{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:46:28Z","timestamp":1740098788849,"version":"3.37.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319503394"},{"type":"electronic","value":"9783319503400"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50340-0_38","type":"book-chapter","created":{"date-parts":[[2016,12,31]],"date-time":"2016-12-31T06:02:28Z","timestamp":1483164148000},"page":"433-443","source":"Crossref","is-referenced-by-count":0,"title":["Studying Security of Data in Cloud Computing Through Cryptographic Approach"],"prefix":"10.1007","author":[{"given":"Hosam F.","family":"El-Sofany","sequence":"first","affiliation":[]},{"given":"Samir A.","family":"El-Seoud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,1]]},"reference":[{"issue":"4","key":"38_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Grith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010). http:\/\/dx.doi.org\/10.1145\/1721654.1721672","journal-title":"Commun. ACM"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., Iacono, L.: On technical security issues in cloud computing. In: IEEE International Conference on Cloud Computing, Bangalore, pp. 109\u2013116, 21\u201325 September 2009","DOI":"10.1109\/CLOUD.2009.60"},{"key":"38_CR3","unstructured":"Gens, F.: New IDC It Cloud Services Survey: Top Benefits and Challenges (2009)"},{"key":"38_CR4","unstructured":"http:\/\/blogs.idc.com\/ie\/?p=730"},{"key":"38_CR5","unstructured":"Cloud Security Alliance (2010). Top threats to cloudcomputing, version1.0. http:\/\/www.cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf"},{"key":"38_CR6","unstructured":"AnoopMS, Publickey Cryptography (Applications Algorithm and Mathematical Explanations)"},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-10665-1_15","volume-title":"Cloud Computing","author":"L Yan","year":"2009","unstructured":"Yan, L., Rong, C., Zhao, G.: Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 167\u2013177. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10665-1_15"},{"key":"38_CR8","unstructured":"Chappell, D.: A Short Introduction to Cloud Platforms. http:\/\/www.davidchappell.com\/CloudPlatforms\u2013Chappell.pdf"},{"key":"38_CR9","unstructured":"Brodkin, J.: Gartner: Seven Cloud-Computing Security Risks, InfoWorld (2008). http:\/\/www.infoworld.com\/d\/security-central\/gartner-seven-cloud-computing-security-risks-853"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, vol. 1, Hangzhou, pp. 647\u2013651, 23\u201325 March 2012","DOI":"10.1109\/ICCSEE.2012.193"},{"issue":"2","key":"38_CR11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50\u201357 (2011). http:\/\/dx.doi.org\/10.1109\/MSP.2010.115","journal-title":"IEEE Secur. Priv."},{"key":"38_CR12","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. In: Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010"},{"issue":"1","key":"38_CR13","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MC.2009.20","volume":"42","author":"N Leavitt","year":"2009","unstructured":"Leavitt, N.: Is cloud computing really ready for prime time? Computer 42(1), 15\u201320 (2009). http:\/\/dx.doi.org\/10.1109\/MC.2009.20","journal-title":"Computer"},{"key":"38_CR14","unstructured":"Popovic\u0301, K., Hocenski, Z.: Cloud computing security issues and challenges. In: Proceedings of the 33rd International Convention in MIPRO, pp. 344\u2013349 (2010)"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Ramgovind, S., Elo, M., Smith, E.: The management of security in cloud computing. In: Information Security for South Africa, Sandton, pp. 1\u20137, 2\u20134 August 2010","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Kandukuri, B.R., Paturi, V.R., Rakshit, A.: Cloud security issues. In: Proceedings of the 2009 IEEE International Conference on Services Computing, Washington DC, pp. 517\u2013520. 21\u201325 September 2009. http:\/\/dx.doi.org\/10.1109\/SCC.2009.84","DOI":"10.1109\/SCC.2009.84"},{"issue":"3","key":"38_CR17","first-page":"26","volume":"3","author":"K Heena","year":"2012","unstructured":"Heena, K., Chouhan, D.S.: Building trust in cloud using public key infrastructure- a step towards cloud trust. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 3(3), 26\u201331 (2012)","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"issue":"2","key":"38_CR18","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"}],"container-title":["Advances in Intelligent Systems and Computing","Interactive Collaborative Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50340-0_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:05:56Z","timestamp":1498359956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50340-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319503394","9783319503400"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50340-0_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}