{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:56:15Z","timestamp":1725846975469},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319284293"},{"type":"electronic","value":"9783319284309"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28430-9_28","type":"book-chapter","created":{"date-parts":[[2016,1,9]],"date-time":"2016-01-09T04:32:28Z","timestamp":1452313948000},"page":"367-385","source":"Crossref","is-referenced-by-count":0,"title":["Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks"],"prefix":"10.1007","author":[{"given":"Chaowen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yutong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"PeiSheng","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,10]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Jian-Hua, Z., Nan, Z.: Cloud computing-based data storage and disaster recovery. In: Proceedings of the International Conference on Future Computer Science and Education (ICFCSE 2011), Xi\u2019an, China, August 2011, pp. 629\u2013632 (2011)","DOI":"10.1109\/ICFCSE.2011.157"},{"issue":"1","key":"28_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1496091.1496100","volume":"39","author":"LM Vaquero","year":"2009","unstructured":"Vaquero, L.M., Rodero-Merino, L., Caceres, J.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50\u201355 (2009)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"28_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"issue":"2","key":"28_CR4","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.future.2008.07.009","volume":"25","author":"RL Grossman","year":"2009","unstructured":"Grossman, R.L., Gu, Y., Sabala, M., Zhang, W.: Compute and storage clouds using wide area high performance networks. Future Gener. Comput. Syst. 25(2), 179\u2013183 (2009)","journal-title":"Future Gener. Comput. Syst."},{"issue":"7","key":"28_CR5","first-page":"3","volume":"32","author":"JZ Luo","year":"2011","unstructured":"Luo, J.Z., Jin, J.H., Song, A.B.: Cloud computing: architecture and key technologies. J. Commun. 32(7), 3\u201321 (2011)","journal-title":"J. Commun."},{"issue":"5","key":"28_CR6","first-page":"1100","volume":"39","author":"JY Wu","year":"2011","unstructured":"Wu, J.Y., Fu, J.Q., Ping, L.D.: Study on the P2P cloud storage system. Acta Electronica Sinica 39(5), 1100\u20131107 (2011)","journal-title":"Acta Electronica Sinica"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-642-28368-0_28","volume-title":"Cryptography and Security: From Theory to Applications","author":"SS Chow","year":"2012","unstructured":"Chow, S.S., Chu, C.-K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. In: Naccache, D. (ed.) Cryphtography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 442\u2013464. Springer, Heidelberg (2012)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Brinkmann, A., Eddert, S., Meyer Auf Der Heide, F.: Dynamic and redundant data placement. In: 27th International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, pp. 87\u201395 (2007)","DOI":"10.1109\/ICDCS.2007.103"},{"issue":"1","key":"28_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3724\/SP.J.1001.2011.03958","volume":"22","author":"DG Feng","year":"2011","unstructured":"Feng, D.G., Zhang, M., Zhang, Y.: Study on cloud computing security. J. Softw. 22(1), 77\u201383 (2011)","journal-title":"J. Softw."},{"issue":"3","key":"28_CR10","first-page":"472","volume":"33","author":"J Yang","year":"2012","unstructured":"Yang, J., Wang, H.H., Wang, J.: Survey on some security issues of cloud computing. J. Chin. Comput. Syst. 33(3), 472\u2013479 (2012)","journal-title":"J. Chin. Comput. Syst."},{"issue":"2","key":"28_CR11","first-page":"455","volume":"40","author":"C Cachin","year":"2009","unstructured":"Cachin, C., Alex, I.K., Shraer, E.: Trusting the cloud. ACM SIGACT News 40(2), 455\u2013461 (2009)","journal-title":"Trusting the cloud. ACM SIGACT News"},{"key":"28_CR12","first-page":"240","volume":"48","author":"QY Lin","year":"2011","unstructured":"Lin, Q.Y., Gui, X.L., Shi, D.Q., Wang, X.P.: Study of the secure access strategy of cloud storages. J. Comput. Res. Dev. 48, 240\u2013243 (2011)","journal-title":"J. Comput. Res. Dev."},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Blaze, M.: Cryptographic file system for Unix. