{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:46:07Z","timestamp":1725763567318},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642452031"},{"type":"electronic","value":"9783642452048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45204-8_3","type":"book-chapter","created":{"date-parts":[[2013,12,11]],"date-time":"2013-12-11T07:04:25Z","timestamp":1386745465000},"page":"27-42","source":"Crossref","is-referenced-by-count":1,"title":["Risk Aware Approach to Data Confidentiality in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Kerim Yasin","family":"Oktay","sequence":"first","affiliation":[]},{"given":"Vaibhav","family":"Khadilkar","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Lev-Ram, M.: Why Zynga loves the hybrid cloud (2012), http:\/\/tech.fortune.cnn.com\/2012\/04\/09\/zynga-2\/?iid=HP_LN"},{"key":"3_CR2","unstructured":"Mearian, L.: EMC\u2019s Tucci sees hybrid cloud becoming de facto standard (2011), http:\/\/www.computerworld.com\/s\/article\/9216573\/EMC_s_Tucci_sees_hybrid_cloud_becoming_de_facto_standard"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhou, X.Y., Chen, Y., Wang, X., Ruan, Y.: Sedic: privacy-aware data intensive computing on hybrid clouds. In: ACM Conference on Computer and Communications Security, pp. 515\u2013526 (2011)","DOI":"10.1145\/2046707.2046767"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Oktay, K.Y., Khadilkar, V., Hore, B., Kantarcioglu, M., Mehrotra, S., Thuraisingham, B.: Risk-Aware Workload Distribution in Hybrid Clouds. In: IEEE CLOUD, pp. 229\u2013236 (2012)","DOI":"10.1109\/CLOUD.2012.128"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Diallo, M., Hore, B., Chang, E.C., Mehrotra, S., Venkatasubramanian, N.: CloudProtect: Managing Data Privacy in Cloud Applications. In: IEEE CLOUD (2012)","DOI":"10.1109\/CLOUD.2012.122"},{"key":"3_CR6","unstructured":"Hybrid Cloud. The NIST Definition of Cloud Computing. National Institute of Science and Technology, Special Publication, 800-145 (2011)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-85259-9_3","volume-title":"Secure Data Management","author":"M.R. Fouad","year":"2008","unstructured":"Fouad, M.R., Lebanon, G., Bertino, E.: ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2008. LNCS, vol.\u00a05159, pp. 32\u201349. Springer, Heidelberg (2008)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Trabelsi, S., Salzgeber, V., Bezzi, M., Montagnon, G.: Data disclosure risk evaluation. In: CRiSIS, pp. 35\u201372 (2009)","DOI":"10.1109\/CRISIS.2009.5411979"},{"key":"3_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14778\/1920841.1920906","volume":"3","author":"T. Nykiel","year":"2010","unstructured":"Nykiel, T., Potamias, M., Mishra, C., Kollios, G., Koudas, N.: MRShare: sharing across multiple queries in MapReduce. Proc. VLDB Endow.\u00a03, 1\u20132 (2010)","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J. Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM\u00a051(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"3_CR11","unstructured":"Apache Hadoop, http:\/\/hadoop.apache.org\/"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: SIGMOD, pp. 216\u2013227 (2002)","DOI":"10.1145\/564716.564717"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, K., Zhou, X., Chen, Y., Wang, X., Ruan, Y.: Sedic: privacy-aware data intensive computing on hybrid clouds. In: CCS 2011. ACM (2011)","DOI":"10.1145\/2046707.2046767"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-0-387-48533-1_7","volume-title":"Handbook of Database Security","author":"B. Hore","year":"2008","unstructured":"Hore, B., Mehrotra, S., Hacigm, H.: Managing and querying encrypted data. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 163\u2013190. Springer, US (2008)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Bagherzandi, A., Hore, B., Mehrotra, S.: Search over Encrypted Data. In: Encyclopedia of Cryptography and Security. Springer (2011)","DOI":"10.1007\/978-1-4419-5906-5_914"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Hore, B., Mehrotra, S.: Privacy of Outsourced Dat. In: Encyclopedia of Cryptography and Security. Springer (2011)","DOI":"10.1007\/978-1-4419-5906-5_761"},{"key":"3_CR17","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: IEEE International Conference in Data Engineering (2002)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Wu, S., Li, F., Mehrotra, S., Ooi, B.C.: Query Optimization for massively parallel data processing. In: SoCC 2011 (2011)","DOI":"10.1145\/2038916.2038928"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45204-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T22:45:49Z","timestamp":1597185949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45204-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642452031","9783642452048"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45204-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}