{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:19:50Z","timestamp":1769631590425,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789812879899","type":"print"},{"value":"9789812879905","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-287-990-5_12","type":"book-chapter","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T13:25:13Z","timestamp":1454333113000},"page":"141-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Applying Encryption Algorithm for Data Security in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Zaid","family":"Kartit","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Azougaghe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.","family":"Kamal Idrissi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"El Marraki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Hedabou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Belkasmi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Kartit","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,2,2]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Kolodner, E.K., Tal, S., Kyriazis, D., et al.: A cloud environment for data-intensive storage services. In: 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), pp. 357\u2013366. IEEE (2011)","DOI":"10.1109\/CloudCom.2011.55"},{"key":"12_CR2","unstructured":"Arora, P., Wadhawan, R.C., Ahuja, E.S.P.: Cloud Computing Security Issues in Infrastructure as a Service. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(1) (2012)"},{"key":"12_CR3","unstructured":"Kumar, M.D.K., Rao, G.V., Rao, G.S.: Cloud Computing: An Analysis of Its Challenges & Cloud Computing: An Analysis of Its Challenges & Security Issues"},{"key":"12_CR4","unstructured":"Mehta, N., Gupta, V. K.: A survey on use of SaaS of cloud in education. In: International Conference on Cloud, Big Data and Trust (2013)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: 39th International Conference on Parallel Processing Workshops (2010)","DOI":"10.1109\/ICPPW.2010.45"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Bezemer, C.-P., Zaidman, A., Platzbeecker, B., et al.: Enabling multi-tenancy: an industrial experience report. In: 2010 IEEE International Conference on Software Maintenance (ICSM), pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/ICSM.2010.5609735"},{"key":"12_CR7","unstructured":"Kamal Idrissi, H., Kartit, A., El Marraki, M.: Foremost security apprehensions in cloud computing. Journal of Theoretical and Applied Information Technology 59(3), January 31, 2014"},{"key":"12_CR8","unstructured":"Kuyoro, S.O., Ibikunle, F., Awodele, O.: Cloud Computing Security Issues and Challenges. International Journal of Computer Networks (IJCN) 3(5) (2011)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Gong, C., Liu, J., Zhang, Q., Chen, H., Gongng, H.: The characteristics of cloud computing. In: 2010 39th International Conference on Parallel Processing Workshopse Brazilian Computer Society (2010)","DOI":"10.1109\/ICPPW.2010.45"},{"key":"12_CR10","unstructured":"A Platform Computing Whitepaper. Enterprise Cloud Computing: Transforming IT. Platform Computing, p. 6 (2010)"},{"key":"12_CR11","unstructured":"Arockiam, L., