{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:34:58Z","timestamp":1743010498633,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_55","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"573-582","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advanced Key Management System (AKMS) for Security in Public Clouds"],"prefix":"10.1007","author":[{"given":"J. L.","family":"Amarnath","sequence":"first","affiliation":[]},{"given":"Pritam G.","family":"Shah","sequence":"additional","affiliation":[]},{"given":"H.","family":"Chandramouli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"55_CR1","unstructured":"Sanket, S., Nitte, Sanjay, H.A., Deepika, K.M.; Rangavittala: An encryption, compression and key (ECK) management based data security framework for infrastructure as a service in cloud. In: 2015 IEEE International Advance Computing Conference (IACC) 12\u201313 June 2015, Banglore, India, pp. 210\u2013216. ISBN: 978-1-4799-8047-5"},{"key":"55_CR2","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 01\u2013011 (2011)"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K.: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: ACM, pp. 0523\u2013528 (2013)","DOI":"10.1145\/2484313.2484383"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, K.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE, pp. 01\u2013014 (2013)","DOI":"10.1109\/TPDS.2012.97"},{"key":"55_CR5","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. IEEE, pp. 01\u201309 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"55_CR6","unstructured":"Chow, S.S.M., Chu, C,-K., Huang, X., Zhou, J., Deng, R.H.: Dynamic secure cloud storage with provenance. Springer, pp. 0442\u20130464 (2011)"},{"key":"55_CR7","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE, pp. 01\u2013013 (2015)"},{"key":"55_CR8","unstructured":"Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE, pp. 01\u2013011 (2012)"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W, Chen, Y., Vasilakos, A.V: Security and privacy for storage and computation in cloud computing. Inf. Sci. 0371\u20130386 (2014)","DOI":"10.1016\/j.ins.2013.04.028"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Selvakumar, C., Rathanam, G.J., Sumalatha, M.R.: PDDS\u2014Improving cloud data storage security using data partitioning technique. IEEE, pp. 07\u2013011 (2012)","DOI":"10.1109\/IAdCC.2013.6506806"},{"key":"55_CR11","unstructured":"Rajathi, A., Saravanan, N.: A survey on secure storage in cloud computing. Indian J. Sci. Technol. 4396\u20134401 (2013)"},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Erway, C.C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM, pp. 0213\u20130222 (2010)","DOI":"10.1145\/1653662.1653688"},{"key":"55_CR13","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K.: Toward publicly auditable secure cloud data storage services. IEEE, 019\u2013024 (2010)","DOI":"10.1109\/MNET.2010.5510914"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X.: Attributed-based access control for multi-authority systems in cloud storage. IEEE. pp. 536\u2013545 (2012)","DOI":"10.1109\/ICDCS.2012.42"},{"key":"55_CR15","unstructured":"Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 0409\u20130428 (2012)"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T09:03:57Z","timestamp":1668675837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}