{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:09Z","timestamp":1725881529751},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_29","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:13:45Z","timestamp":1488438825000},"page":"289-295","source":"Crossref","is-referenced-by-count":4,"title":["Confidentiality and Storage of Data in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Prerna","family":"Mohit","sequence":"first","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"29_CR1","unstructured":"D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in IEEE Symposium on Security and Privacy. S&P, Proceedings. IEEE 2000, 44\u201355 (2000)"},{"key":"29_CR2","unstructured":"E.J. Goh, Secure Indexes. IACR Cryptology ePrint Archive, 216 (2003)"},{"key":"29_CR3","volume-title":"Privacy preserving keyword searches on remote encrypted data, Applied Cryptography and Network Security","author":"YC Chang","year":"2005","unstructured":"Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Applied Cryptography and Network Security (Springer, Berlin, 2005)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"P. Golle, J. Staddon, B. Waters, Secure conjunctive search over encrypted data, in ACNS 2004, Lecture Notes in Computer Science, vol. 3089 (Springer, 2004), p. 314","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proceedings of EUROCRYP04, LNCS, vol. 3027 (Springer, 2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM Conference on Computer and Communications Security (ACM, 2006), pp. 79\u201388","DOI":"10.1145\/1180405.1180417"},{"key":"29_CR7","volume-title":"UC-secure searchable symmetric encryption, Financial Cryptography and Data Security","author":"K Kurosawa","year":"2012","unstructured":"K. Kurosawa, Y. Ohtaki, UC-secure searchable symmetric encryption, Financial Cryptography and Data Security (Springer, Berlin, 2012)"},{"key":"29_CR8","first-page":"1","volume":"343","author":"Z Jianhong","year":"2016","unstructured":"Z. Jianhong, D. Qiaocui, Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1\u201314 (2016)","journal-title":"Inf. Sci."},{"key":"29_CR9","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2015.10.003","volume":"57","author":"V Chang","year":"2016","unstructured":"V. Chang, W. Gary, A model to compare cloud and non-cloud storage of big data. Future Gener. Comput. Syst. 57, 56\u201376 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"29_CR10","unstructured":"L. Yan, C. Rong, G. Zhao, Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, in Cloud Computing (2009), pp. 167\u2013177"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:00:52Z","timestamp":1568876452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}