{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:31:45Z","timestamp":1729614705794,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/cscloud.2016.52","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T16:28:16Z","timestamp":1471537696000},"page":"273-278","source":"Crossref","is-referenced-by-count":73,"title":["Privacy-Aware Adaptive Data Encryption Strategy of Big Data in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Keke","family":"Gai","sequence":"first","affiliation":[]},{"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.09.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.205"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.137"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.69"},{"key":"ref14","article-title":"Intercrossed access control for secure financial services on multimedia big data in cloud systems","volume":"1","author":"li","year":"2016","journal-title":"ACM Transactions on Multimedia Computing Communications and Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.76"},{"key":"ref16","first-page":"1","article-title":"Privacy protection for preventing data over-collection in smart city","author":"li","year":"2015","journal-title":"IEEE Transactions on Computers"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.168"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.250"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.60"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2011.03.005"},{"key":"ref6","first-page":"1","article-title":"Efficiency-aware workload optimizations of heterogenous cloud computing for capacity planning in financial industry","author":"gai","year":"2015","journal-title":"The 2nd IEEE International Conference on Cyber Security and Cloud Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.08.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.68"},{"key":"ref7","first-page":"46","article-title":"Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing","volume":"59","author":"gai","year":"2015","journal-title":"Journal of Network and ComputerApplications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2012.240"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1224"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2409857"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.67"},{"key":"ref22","first-page":"28","article-title":"A feasibility study of Platform-as-a-Service using cloud computing for a global service organization","volume":"7","author":"gai","year":"2014","journal-title":"Journal of Information Systems Applied Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2316290"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2282965"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160298"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2188423"}],"event":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","start":{"date-parts":[[2016,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2016,6,27]]}},"container-title":["2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7529275\/7545876\/07545931.pdf?arnumber=7545931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T20:49:56Z","timestamp":1475182196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7545931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cscloud.2016.52","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}