{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:03:30Z","timestamp":1748491410021,"version":"3.41.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319198477"},{"type":"electronic","value":"9783319198484"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19848-4_10","type":"book-chapter","created":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T13:11:34Z","timestamp":1433423494000},"page":"152-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cloud Computing: Security Issues Overview and Solving Techniques Investigation"],"prefix":"10.1007","author":[{"given":"Yu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chenggui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tilei","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,5]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Mana, A., Munoz, A., Gonzlez, J.: Dynamic security monitoring for virtualized environments in cloud computing. In: International Workshop on Securing Services on the Cloud, pp. 1\u20136. IEEE Press (2011)","DOI":"10.1109\/IWSSCloud.2011.6049018"},{"key":"10_CR2","unstructured":"Dinesh, C.: Secured data consistency and storage way in untrusted cloud using server management algorithm. Technical report 1111.2412, ArXiv e-prints (2011)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Liu, C., Zhang, X., Chen, J., Yang, C.: An authenticated key exchange scheme for efficient security-aware scheduling of scientific applications in cloud computing. In: Ninth International Conference on Dependable, Autonomic and Secure Computing, pp. 372\u2013379. IEEE Press (2011)","DOI":"10.1109\/DASC.2011.79"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3724\/SP.J.1001.2011.03958","volume":"22","author":"D Feng","year":"2011","unstructured":"Feng, D., Zhang, M., Zhang, Y., Xu, Z.: Cloud computing security research. J. Softw. 22, 71\u201382 (2011)","journal-title":"J. Softw."},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-113X-1-9","volume":"1","author":"F Doelitzscher","year":"2012","unstructured":"Doelitzscher, F., Reich, C., Knahl, M., Passfall, A., Clarke, N.: An agent based business aware incident detection system for cloud environments. J. Cloud Comput. 1(1), 1\u201319 (2012)","journal-title":"J. Cloud Comput."},{"key":"10_CR6","unstructured":"Vidhisha, G., Surekha, C., Rayudu, S.S., Seshadri, U.: Preserving privacy for secure and outsourcing for linear programming in cloud computing. Technical report 1211.1457, ArXiv e-prints (2012)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, G., Rong, C., Jaatun, M.G., Sandnes, F.E.: Deployment models-towards eliminating security concerns from cloud computing. In: International Conference on High Performance Computing and Simulation, pp. 189\u2013195. IEEE Press (2010)","DOI":"10.1109\/HPCS.2010.5547137"},{"issue":"3","key":"10_CR8","first-page":"31","volume":"2","author":"HA Dinesha","year":"2012","unstructured":"Dinesha, H.A., Agrawal, D.V.: Multi-dimensional password generation technique for accessing cloud services. Int. J. Cloud Comput.: Serv. Archit. 2(3), 31\u201339 (2012)","journal-title":"Int. J. Cloud Comput.: Serv. Archit."},{"issue":"1","key":"10_CR9","first-page":"1","volume":"4","author":"HM Alsafi","year":"2012","unstructured":"Alsafi, H.M., Abduallah, W.M., Pathan, A.S.K.: IDPS: an integrated intrusion handling model for cloud computing environment. Int. J. Comput. Inf. Technol. 4(1), 1\u201316 (2012)","journal-title":"Int. J. Comput. Inf. Technol."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: International Conference on Computer Sciences and Convergence Information Technology, pp. 18\u201321. IEEE Press (2010)","DOI":"10.1109\/ICCIT.2010.5711022"},{"key":"10_CR11","unstructured":"Xu, H., Guo, S., Chen, K.: Building confidential and efficient query services in the cloud with rasp data perturbation. In: IEEE Transactions on Knowledge and Data Engineering (2013)"},{"key":"10_CR12","unstructured":"Gul, I., Islam, M.H.: Cloud computing security auditing. In: The 2nd International Conference on Next Generation Information Technology, pp. 143\u2013148. IEEE Press (2011)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Yang, J., Chen, Z.: Cloud computing research and security issues. In: International Conference on Computational Intelligence and Software Engineering, pp. 1\u20133. IEEE Press, 2010","DOI":"10.1109\/CISE.2010.5677076"},{"key":"10_CR14","volume-title":"Distributed and cloud computing","author":"K Hwang","year":"2012","unstructured":"Hwang, K., Dongarra, J.J., Fox, G.C.: Distributed and cloud computing. Elsevier\/Morgan Kaufmann, Amsterdam, London (2012)"},{"key":"10_CR15","unstructured":"Venkataramana, K., Padmavathamma, M.: A threshold secure data sharing scheme for federated clouds. Technical report 1209.2614, ArXiv e-prints (2012)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Wazed Nafi, K., Shekha Kar, T., Anisul Hoque, S., Hashem, M.M.A.: A newer user authentication, file encryption and distributed server based cloud computing security architecture. Technical report 1303.0598, ArXiv e-prints (2013)","DOI":"10.14569\/IJACSA.2012.031029"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"AlZain, M.A., Soh, B., Pardede, E.: MCDB: using multi-clouds to ensure security in cloud computing. In: International Conference on Dependable, Autonomic and Secure Computing, pp. 784\u2013791. IEEE Press (2011)","DOI":"10.1109\/DASC.2011.133"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Gonzalez, N., Miers, C., Red\u00edgolo, F., Simpl\u00edcio, M., Carvalho, T., N\u00e4slund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. In: Third International Conference on Cloud Computing Technology and Science, pp. 231\u2013238. IEEE Press (2011)","DOI":"10.1109\/CloudCom.2011.39"},{"key":"10_CR19","unstructured":"National Institute of Standards & Technology (NIST). http:\/\/csrc.nist.gov\/groups\/SNS\/cloudCcomputing\/cloud-def-v15.doc"},{"key":"10_CR20","unstructured":"Aswani, P.N., Shekar, K.C.: