{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:56:11Z","timestamp":1726037771331},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242732"},{"type":"electronic","value":"9783030242749"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24274-9_47","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"516-524","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security"],"prefix":"10.1007","author":[{"given":"Micheal Ernest","family":"Taylor","sequence":"first","affiliation":[]},{"given":"David","family":"Aboagye-Darko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"1","key":"47_CR1","first-page":"100","volume":"9","author":"D Purushothaman","year":"2012","unstructured":"Purushothaman, D., Abburu, S.: An approach for data storage security in cloud computing. Int. J. Comput. Sci. 9(1), 100\u2013105 (2012)","journal-title":"Int. J. Comput. Sci."},{"issue":"1","key":"47_CR2","first-page":"119","volume":"39","author":"V Guha","year":"2013","unstructured":"Guha, V., Shrivastav, M.: Review of information authentication in mobile cloud over SaaS and PaaS layer. Int. J. Adv. Comput. Res. 39(1), 119\u2013121 (2013)","journal-title":"Int. J. Adv. Comput. Res."},{"issue":"5","key":"47_CR3","first-page":"1717","volume":"2","author":"R Vasu","year":"2011","unstructured":"Vasu, R.: Techniques for efficiently ensuring data storage security in cloud computing. IJCTA 2(5), 1717\u20131721 (2011)","journal-title":"IJCTA"},{"issue":"4","key":"47_CR4","first-page":"1154","volume":"4","author":"P Garg","year":"2013","unstructured":"Garg, P., Sharma, V.: Secure data storage in mobile cloud computing. Int. J. Sci. Eng. Res. 4(4), 1154\u20131159 (2013)","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"3","key":"47_CR5","first-page":"73","volume":"2","author":"AS Shimpi","year":"2012","unstructured":"Shimpi, A.S., Chander, R.P.: Secure framework in data processing for mobile cloud computing. Int. J. Comput. Sci. Inf. 2(3), 73\u201376 (2012)","journal-title":"Int. J. Comput. Sci. Inf."},{"issue":"10","key":"47_CR6","first-page":"697","volume":"5","author":"R Chandar","year":"2014","unstructured":"Chandar, R., Kavitha, M.S., Seenivasan, K.: A proficient model for high end security in cloud computing. Int. J. Emerg. Res. Manage. Technol. 5(10), 697\u2013702 (2014)","journal-title":"Int. J. Emerg. Res. Manage. Technol."},{"issue":"7","key":"47_CR7","first-page":"2232","volume":"2","author":"S Singla","year":"2013","unstructured":"Singla, S., Singh, J.: Cloud computing security using authentication and encryption technique. IJARCET 2(7), 2232\u20132235 (2013)","journal-title":"IJARCET"},{"key":"47_CR8","volume-title":"Cryptography: Theory & Practice","author":"D Stinson","year":"2006","unstructured":"Stinson, D.: Cryptography: Theory & Practice. Chapman and Hall Publications, Boca Raton (2006)"},{"issue":"1","key":"47_CR9","first-page":"141","volume":"4","author":"R Nigoti","year":"2013","unstructured":"Nigoti, R., Jhuria, M., Singh, S.: A survey of cryptographic algorithms for cloud computing. Int. J. Emerg. Technol. Comput. Appl. Sci. 4(1), 141\u2013146 (2013)","journal-title":"Int. J. Emerg. Technol. Comput. Appl. Sci."},{"issue":"3","key":"47_CR10","first-page":"138","volume":"2","author":"V Gampala","year":"2012","unstructured":"Gampala, V., Inuganti, S., Muppidi, S.: Data security in cloud computing with elliptic curve cryptography. Int. J. Soft Comput. Eng. 2(3), 138\u2013141 (2012)","journal-title":"Int. J. Soft Comput. Eng."},{"issue":"5","key":"47_CR11","first-page":"945","volume":"4","author":"K Singh","year":"2012","unstructured":"Singh, K., Kharbanda, L., Kaur, N.: Security issue occurs in cloud computing and their solution. Int. J. Comput. Sci. Eng. 4(5), 945\u2013949 (2012)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"12","key":"47_CR12","first-page":"36","volume":"118","author":"JD Bokefode","year":"2015","unstructured":"Bokefode, J.D., Ubale, S.A., Pingale, S.V., Karane, K.J., Apate, S.S.: Developing secure cloud storage system by applying AES and RSA cryptography algorithms with role bases access control model. Int. J. Comput. Appl. 118(12), 36\u201347 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"47_CR13","first-page":"523","volume":"55","author":"R Sujatha","year":"2018","unstructured":"Sujatha, R., Ramakrishnan, M., Duraipandian, N., Ramakrishnan, B.: Optimal adaptive genetic algorithm based hybrid signcryption algorithm for information security. CMC 55(3), 523\u2013539 (2018)","journal-title":"CMC"},{"issue":"2","key":"47_CR14","doi-asserted-by":"crossref","first-page":"297","DOI":"10.32604\/cmc.2018.03808","volume":"57","author":"CF Cheang","year":"2018","unstructured":"Cheang, C.F., Wang, Y., Cai, Z., Xu, G.: Multi-VMs intrusion detection for cloud security using Dempster-Shafer theory. CMC 57(2), 297\u2013306 (2018)","journal-title":"CMC"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24274-9_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T06:26:14Z","timestamp":1695018374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24274-9_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242732","9783030242749"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24274-9_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}