{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:10:44Z","timestamp":1773655844885,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642316678","type":"print"},{"value":"9783642316685","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_8","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T00:34:43Z","timestamp":1340843683000},"page":"102-115","source":"Crossref","is-referenced-by-count":7,"title":["(More) Side Channels in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Pulls","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-03315-5_7","volume-title":"The Future of Identity in the Information Society","author":"S. Berthold","year":"2009","unstructured":"Berthold, S., B\u00f6hme, R., K\u00f6psell, S.: Data Retention and Anonymity Services. In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) The Future of Identity. IFIP AICT, vol.\u00a0298, pp. 92\u2013106. Springer, Heidelberg (2009)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J.L. Camenisch","year":"2001","unstructured":"Camenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"8_CR3","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: What\u2019s new about cloud computing security? Tech. Rep. UCB\/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010), \n                    \n                      http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2010\/EECS-2010-5.html"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/4236.978368","volume":"6","author":"I. Clarke","year":"2002","unstructured":"Clarke, I., Miller, S.G., Hong, T.W., Sandberg, O., Wiley, B.: Protecting free expression online with freenet. IEEE Internet Computing\u00a06(1), 40\u201349 (2002)","journal-title":"IEEE Internet Computing"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Danezis, G., Clayton, R.: Introducing traffic analysis. In: Attacks, Defences and Public Policy Issues. CRC Press (2007)","DOI":"10.1201\/9781420052183.ch5"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"8_CR7","first-page":"617","volume-title":"ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002)","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 2002), p. 617. IEEE Computer Society, Washington, DC, USA (2002)"},{"key":"8_CR8","unstructured":"Dropbox: Dropbox - simplify your life, \n                    \n                      https:\/\/www.dropbox.com\/\n                    \n                    \n                   (accessed May 17, 2011)"},{"key":"8_CR9","unstructured":"EUR-Lex - Access to European Union law: 32006l0024 - en (2012), \n                    \n                      http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:32006L0024:EN:NOT\n                    \n                    \n                   (accessed February 20, 2012)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. In: Symposium on Reliable Distributed Systems, pp. 189\u2013198 (2006)","DOI":"10.1109\/SRDS.2006.15"},{"issue":"6","key":"8_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D. Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy\u00a08(6), 40\u201347 (2010)","journal-title":"IEEE Security & Privacy"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S. Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 136\u2013149. Springer, Heidelberg (2010)"},{"key":"8_CR13","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: CS2: A semantic cryptographic cloud storage system. Tech. Rep. MSR-TR-2011-58, Microsoft Technical Report (May 2011), \n                    \n                      http:\/\/research.microsoft.com\/apps\/pubs\/"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Le-Blond, S., Chao, Z., Legout, A., Ross, K.W., Dabbous, W.: I know where you are and what you are sharing: Exploiting P2P communications to invade users\u2019 privacy. CoRR abs\/1109.4039 (2011)","DOI":"10.1145\/2068816.2068822"},{"key":"8_CR15","unstructured":"Le-Blond, S., Legout, A., Fessant, F.L., Dabbous, W., K\u00e2afar, M.A.: Spying the world from your laptop \u2013 identifying and profiling content providers and big downloaders in bittorrent. CoRR abs\/1004.0930 (2010)"},{"key":"8_CR16","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"8_CR17","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009), \n                    \n                      http:\/\/www.bitcoin.org\/sites\/default\/files\/bitcoin.pdf"},{"key":"8_CR18","unstructured":"Paysafecard: Discover the prepaid solution for the internet : paysafecard.com, \n                    \n                      http:\/\/www.paysafecard.com\n                    \n                    \n                   (accessed November 20, 2011)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-28496-0_5","volume-title":"Selected Areas in Cryptography","author":"D. Slamanig","year":"2012","unstructured":"Slamanig, D.: Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol.\u00a07118, pp. 73\u201391. Springer, Heidelberg (2012)"},{"issue":"2","key":"8_CR20","first-page":"359","volume":"8","author":"C. Soghoian","year":"2010","unstructured":"Soghoian, C.: Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era. Journal on Telecommunications and High Technology Law\u00a08(2), 359\u2013424 (2010), \n                    \n                      http:\/\/www.jthtl.org\/content\/articles\/V8I2\/JTHTLv8i2_Soghoian.PDF","journal-title":"Journal on Telecommunications and High Technology Law"},{"key":"8_CR21","unstructured":"SpiderOak: Zero-knowledge data backup, sync, access, storage and share from any device \u2014 spideroak.com, \n                    \n                      https:\/\/spideroak.com\/\n                    \n                    \n                   (accessed November 15, 2011)"},{"key":"8_CR22","unstructured":"Tarsnap: Tarsnap - online backups for the truly paranoid, \n                    \n                      https:\/\/www.tarsnap.com\/\n                    \n                    \n                   (accessed May 17, 2010)"},{"key":"8_CR23","unstructured":"The U.S Government Printing Office: Public Law 107 - 56 - Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (2001), \n                    \n                      http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-107publ56\/content-detail.html\n                    \n                    \n                   (accessed February 20, 2012)"},{"key":"8_CR24","unstructured":"Wikipedia: Five ws \u2014 wikipedia, the free encyclopedia (2011), \n                    \n                      https:\/\/secure.wikimedia.org\/wikipedia\/en\/w\/index.php?title=Five_Ws&oldid=442072782\n                    \n                    \n                   (accessed August 12, 2011)"},{"key":"8_CR25","unstructured":"Wikipedia: Friend-to-friend \u2014 wikipedia, the free encyclopedia (2012), \n                    \n                      http:\/\/en.wikipedia.org\/w\/index.php?title=Friend-to-friend&oldid=474069021\n                    \n                    \n                   (accessed February 18, 2012)"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1456469.1456474","volume-title":"Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS 2008)","author":"Z. Wilcox-O\u2019Hearn","year":"2008","unstructured":"Wilcox-O\u2019Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS 2008), pp. 21\u201326. ACM, New York (2008), \n                    \n                      http:\/\/portal.acm.org\/citation.cfm"},{"key":"8_CR27","unstructured":"Wired: Wikileaks posts mysterious \u2019insurance\u2019 file \u2014 threat level \u2014 wired.com (2011), \n                    \n                      http:\/\/www.wired.com\/threatlevel\/2010\/07\/wikileaks-insurance-file\/\n                    \n                    \n                   (accessed August 12, 2011)"},{"key":"8_CR28","unstructured":"Wuala: Wuala - secure online storage - backup. sync. share. access everywhere, \n                    \n                      https:\/\/www.wuala.com\/\n                    \n                    \n                   (accessed May 17, 2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:43:22Z","timestamp":1620114202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_8","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}