Fuzzy keyword search over encrypted data using symbol-based Trie-traverse search scheme in cloud computing. Technical report 1211.3682, ArXiv e-prints (2012)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Goyal, P.: Application of a distributed security method to End-2-End services security in independent heterogeneous cloud computing environments. In: Services, pp. 379\u2013384. IEEE Press (2011)","DOI":"10.1109\/SERVICES.2011.34"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Kumar, P., Sehgal, V., Shah, K., Shukla, S.S.P., Chauhan, D.S.: A novel approach for security in cloud computing using Hidden Markov model and clustering. In: World Congress on Information and Communication Technologies, pp. 810\u2013815. IEEEPress (2011)","DOI":"10.1109\/WICT.2011.6141351"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Srivastava, P., Singh, S., Pinto, A.A., Verma, S., Chaurasiya, V.K., Gupta, R.: An architecture based on proactive model for security in cloud computing. In: Recent Trends in Information Technology, pp. 661\u2013666. IEEE Press, Chennai (2011)","DOI":"10.1109\/ICRTIT.2011.5972392"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Syam Kumar, P., Subramanian, R., Thamizh Selvam, D.: Ensuring data storage security in cloud computing using Sobol sequence. In: International Conference on Parallel Distributed and Grid Computing, pp. 217\u2013222. IEEE Press (2010)","DOI":"10.1109\/PDGC.2010.5679900"},{"issue":"3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s12599-011-0155-7","volume":"3","author":"R Accorsi","year":"2011","unstructured":"Accorsi, R., Lowis, D.I.L., Sato, Y.: Automated certification for compliant cloud-based business processes. Bus. Inf. Syst. Eng. 3(3), 145\u2013154 (2011)","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"1","key":"10_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-113X-1-12","volume":"1","author":"R Schwarzkopf","year":"2012","unstructured":"Schwarzkopf, R., Schmidt, M., Strack, C., Martin, S., Freisleben, B.: Increasing virtual machine security in cloud environments. J. Cloud Comput. 1(1), 1\u201312 (2012)","journal-title":"J. Cloud Comput."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"de Chaves, S.A., Westphall, C.B., Lamin, F.R.: SLA perspective in security management for cloud computing. In: International Conference on Networking and Services, pp. 212\u2013217. IEEE Press (2010)","DOI":"10.1109\/ICNS.2010.36"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Luo, S., Lin, Z., Chen, X., Yang, Z., Chen, J.: Virtualization security for cloud computing service. In: International Conference on Cloud and Service Computing, pp. 174\u2013179. IEEE Press (2011)","DOI":"10.1109\/CSC.2011.6138516"},{"key":"10_CR29","unstructured":"Pal, S., Khatua, S., Chaki, N., Sanyal, S.: A new trusted and collaborative agent based approach for ensuring cloud security. Technical report 1108.4100, ArXiv e-prints (2011)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Second International Conference on Cloud Computing Technology and Science, pp. 693\u2013702. IEEE Press (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Ramgovind, S., Eloff, M.M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, pp. 1\u20137. IEEE Press (2010)","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Tsai, T.H., Chen, Y.C., Huang, H.C., Huang, P.M., Chou, K.S.: A practical chinese wall security model in cloud computing. In: Asia-Pacific Network Operations and Management Symposium, pp. 1\u20134. IEEE Press (2011)","DOI":"10.1109\/APNOMS.2011.6076992"},{"key":"10_CR33","unstructured":"Jung, T., Li, X.Y., Wan, Z., Wan, M.: AnonyControl: control cloud data anonymously with multi-authority attribute-based encryption. Technical report 1206.2657, ArXiv e-prints (2012)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Bhraguram, T.M., Sumesh, M.S.: Cyber security information exchange based on data asset de-coupling factor in cloud computing. In: Recent Advances in Intelligent Computational Systems, pp. 89\u201395. IEEE Press (2011)","DOI":"10.1109\/RAICS.2011.6069279"},{"issue":"1","key":"10_CR35","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10723-012-9212-9","volume":"10","author":"TTA Dinh","year":"2012","unstructured":"Dinh, T.T.A., Wenqiang, W., Datta, A.: City on the sky: extending xacml for flexible, secure data sharing on the cloud. J. Grid Comput. 10(1), 151\u2013172 (2012)","journal-title":"J. Grid Comput."},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Mazurczyk, W., Szczypiorski, K.: Is cloud computing steganography-proof? In: International Conference on Multimedia Information Networking and Security, pp. 441\u2013442. IEEE Press (2011)","DOI":"10.1109\/MINES.2011.95"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-32873-2_5","volume-title":"Secure Data Management","author":"WQ Wang","year":"2012","unstructured":"Wang, W.Q., Anh, D.T.T., Lim, H.B., Datta, A.: Cloud and the city: facilitating flexible access control over data-streams. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2012. LNCS, vol. 7482, pp. 58\u201374. Springer, Heidelberg (2012)"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Sun, X., Chang, G., Li, F.: A trust management model to enhance security of cloud computing environments. In: Second International Conference on Networking and Distributed Computing, pp. 244\u2013248. IEEE Press (2011)","DOI":"10.1109\/ICNDC.2011.56"}],"container-title":["Lecture Notes in Computer Science","Intelligent Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19848-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T09:43:31Z","timestamp":1748425411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19848-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319198477","9783319198484"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19848-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"5 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}