{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:13:01Z","timestamp":1746159181433,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":56,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_2","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"31-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Costs and Security in Clouds"],"prefix":"10.1007","author":[{"given":"Yao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Radu","family":"Sion","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"2_CR1","unstructured":"Amazon s3: Show me the money. http:\/\/blogs.smugmug.com\/don\/2006\/11\/10\/amazon-s3-show-me-the-money\/."},{"key":"2_CR2","unstructured":"Aws import\/export. http:\/\/aws.amazon.com\/importexport\/."},{"key":"2_CR3","unstructured":"Parallel computing with matlab on amazon elastic compute cloud (ec2). http:\/\/www.mathworks.com\/programs\/techkits\/ec2-paper.html."},{"key":"2_CR4","unstructured":"IBM 4764 PCI-X Cryptographic Coprocessor. Online at http:\/\/www-03.ibm.com\/security\/cryptocards\/pcixcc\/overview.shtml, 2007."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Nitin Agrawal, William\u00a0J. Bolosky, John\u00a0R. Douceur, and Jacob\u00a0R. Lorch. A five-year study of file-system metadata. In Proceedings of the 5th USENIX conference on File and Storage Technologies (FAST 07), Berkeley, CA, USA, 2007. USENIX Association.","DOI":"10.1145\/1288783.1288788"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Georgios Amanatidis, Alexandra Boldyreva, and Adam O\u2019Neill. Provably-secure schemes for basic query support in outsourced databases. In Steve Barker and Gail-Joon Ahn, editors, DBSec, volume 4602 of Lecture Notes in Computer Science, pages 14\u201330. Springer, 2007.","DOI":"10.1007\/978-3-540-73538-0_2"},{"key":"2_CR7","unstructured":"AMD. Power and cooling in the data centers. Power and cooling in the data centers, Online at http:\/\/enterprise.amd.com\/Downloads\/34146A_PC_WP_en.pdf."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Mihir Bellare, Alexandra Boldyreva, and Adam O\u2019Neill. Deterministic and efficiently searchable encryption. In Alfred Menezes, editor, CRYPTO, volume 4622 of Lecture Notes in Computer Science, pages 535\u2013552. Springer, 2007.","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"2_CR9","unstructured":"Daniel\u00a0J. Bernstein and Tanja\u00a0Lange (editors). ebacs: Ecrypt benchmarking of cryptographic systems. Online at http:\/\/bench.cr.yp.to accessed 30 Jan. 2009."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"M.\u00a0Blaze. A Cryptographic File System for Unix. In Proceedings of the first ACM Conference on Computer and Communications Security, pages 9\u201316, Fairfax, VA, 1993. ACM.","DOI":"10.1145\/168588.168590"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"D.\u00a0Boneh, C.\u00a0Gentry, B.\u00a0Lynn, and H.\u00a0Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EuroCrypt, 2003.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"2_CR12","unstructured":"G.\u00a0Cattaneo, L.\u00a0Catuogno, A.\u00a0Del Sorbo, and P.\u00a0Persiano. The Design and Implementation of a Transparent Cryptographic Filesystem for UNIX. In Proceedings of the Annual USENIX Technical Conference, FREENIX Track, pages 245\u2013252, Boston, MA, June 2001."},{"key":"2_CR13","unstructured":"CNN. Feds seek Google records in porn probe. Online at http:\/\/www.cnn.com, January 2006."},{"key":"2_CR14","unstructured":"CNN. YouTube ordered to reveal its viewers. Online at http:\/\/www.cnn.com, July 2008."},{"key":"2_CR15","unstructured":"Katherine Conrad. Data centers hot once again in the bay area. Online at http:\/\/findarticles.com\/p\/articles\/mi_qn4176\/is_20070401\/ai_n18782997."},{"key":"2_CR16","unstructured":"Qwest\u00a0Communications Corp. Space furniture rental. Online at http:\/\/www.qwest.com\/about\/policy\/docs\/qcc\/documents\/WO-sfr-Amd52_211006.pdf."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In CCS \u201906: Proceedings of the 13th ACM conference on Computer and communications security, pages 79\u201388, New York, NY, USA, 2006. ACM.","DOI":"10.1145\/1180405.1180417"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Premkumar\u00a0T. Devanbu, Michael Gertz, Chip Martel, and Stuart\u00a0G. Stubblebine. Authentic third-party data publication. In IFIP Workshop on Database Security, pages 101\u2013112, 2000.","DOI":"10.1007\/0-306-47008-X_9"},{"key":"2_CR19","unstructured":"Donna Bogatin. Google Apps data risks: Security vs. privacy. Online at http:\/\/blogs.zdnet.com\/micro-markets\/?p=1021, February 2007."