{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:26:13Z","timestamp":1742995573096,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_156","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"979-984","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New User Management Technique in Storage Services for Stronger Privacy"],"prefix":"10.1007","author":[{"given":"Taek-Young","family":"Youn","sequence":"first","affiliation":[]},{"given":"Ku-Young","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"156_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-Locked encryption and secure deduplication. In: Proceedings of EUROCRYPT 2013, LNCS 7881, pp. 296\u2013312 (2013)","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"156_CR2","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: Proceedings of the 22nd USENIX conference on Security, pp. 179\u2013194 (2013)"},{"key":"156_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Proceedings of CRYPTO 2004, LNCS 3152, pp. 41\u201355 (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"156_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.future.2013.01.001","volume":"33","author":"J Parra-Arnau","year":"2014","unstructured":"Parra-Arnau, J., Rebollo-Monedero, D., Forne, J.: Measuring the privacy of user profiles in personalized information systems. Future Gener. Comput. Syst. 33, 53\u201363 (2014)","journal-title":"Future Gener. Comput. Syst."},{"key":"156_CR5","doi-asserted-by":"crossref","unstructured":"Storer, M. W., Greenan, K., Long, D.D.E., Miller, E.L.: Secure data deduplication. In: Proceedings of 4th ACM International Workshop on Storage Security and Survivability, pp. 1\u201310, 2008","DOI":"10.1145\/1456469.1456471"},{"key":"156_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services : deduplication in cloud storage. IEEE Secur. Priv. Mag. 8, 40\u201347 (2010)","journal-title":"IEEE Secur. Priv. Mag."}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T13:05:47Z","timestamp":1533387947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_156","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}