lou, W. (2014). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615\u20131625.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"7989_CR10","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/s10586-017-1382-6","volume":"22","author":"E Daniel","year":"2017","unstructured":"Daniel, E., & Vasanthi, N. (2017). LDAP: A lightweight deduplication and auditing protocol for secure data storage in cloud environment. Cluster Computing, 22, 1247\u20131258.","journal-title":"Cluster Computing"},{"key":"7989_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.ins.2018.05.024","volume":"456","author":"H Yuan","year":"2018","unstructured":"Yuan, H., Chen, X., Jiang, T., Zhang, X., Yan, Z., & Xiang, Y. (2018). DedupDUM: Secure and scalable data deduplication with dynamic user management. Information Sciences, 456, 159\u2013173.","journal-title":"Information Sciences"},{"key":"7989_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, S., Jiang, T., Wang, L. (2017). Secure and efficient cloud data deduplication with ownership management. IEEE Transactions on Services Computing. 1\u20131.","DOI":"10.1109\/TSC.2017.2771280"},{"issue":"1","key":"7989_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJISC.2020.104822","volume":"1","author":"E Malar","year":"2020","unstructured":"Malar, E., & Gauthaam, M. (2020). Wavelet analysis of EEG for the identification of alcoholics using probabilistic classifiers and neural networks. International Journal of Intelligence and Sustainable Computing, 1(1), 3.","journal-title":"International Journal of Intelligence and Sustainable Computing"},{"key":"7989_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.pmcj.2017.03.014","volume":"41","author":"C Yang","year":"2017","unstructured":"Yang, C., Zhang, M., Jiang, Q., Zhang, J., Li, D., Ma, J., & Ren, J. (2017). Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive and Mobile Computing, 41, 243\u2013258.","journal-title":"Pervasive and Mobile Computing"},{"issue":"4","key":"7989_CR15","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1007\/s00500-015-1596-6","volume":"20","author":"X Li","year":"2015","unstructured":"Li, X., Li, J., & Huang, F. (2015). A secure cloud storage system supporting privacy-preserving fuzzy deduplication. Soft Computing, 20(4), 1437\u20131448.","journal-title":"Soft Computing"},{"issue":"19","key":"7989_CR16","doi-asserted-by":"publisher","first-page":"19363","DOI":"10.1007\/s11042-015-2956-z","volume":"76","author":"Y Shin","year":"2015","unstructured":"Shin, Y., Koo, D., Hur, J., & Yun, J. (2015). Secure proof of storage with deduplication for cloud storage systems. Multimedia Tools and Applications, 76(19), 19363\u201319378.","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"7989_CR17","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1504\/IJISC.2020.104826","volume":"1","author":"M Kasiselvanathan","year":"2020","unstructured":"Kasiselvanathan, M., Sangeetha, V., & Kalaiselvi, A. (2020). Palm pattern recognition using scale invariant feature transform. International Journal of Intelligence and Sustainable Computing, 1(1), 44.","journal-title":"International Journal of Intelligence and Sustainable Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07989-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07989-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07989-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T12:23:32Z","timestamp":1616415812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07989-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["7989"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07989-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,19]]},"assertion":[{"value":"11 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}