{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:20:24Z","timestamp":1743139224762,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644189"},{"type":"electronic","value":"9783319644196"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64419-6_25","type":"book-chapter","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T22:42:00Z","timestamp":1502836920000},"page":"191-196","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Data Security Based on Data Partitions and Multiple Encryptions"],"prefix":"10.1007","author":[{"given":"B.","family":"Muthulakshmi","sequence":"first","affiliation":[]},{"given":"M.","family":"Venkatesulu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.ins.2013.12.027","volume":"276","author":"A Balu","year":"2014","unstructured":"Balu, A., Kuppusamy, K.: An expressive and provably secure ciphertext-policy attribute based encryption. Inf. Sci. 276(4), 354\u2013362 (2014)","journal-title":"Inf. Sci."},{"issue":"2","key":"25_CR2","doi-asserted-by":"crossref","first-page":"966","DOI":"10.1109\/COMST.2014.2364616","volume":"17","author":"C Esporito","year":"2015","unstructured":"Esporito, C., Ciauyie, M.: On security in publish and subscribe services: a survey. IEEE. Commun. Surv. Tut. 17(2), 966\u2013997 (2015)","journal-title":"IEEE. Commun. Surv. Tut."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Gomathisankaran, M., Tyagi, A., Namuduri, K.: HORNs: a homomorphic encryption scheme for cloud computing using Residue Number System. In: 5th Annual Conference on Information Sciences and Systems, Baltimore, MD, pp. 1\u20135 (2011)","DOI":"10.1109\/CISS.2011.5766176"},{"issue":"2","key":"25_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobaver","year":"2011","unstructured":"Grobaver, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50\u201357 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Hashizume, K., Rosado, D.G., Fernandez Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(1) (2013). 13 pages","DOI":"10.1186\/1869-0238-4-5"},{"key":"25_CR6","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1016\/j.procs.2015.03.087","volume":"45","author":"R Shaikh","year":"2015","unstructured":"Shaikh, R., Sasikumar, M.: Data classification for achieving security in cloud computing. Procedia Comput. Sci. 45, 493\u2013498 (2015). Science Direct","journal-title":"Procedia Comput. Sci."},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. N. (2014). Article ID 190903, 9 pages, doi: 10.1155\/2014\/190903","DOI":"10.1155\/2014\/190903"},{"issue":"8","key":"25_CR8","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Liang, K., Lin, J.K., Chen, J., Yu, J., Xie, W.: Attribute based data sharing scheme revisited in cloud computing. IEEE T. Inf. Foren. Sec. 11(8), 1661\u20131673 (2016)","journal-title":"IEEE T. Inf. Foren. Sec."},{"issue":"12","key":"25_CR9","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1109\/TIFS.2013.2286456","volume":"8","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role based access on encrypted data in cloud storage. IEEE T. Inf. Foren. Sec. 8(12), 1947\u20131960 (2014)","journal-title":"IEEE T. Inf. Foren. Sec."},{"key":"25_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38586-5_2","volume-title":"Security, Privacy and Trust in Cloud Systems","author":"D Thilakanathan","year":"2014","unstructured":"Thilakanathan, D., Chen, S., Nepal, S., Calvo, R.A.: Secure Data Sharing in the Cloud. In: Nepal, S., Pathan, M. (eds.) Security, Privacy and Trust in Cloud Systems. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-38586-5_2"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key crypto systems based on composite degree repository classes. In: Proceedings 17th International Conference Theory Application Cryptography Technology, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Yakonbov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: High Performance Extreme Computing Conference (HPEC), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/HPEC.2014.7040943"},{"key":"25_CR13","unstructured":"Maddineni, V.S.K., Ragi, S.: Security techniques for protecting data in cloud computing. A Master thesis, School of Computing, Blekinge Institute of Technology, Sweden (2011)"},{"key":"25_CR14","unstructured":"Tumulak, D.: Data Security in the Cloud. Vormetric, Gartner Inc. (2012)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science and Discrete Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64419-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T08:38:56Z","timestamp":1570005536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64419-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644189","9783319644196"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64419-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}