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, November 1993, pp. 9\u201316 (1993)","DOI":"10.1145\/168588.168590"},{"key":"28_CR14","unstructured":"Fu, K., Kaashoek, M.F., Mazieres, D.: Fast and secure distributed read-only file system. In: Proceedings of the 4th Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, pp. 181\u2013196 (2000)"},{"key":"28_CR15","unstructured":"Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: a secure and convenient cryptographic file system. In: Proceedings of the Annual USENIX Technical Conference, San Antonio, pp. 197\u2013210 (2003)"},{"issue":"2","key":"28_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1534912.1534914","volume":"5","author":"WM Storer","year":"2009","unstructured":"Storer, W.M., Greenan, M.K., Miller, E.: POTSHARDS: a secure, recoverable, long-term archival storage system. ACM Trans. Storage 5(2), 1\u201335 (2009)","journal-title":"ACM Trans. Storage"},{"issue":"5","key":"28_CR17","doi-asserted-by":"publisher","first-page":"858","DOI":"10.3724\/SP.J.1016.2008.00858","volume":"31","author":"YL Zhao","year":"2008","unstructured":"Zhao, Y.L., Dai, Z.X., Wang, Z.G.: Research on storage system architecture of the intelligent network disk (IND). Chin. J. Comput. 31(5), 858\u2013867 (2008)","journal-title":"Chin. J. Comput."},{"issue":"8","key":"28_CR18","doi-asserted-by":"publisher","first-page":"2255","DOI":"10.3724\/SP.J.1001.2009.03386","volume":"20","author":"Z Wang","year":"2009","unstructured":"Wang, Z., Luo, W.M., Yan, B.P.: Optimal mechanism of parallel downloading. J. Softw. 20(8), 2255\u20132268 (2009)","journal-title":"J. Softw."},{"key":"28_CR19","unstructured":"Tao, M.: Design and Implementation of File Encryption System Based on Windows IFS Filter Driver. Chengdu Electronics Technology University, Chengdu (2012)"},{"issue":"7","key":"28_CR20","first-page":"1181","volume":"28","author":"L Zheng","year":"2007","unstructured":"Zheng, L., Ma, Z.F., Gu, M.: Techniques of file system filter driver-based and security-enhanced encryption system. J. Chin. Comput. Syst. 28(7), 1181\u20131184 (2007)","journal-title":"J. Chin. Comput. Syst."},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H.R., Radia, S.: The hadoop distributed file system. In: Proceedings of the IEEE 26th Symposium on Storage Systems and Technologies (MSST 2010), Piscataway, NJ, USA, May 2010, p. 1 (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"issue":"1","key":"28_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavithaa, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"28_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"2009","author":"LM Kaufman","year":"2009","unstructured":"Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 2009(7), 61\u201364 (2009)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"28_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1288783.1288786","volume":"3","author":"AR Yumerefendi","year":"2007","unstructured":"Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Trans. Storage 3(3), 1\u201333 (2007). (article 11)","journal-title":"ACM Trans. Storage"},{"key":"28_CR25","unstructured":"Maheshwari, U., Vingralek, R., Shapiro, W.: How to build a trusted database system on untrusted storage. In: Proceedings of the Symposium on Operating System Design and Implementation, San Diego, Calif, USA, pp. 10\u201320 (2000)"},{"issue":"3","key":"28_CR26","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/TCYB.2013.2256782","volume":"44","author":"SJ Zhang","year":"2014","unstructured":"Zhang, S.J., Wang, Z.D., Ding, D.R., Shu, H.S.: Fuzzy filtering with randomly occurring parameter uncertainties, interval delays, and channel fadings. IEEE Trans. Cybern. 44(3), 406\u2013417 (2014)","journal-title":"IEEE Trans. Cybern."},{"issue":"3","key":"28_CR27","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TII.2013.2251891","volume":"9","author":"X He","year":"2013","unstructured":"He, X., Wang, Z.D., Liu, Y.R., Zhou, D.H.: Least-squares fault detection and diagnosis for networked sensing systems using a direct state estimation approach. IEEE Trans. Industr. Inf. 9(3), 1670\u20131679 (2013)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"10","key":"28_CR28","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.sysconle.2013.06.004","volume":"62","author":"ZD Wang","year":"2013","unstructured":"Wang, Z.D., Ding, D.R., Dong, H.L., Shu, H.: H\n          \u221e consensus control for multi-agent systems with missing measurements: the finite-horizon case. Syst. Control Lett. 62(10), 827\u2013836 (2013)","journal-title":"Syst. Control Lett."},{"issue":"4","key":"28_CR29","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1080\/00207179.2012.756149","volume":"86","author":"J Hu","year":"2013","unstructured":"Hu, J., Wang, Z., Shen, B., Gao, H.: Quantised recursive filtering for a class of nonlinear systems with multiplicative noises and missing measurements. Int. J. Control 86(4), 650\u2013663 (2013)","journal-title":"Int. J. Control"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28430-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T05:14:29Z","timestamp":1559366069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28430-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319284293","9783319284309"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28430-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}