{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:19Z","timestamp":1725881539504},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_50","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:13:45Z","timestamp":1488438825000},"page":"483-489","source":"Crossref","is-referenced-by-count":0,"title":["Preventive Maintenance Approach for Storage and Retrieval of Sensitive Data"],"prefix":"10.1007","author":[{"given":"V","family":"Madhusudhan","sequence":"first","affiliation":[]},{"given":"V","family":"Suma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"50_CR1","unstructured":"Q. He, X. Zhang, Z. Li, Data deduplication techniques, in IEEE, International Conference on Future Information Technology and Management Engineering, (2010)"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"H. Wu, Z. Xue, W. Zhou, H. He, X. Dong, R. Li, Secure sensitive data sharing on a big data platform, Tsinghua Sci. Technol. 20(1), 72\u201380 (2015). ISSN1007-021408\/11","DOI":"10.1109\/TST.2015.7040516"},{"key":"50_CR3","unstructured":"P.S. Chen, R. Zhang, A dynamic cryptographic access control scheme in cloud storage services, Scientific Research Fund of Zhejiang Provincial Education Department, Zhejiang Provincial Key Specific Project of Science & Technology, (2010)"},{"key":"50_CR4","unstructured":"D. Feng, M. Zhang, C. Hong, Z. Lv, A secure and efficient revocation scheme for fine-grained access control in cloud storage, in IEEE, 4th International Conference on Cloud Computing Technology and Science, (2012)"},{"key":"50_CR5","unstructured":"Z. Su, W.-S. Ku, J. Feng, Y. Chen, D-DOG: securing sensitive data in distributed storage space by data division and out-of-order keystream generations, (IEEE ICC, 2010)"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"S. Vijayarani, A. Tamilarasi, An efficient masking technique for sensitive data protection, in IEEE-International Conference on Recent Trends in Information Technology, ICRTIT, (2011)","DOI":"10.1109\/ICRTIT.2011.5972275"},{"key":"50_CR7","unstructured":"S.M.S. Bhanu, K.K. Hingwe, Two layered protection for sensitive data in cloud, (IEEE, 2014)"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"E. Bertino, X. Shu, D. Yao, Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10(5), 2015","DOI":"10.1109\/TIFS.2015.2398363"},{"key":"50_CR9","unstructured":"Y. Dai, B.Y. Zhao, W. Chen, J. Tian, Z. Yang, Probabilistic failure detection for efficient distributed storage maintenance, in IEEE, Symposium on Reliable Distributed Systems, (2008)"},{"key":"50_CR10","unstructured":"F. Liu, L. Tian, N. Xiao, H. Jian, F. Yinjin, AA-dedupe: an application-aware source deduplication approach for cloud backup services in the personal computing environment, in IEEE International Conference on Cluster Computing, (2011)"},{"key":"50_CR11","unstructured":"X. Sun, T. Xu, W. Zhang, Data privacy protection using multiple cloud storages, in IEEE, International Conference on Mechatronic Sciences, Electric Engineering and Computer, (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:01:58Z","timestamp":1568876518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}