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"John\u00a0R. Douceur and William\u00a0J. Bolosky. A large-scale study of file-system contents. In Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 59\u201370. ACM New York, NY, USA, 1999.","DOI":"10.1145\/301464.301480"},{"key":"2_CR21","unstructured":"Janice Fetzer. Internet data centers:end user & developer requirements. Online at http:\/\/www.utilityeda.com\/Summer2006\/Mares.pdf."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"S.\u00a0Ghemawat, H.\u00a0Gobioff, and S.\u00a0T. Leung. The Google File System. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP \u201903), pages 29\u201343, Bolton Landing, NY, October 2003. ACM SIGOPS.","DOI":"10.1145\/1165389.945450"},{"key":"2_CR23","unstructured":"Albert Greenberg, James Hamilton, David\u00a0A. Maltz, and Parveen Patel. The cost of a cloud: Research problems in data center networks. In SIGCOM Computer Communications Review, 2009."},{"key":"2_CR24","unstructured":"The\u00a0Green Grid. Green grid metrics: Describing data center power efficiency. Online at http:\/\/www.thegreengrid.org\/gg_content\/Green_Grid_Metrics_WP.pdf."},{"key":"2_CR25","unstructured":"The\u00a0Clipper Group. Scale-up and scale-out architectures-ibm provides choice with the xseries. Technical report, 2005."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"H.\u00a0Hacigumus, B.\u00a0Iyer, C.\u00a0Li, and S.\u00a0Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proceedings of the ACM SIGMOD international conference on Management of data, pages 216\u2013227. ACM Press, 2002.","DOI":"10.1145\/564691.564717"},{"key":"2_CR27","unstructured":"James Hamilton. Perspectives Blog. Online at http:\/\/mvdirona.com\/jrh\/work\/."},{"key":"2_CR28","unstructured":"James Hamilton. Internet-scale service efficiency. Large Scale Distributed Systems & Middleware (LADIS 2008),, 2008."},{"key":"2_CR29","volume-title":"On designing and deploying internet-scale services","author":"James Hamilton","year":"2008","unstructured":"James Hamilton. On designing and deploying internet-scale services. Technical report, Windows Live Services Platform, Microsoft, 2008."},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"B.\u00a0Hore, S.\u00a0Mehrotra, and G.\u00a0Tsudik. A privacy-preserving index for range queries. In Proceedings of ACM SIGMOD, 2004.","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"HweeHwa Pang and Arpit Jain and Krithi Ramamritham and Kian-Lee Tan. Verifying Completeness of Relational Query Results in Data Publishing. In Proceedings of ACM SIGMOD, 2005.","DOI":"10.1145\/1066157.1066204"},{"key":"2_CR32","unstructured":"IBM. IBM blade servers. Online at http:\/\/www-03.ibm.com\/systems\/bladecenter\/hardware\/servers\/."},{"key":"2_CR33","unstructured":"Saul\u00a0Hansell John\u00a0Markoff. Hiding in plain sight, google seeks more power. Online at http:\/\/www.nytimes.com\/2006\/06\/14\/technology\/14search.html."},{"key":"2_CR34","unstructured":"A.\u00a0Kashyap, S.\u00a0Patil, G.\u00a0Sivathanu, and E.\u00a0Zadok. I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. In Proceedings of the 18th USENIX Large Installation System Administration Conference (LISA 2004), pages 69\u201379, Atlanta, GA, November 2004. USENIX Association."},{"key":"2_CR35","unstructured":"Larry Dignan. Will you trust Google with your data? Online at http:\/\/blogs.zdnet.com\/BTL\/?p=4544, February 2007."},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"M. Atallah and C. YounSun and A. Kundu. Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors. In 24th International Conference on Data Engineering ICDE, pages 696\u2013704, 2008.","DOI":"10.1109\/ICDE.2008.4497478"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Maithili Narasimha and Gene Tsudik. DSAC: integrity for outsourced databases with signature aggregation and chaining. Technical report, 2005.","DOI":"10.1145\/1099554.1099604"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Maithili Narasimha and Gene Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In Proceedings of DASFAA, 2006.","DOI":"10.1007\/11733836_30"},{"key":"2_CR39","volume-title":"A general model for authenticated data structures","author":"C. Martel","year":"2001","unstructured":"C.\u00a0Martel, G.\u00a0Nuckolls, P.\u00a0Devanbu, M.\u00a0Gertz, A.\u00a0Kwong, and S.\u00a0Stubblebine. A general model for authenticated data structures, 2001."