{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:21:25Z","timestamp":1740097285052,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319409726"},{"type":"electronic","value":"9783319409733"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40973-3_37","type":"book-chapter","created":{"date-parts":[[2016,6,13]],"date-time":"2016-06-13T19:00:19Z","timestamp":1465844419000},"page":"373-378","source":"Crossref","is-referenced-by-count":0,"title":["Cloud-Based Storage Model with Strong User Privacy Assurance"],"prefix":"10.1007","author":[{"given":"Amir","family":"Rezapour","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hung-Min","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,14]]},"reference":[{"key":"37_CR1","unstructured":"Dropbox. https:\/\/www.dropbox.com"},{"key":"37_CR2","unstructured":"Google drive. https:\/\/www.google.com\/drive\/"},{"key":"37_CR3","unstructured":"Smith v. maryland (1979)"},{"key":"37_CR4","volume-title":"The Future of Cloud Computing","author":"JQ Anderson","year":"2010","unstructured":"Anderson, J.Q., Rainie, H.: The Future of Cloud Computing. Pew Internet & American Life Project, Washington, DC (2010)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings ofthe 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 598\u2013609. ACM, New York (2007). http:\/\/doi.acm.org\/10.1145\/1315245.1315318","DOI":"10.1145\/1315245.1315318"},{"key":"37_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/3-540-45869-7_54","volume-title":"Document Analysis Systems V","author":"HS Baird","year":"2002","unstructured":"Baird, H.S., Popat, K.: Human interactive proofs and document image analysis. In: Lopresti, D.P., Hu, J., Kashi, R.S. (eds.) DAS 2002. LNCS, vol. 2423, pp. 507\u2013518. Springer, Heidelberg (2002). http:\/\/dl.acm.org\/citation.cfm?id=647798.736683"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1007\/11426639_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"JL Camenisch","year":"2005","unstructured":"Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302\u2013321. Springer, Heidelberg (2005). http:\/\/dx.doi.org\/10.1007\/11426639_18"},{"issue":"2","key":"37_CR8","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digitalpseudonyms. Commun. ACM 24(2), 84\u201390 (1981). http:\/\/doi.acm.org\/10.1145\/358549.358563","journal-title":"Commun. ACM"},{"issue":"2","key":"37_CR9","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion routing. Commun. ACM 42(2), 39\u201341 (1999)","journal-title":"Commun. ACM"},{"key":"37_CR10","unstructured":"Gross, G.: Cloud computing may draw government action. InfoWorld (2008). http:\/\/www.infoworld.com\/article\/2653754\/security\/cloud-computing-may-draw-government-action.html"},{"key":"37_CR11","volume-title":"Use of cloud computing applications and services","author":"J Horrigan","year":"2008","unstructured":"Horrigan, J.: Use of cloud computing applications and services. Pew Internet & American Life Project, Washington, D.C. (2008)"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol. 6054, pp. 136\u2013149. Springer, Heidelberg (2010). http:\/\/dl.acm.org\/citation.cfm?id=1894863.1894876"},{"key":"37_CR13","unstructured":"Kinetz, E.: Google, skype targeted in india security crackdown. The Huffington Post (2011). http:\/\/www.huffingtonpost.com\/2010\/09\/02\/google-skype-targeted-in-_n_703198.html"},{"key":"37_CR14","first-page":"359","volume":"8","author":"C Soghoian","year":"2010","unstructured":"Soghoian, C.: Caught in the cloud: privacy, encryption, and government back doors in the web 2.0 era. J. Telecomm. High Tech. L. 8, 359 (2010)","journal-title":"J. Telecomm. High Tech. L."},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Syverson, P.: Onion routing for resistance to traffic analysis. In: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2, pp. 108\u2013110. IEEE (2003)","DOI":"10.1109\/DISCEX.2003.1194938"}],"container-title":["Lecture Notes in Computer Science","Data Mining and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40973-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:18:22Z","timestamp":1498306702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40973-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319409726","9783319409733"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40973-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}