{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:43:26Z","timestamp":1765370606778,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031803109"},{"type":"electronic","value":"9783031803116"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80311-6_14","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:30:49Z","timestamp":1733963449000},"page":"281-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Vault Scheme in\u00a0the\u00a0Cloud Operating Model"],"prefix":"10.1007","author":[{"given":"Rishiraj","family":"Bhattacharyya","sequence":"first","affiliation":[]},{"given":"Avradip","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Meghna","family":"Sengupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"14_CR1","unstructured":"Anonomatic. PII Compliance Made Easy with PII as a Service. https:\/\/anonomatic.com\/"},{"key":"14_CR2","unstructured":"ANSI. ANSI X9.119-2-2017, Retail Financial Services - Requirements For Protection Of Sensitive Payment Card Data - Part 2: Implementing Post-Authorization Tokenization Systems. https:\/\/webstore.ansi.org\/Standards\/ASCX9\/ansix91192017"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Aragona, R., Longo, R., Sala, M.: Several proofs of security for a tokenization algorithm. Appl. Algebra Eng., Commun. Comput. 28(5), 425\u2013436 (2017)","DOI":"10.1007\/s00200-017-0313-3"},{"key":"14_CR4","unstructured":"AWS. AWS serverless tokenization. https:\/\/github.com\/aws-samples\/aws-serverless-tokenization\/"},{"key":"14_CR5","unstructured":"Basis Theory. What are Tokens? https:\/\/developers.basistheory.com\/docs\/concepts\/what-are-tokens"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535\u2013552. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74143-5_30","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-Locked Encryption and Secure Deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296\u2013312. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_18","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (eds.) EUROCRYPT\u00a02006, vol. 4004. LNCS, pp. 409\u2013426. Springer, Heidelberg, May\/June 2006","DOI":"10.1007\/11761679_25"},{"key":"14_CR9","unstructured":"BoxyHQ. LLM Vault. The secrets layer for AI. https:\/\/boxyhq.com\/"},{"key":"14_CR10","unstructured":"CyberNews. ChatGPT tied to Samsung\u2019s alleged data leak. https:\/\/cybernews.com\/news\/chatgpt-samsung-data-leak\/"},{"key":"14_CR11","unstructured":"Delinea. Delegated Machine Credentials. https:\/\/delinea.com\/"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"D\u00edaz-Santiago, S., Mar\u00eda Rodr\u00edguez-Henr\u00edquez, L., Chakraborty, D.: A cryptographic study of tokenization systems. Int. J. Inf. Secur. 15(4), 413\u2013432 (2016)","DOI":"10.1007\/s10207-015-0313-x"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Bet\u00fcl Durak, F., Horst, H., Horst, M., Vaudenay, S.: Fast: Secure and high performance format-preserving encryption and tokenization. Cryptology ePrint Archive, Paper 2021\/1171 (2021). https:\/\/eprint.iacr.org\/2021\/1171","DOI":"10.1007\/978-3-030-92078-4_16"},{"key":"14_CR14","unstructured":"Entrust. Entrust, Token Manager Solutions. https:\/\/www.entrust.com\/"},{"key":"14_CR15","unstructured":"Evervault. How Evervault Secures Data with Encryption and Privacy Controls. https:\/\/evervault.com\/"},{"key":"14_CR16","unstructured":"Hashicorp. Clound Operating Model. https:\/\/www.hashicorp.com\/cloud-operating-model"},{"key":"14_CR17","unstructured":"Hashicorp. Hashicorp, Vault. https:\/\/www.hashicorp.com\/products\/vault"},{"key":"14_CR18","unstructured":"PCI Security Standards. PCI DSS Requirements and Security Assessment Procedures, Version 3.2. Technical Report (2016). https:\/\/listings.pcisecuritystandards.org\/documents\/PCI_DSS-QRG-v3_2_1.pdf"},{"key":"14_CR19","unstructured":"Protegrity. AI-Powered dagta security designed for data consumption. https:\/\/protegrity.com\/"},{"key":"14_CR20","unstructured":"Skyflow. Data Privacy with Skyflow LLM Privacy Vault. https:\/\/skyflow.com\/post\/generative-ai-data-privacy-skyflow-llm-privacy-vault"},{"key":"14_CR21","unstructured":"Very Good Security (VGS). What is VGS? Protecting Your Data with Very Good Security. https:\/\/www.verygoodsecurity.com\/"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Jia Xu, Ee-Chien Chang, and Jianying Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS \u201913, pp. 195\u2013206. Association for Computing Machinery, New York (2013)","DOI":"10.1145\/2484313.2484340"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","volume":"8","author":"P Yang","year":"2020","unstructured":"Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723\u2013131740 (2020)","journal-title":"IEEE Access"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Deng, R.H., Xu, S., Sun, J., Li, Q., Zheng, D.: Attribute-based encryption for cloud computing access control: a survey. ACM Comput. Surv. 53(4), August 2020","DOI":"10.1145\/3398036"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80311-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:03:32Z","timestamp":1733965412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80311-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031803109","9783031803116"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80311-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}