{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:48:40Z","timestamp":1743083320044,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":14,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132222194"},{"type":"electronic","value":"9788132222200"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_25","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"313-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Virtualized Architecture for Secure Database Management in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Manjeet","family":"Singh","sequence":"first","affiliation":[]},{"given":"Jasbeer","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Abouzeid, A., et al.: HadoopDB: an architectural hybrid of MapReduce and DBMS technologies for analytical workloads. VLDB (2009)","DOI":"10.14778\/1687627.1687731"},{"key":"25_CR2","unstructured":"Chris, G., et al.: The eucalyptus open source cloud computing system. In: IEEE international symposium on cluster computing and the grid (2009)"},{"key":"25_CR3","unstructured":"Robin, B.: What is cloud database? Suitability of algebraic data\u2019s technology to cloud computing. The Bloor Group. White Paper (2011)"},{"key":"25_CR4","volume-title":"Data Management in the Cloud: Limitations and Opportunities","author":"DJ Abadi","year":"2009","unstructured":"Abadi, D.J.: Data Management in the Cloud: Limitations and Opportunities. Yale University, New Haven (2009)"},{"key":"25_CR5","unstructured":"Das S., Elmore A., Wang S., Agrawal D., Abbadi A.E.: Autonomic, Elastic, Fault-Tolerant, Scalable, and Secure Data Management in the Cloud. University of California, 93106-5110"},{"key":"25_CR6","unstructured":"Ashraf, A., et al.: Deploying database appliances in the cloud. Data Engineering. IEEE Computing Society (2009)"},{"key":"25_CR7","volume-title":"Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems","author":"R Buyya","year":"2009","unstructured":"Buyya, R., et al.: Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Future Generation Computer Systems. Elsevier Science, Amsterdam (2009)"},{"key":"25_CR8","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. In: Proceedings of 6th USENIX Symposium on Operating Systems Design and Implementation, OSDI. San Francisco. USA, Dec 2004"},{"key":"25_CR9","unstructured":"Kantarcoglu, M., Clifton, C.: Security issues in querying encrypted data. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2004)"},{"key":"25_CR10","unstructured":"Virtualization Basics. AaSys Solution. http:\/\/www.aasysgroup.com (2014)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Lin, H.-Y., et al.: Toward data confidentiality via integrating hybrid encryption schemes and Hadoop distributed file system. In: IEEE International Conference on Advanced Information Networking and Applications (2012)","DOI":"10.1109\/AINA.2012.28"},{"key":"25_CR12","unstructured":"Dai Yuefa, W.B., Yaqiang G., Quan Z., Chaojing T.: Data security model for cloud computing. In: Proceedings of IWSA, China, Nov (2009)"},{"key":"25_CR13","unstructured":"Sanchika, G., et al.: A secure and lightweight approach for critical data security in cloud. In: Fourth International Conference on Computational Aspects of Social Networks (2012)"},{"key":"25_CR14","unstructured":"Gurudatt, K., et al.: A security aspects in cloud computing. In: IEEE 3rd International Conference on S\/W Engineering and Service Science (ICSESS), Beijing, pp. 547\u2013550. ISBN 978-1-4673-2007-i8, June (2012)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T01:47:50Z","timestamp":1675129670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}