{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:29:27Z","timestamp":1742966967266,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493356"},{"type":"electronic","value":"9783030493363"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_43","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"441-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Better Security in Public Cloud Computing"],"prefix":"10.1007","author":[{"given":"Sonia","family":"Amamou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zied","family":"Trifa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maher","family":"Khmakhem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Kantarci, B., Mouftah, H.T.: Vehicular clouds: State of the art, challenges and future directions. In: 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT). IEEE (2015)","DOI":"10.1109\/AEECT.2015.7360550"},{"issue":"3","key":"43_CR2","first-page":"618","volume":"8","author":"S Kaul","year":"2017","unstructured":"Kaul, S., Sood, K., Jain, A.: Cloud computing and its emerging need: advantages and issues. Int. J. Adv. Res. Comput. Sci. 8(3), 618\u2013624 (2017)","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"issue":"2011","key":"43_CR3","first-page":"1","volume":"500","author":"F Liu","year":"2011","unstructured":"Liu, F., et al.: NIST cloud computing reference architecture. NIST Spec. Publ. 500(2011), 1\u201328 (2011)","journal-title":"NIST Spec. Publ."},{"key":"43_CR4","unstructured":"Dinh, H.T., et al.: A survey of mobile cloud computing: architecture, applications, and approaches.\u00a0Wireless Commun. Mob. Comput. 13(18), 1587\u20131611 (2013)"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Jadeja, Y., Modi, K.: Cloud computing-concepts, architecture and challenges. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE (2012)","DOI":"10.1109\/ICCEET.2012.6203873"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, L.-J., Zhou, Q.: CCOA: cloud computing open architecture. In: 2009 IEEE International Conference on Web Services. IEEE (2009)","DOI":"10.1109\/ICWS.2009.144"},{"key":"43_CR7","unstructured":"Li, N., Mahalik, N.P.: A big data and cloud computing specification, standards and architecture: agricultural and food informatics. Int. J. Inf. Commun. Technol. 14(2), 159\u2013174 (2019)"},{"key":"43_CR8","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: Opportunities and challenges. Inf. Sci. 305, 357\u2013383 (2015)","journal-title":"Inf. Sci."},{"key":"43_CR9","unstructured":"Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats, and solutions. J. Network Comput. Appl. 75, 200\u2013222 (2016)"},{"key":"43_CR10","unstructured":"Murthy, G., Srinivas, R.: Achieving multidimensional k-anonymity by a greedy approach. In: Proceedings of the International Conference on Web Services Computing (2011)"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, P.M.V., Karthikeyan, M.: L-diversity on k-anonymity with external database for improving privacy preserving data publishing. Proc. Int. J. Comput. Appl. 54(14) (2012)","DOI":"10.5120\/8632-2341"},{"key":"43_CR12","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 571\u2013588 (2002). Carnegie Mellon University"},{"key":"43_CR13","unstructured":"Ashwin, M., Johannes, G., Daniel, K.: \u2113-Diversity: Privacy beyondk\u2013Anonymity.cs.cornell.edu, p. 7 (2007)"},{"issue":"4","key":"43_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"43_CR15","unstructured":"Palgon, G.: Tokenization and Enterprise Data Security. ISSA \u201f09 Information Systems Security Association, p. 23 (2009)"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Hu, L., Zhang, Y., Li, H., Yu, Y., Wu, F., Chu, J.: Challenges and trends on predicate encryption\u2014a better searchable encryption in cloud. J. Commun. 9(12), 908\u2013915 (2014). Jilin University, Changchun 130012, China, December 2014","DOI":"10.12720\/jcm.9.12.908-915"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Babbage, S.: Improved exhaustive search attacks on stream ciphers. In: European Convention on Security and Detection, IEE Conference Publication, vol. 408, pp. 161\u2013166. IEE (1995)","DOI":"10.1049\/cp:19950490"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Zadiraka, V.K., Kudin, A.M.: Cloud computing in cryptography and steganography. Cybermetics Syst. Anal. 49(4) (2013). UDC 681,3;519,72;003,.26","DOI":"10.1007\/s10559-013-9544-x"},{"issue":"4","key":"43_CR19","first-page":"2278","volume":"1","author":"P Kalpana","year":"2012","unstructured":"Kalpana, P., Singaraju, S.: Data security in cloud computing using RSA algorithm. Int. J. Res. Comput. Commun. Technol. IJRCCT ISSN 1(4), 2278\u20135841 (2012)","journal-title":"Int. J. Res. Comput. Commun. Technol. IJRCCT ISSN"},{"issue":"9","key":"43_CR20","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., De Donato, W., Pescap\u00e8, A.: Survey cloud monitoring: a survey. Comput. Networks 57(9), 2093\u20132115 (2013)","journal-title":"Comput. Networks"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T13:01:18Z","timestamp":1597237278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}