},{"issue":"1","key":"2_CR40","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s00453-003-1076-8","volume":"39","author":"Charles Martel","year":"2004","unstructured":"Charles Martel, Glen Nuckolls, Premkumar Devanbu, Michael Gertz, April Kwong, and Stuart\u00a0G. Stubblebine. A general model for authenticated data structures. Algorithmica, 39(1):21\u201341, 2004.","journal-title":"Algorithmica"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"R.\u00a0Merkle. Protocols for public key cryptosystems. In IEEE Symposium on Research in Security and Privacy, 1980.","DOI":"10.1109\/SP.1980.10006"},{"key":"2_CR42","unstructured":"Jeralyn Merritt. What google searches and data mining mean for you. Online at http:\/\/www.talkleft.com\/story\/2006\/01\/25\/692\/74066."},{"key":"2_CR43","unstructured":"Microsoft Research. Encrypting File System for Windows 2000. Technical report, Microsoft Corporation, July 1999. www.microsoft.com\/windows2000\/techinfo\/howitworks\/security\/encrypt.asp."},{"key":"2_CR44","unstructured":"Rich Miller. Microsoft: Pue of 1.22 for data center containers. Online at http:\/\/www.datacenterknowledge.com\/archives\/2008\/10\/20\/microsoft-pue-of-122-for-data-center-containers\/."},{"issue":"4","key":"2_CR45","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1402946.1402967","volume":"38","author":"Al-Fares Mohammad","year":"2008","unstructured":"Al-Fares Mohammad, Loukissas Alexander, and Vahdat Amin. A scalable, commodity data center network architecture. SIGCOMM Comput. Commun. Rev., 38(4):63\u201374, 2008.","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"2_CR46","unstructured":"E.\u00a0Mykletun, M.\u00a0Narasimha, and G.\u00a0Tsudik. Authentication and integrity in outsourced databases. In Proceedings of Network and Distributed System Security (NDSS), 2004."},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"E.\u00a0Mykletun, M.\u00a0Narasimha, and G.\u00a0Tsudik. Signature bouquets: Immutability for aggregated\/condensed signatures. In Computer Security - ESORICS 2004, volume 3193 of Lecture Notes in Computer Science, pages 160\u2013176. Springer, 2004.","DOI":"10.1007\/978-3-540-30108-0_10"},{"key":"2_CR48","unstructured":"Department of\u00a0Administration. Records management fact sheet 13. Online at http:\/\/www.doa.state.wi.us\/facts_view.asp?factid=68&locid=2."},{"key":"2_CR49","unstructured":"Optimum. Optimum online plans. Online at http:\/\/www.buyoptimum.com."},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"HweeHwa Pang and Kian-Lee Tan. Authenticating query results in edge computing. In ICDE \u201904: Proceedings of the 20th International Conference on Data Engineering, page 560, Washington, DC, USA, 2004. IEEE Computer Society.","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"2_CR51","unstructured":"U.S. Environmental Protection Agency ENERGY\u00a0STAR Program. Report to congress on server and data center energy efficiency public law 109\u2013431, 2007."},{"key":"2_CR52","volume-title":"Scientific computing in the cloud","author":"J. J. Rehr","year":"2008","unstructured":"J.\u00a0J. Rehr, J.\u00a0P. Gardner, M.\u00a0Prange, L.\u00a0Svec, and F.\u00a0Vila. Scientific computing in the cloud, 2008."},{"key":"2_CR53","volume-title":"Disk failures in the real world: what does an mttf of 1,000,000 hours mean to you? In FAST \u201907: Proceedings of the 5th USENIX conference on File and Storage Technologies","author":"Bianca Schroeder","year":"2007","unstructured":"Bianca Schroeder and Garth\u00a0A. Gibson. Disk failures in the real world: what does an mttf of 1,000,000 hours mean to you? In FAST \u201907: Proceedings of the 5th USENIX conference on File and Storage Technologies, Berkeley, CA, USA, 2007."},{"key":"2_CR54","unstructured":"G.\u00a0Sivathanu, C.\u00a0P. Wright, and E.\u00a0Zadok. Enhancing File System Integrity Through Checksums. Technical Report FSL-04-04, Computer Science Department, Stony Brook University, May 2004. http:\/\/www.fsl.cs.sunysb.edu\/docs\/nc-checksum-tr\/nc-checksum.pdf."},{"key":"2_CR55","unstructured":"Tingjian Ge and Stan Zdonik. Answering aggregation queries in a secure system model. In VLDB \u201907: Proceedings of the 33rd international conference on Very large data bases, pages 519\u2013530. VLDB Endowment, 2007."},{"key":"2_CR56","unstructured":"Whitfield Diffie. How Secure Is Cloud Computing? Online at http:\/\/www.technologyreview.com\/computing\/23951\/, November 2009."}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:51:07Z","timestamp":1746118267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_2","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}