{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:59:16Z","timestamp":1726055956818},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335847"},{"type":"electronic","value":"9783030335854"}],"license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33585-4_6","type":"book-chapter","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:03:38Z","timestamp":1572105818000},"page":"61-74","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Distributed Multi Cloud Storage System to Improve Data Security with Hybrid Encryption"],"prefix":"10.1007","author":[{"given":"Sayed Uz","family":"Zaman","sequence":"first","affiliation":[]},{"given":"Rezaul","family":"Karim","sequence":"additional","affiliation":[]},{"given":"Mohammad Shamsul","family":"Arefin","sequence":"additional","affiliation":[]},{"given":"Yasuhiko","family":"Morimoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"6_CR1","unstructured":"Darrell, L.: Unlimited cloud storage at Amazon.com, inc on black Friday. \n                  http:\/\/www.bidnessetc.com\/58232-unlimited-cloud-storage-at-amazoncominc-on-black-friday"},{"key":"6_CR2","unstructured":"Howley, D.: Is Microsoft\u2019s onedrive the best cloud storage service. \n                  https:\/\/www.yahoo.com\/tech\/microsoft-killsunlimited-onedrive-accounts-1759\n                  \n                 27221"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp. 142\u2013146. IEEE (2012)","DOI":"10.1109\/MINES.2012.240"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Qiu, M., Li, H., Sha, E.H.-M.: Heterogeneous real-time embedded software optimization considering hardware platform. In: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1637\u20131641. ACM (2009)","DOI":"10.1145\/1529282.1529651"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.jpdc.2007.06.014","volume":"68","author":"M Qiu","year":"2008","unstructured":"Qiu, M., Sha, E.H.-M., Liu, M., Lin, M., Hua, S., Yang, L.T.: Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. J. Parallel Distrib. Comput. 68(4), 443\u2013455 (2008)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"6_CR6","first-page":"28","volume":"7","author":"K Gai","year":"2014","unstructured":"Gai, K., Steenkamp, A.: A feasibility study of platform-as-a-service using cloud computing for a global service organization. J. Inf. Syst. Appl. Res. 7(3), 28 (2014)","journal-title":"J. Inf. Syst. Appl. Res."},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSC.2011.24","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220\u2013232 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"6_CR8","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-04444-1_22","volume-title":"Computer Security \u2013 ESORICS 2009","author":"Qian Wang","year":"2009","unstructured":"Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Symposium on Research in Computer Security, pp. 355\u2013370 (2009)"},{"issue":"10","key":"6_CR10","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2013","unstructured":"Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271\u20132282 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR11","unstructured":"Mohamed, E.M., Abdelkader, H.S., El-Etriby, S.: Enhanced data security model for cloud computing. In: 2012 8th International Conference on Informatics and Systems (INFOS), p. 12. IEEE (2012)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Dubey, A.K., Dubey, A.K., Namdev, M., Shrivastava, S.S.: Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in Java environment. In: 2012 CSI Sixth International Conference on Software Engineering (CONSEG), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/CONSEG.2012.6349503"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","volume":"10","author":"H Tian","year":"2015","unstructured":"Tian, H., Chen, Y., Chang, C.-C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10, 701\u2013714 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"6_CR14","unstructured":"Abed, D.F.S.: A proposed method of information hiding based on hybrid cryptography and steganography. Int. J. Appl. Innov. Eng. Manag. 2(4) (2013)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), pp. 140\u2013145. IEEE (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.68"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing and Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33585-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:05:51Z","timestamp":1572105951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33585-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"ISBN":["9783030335847","9783030335854"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33585-4_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"27 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Koh Samui","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}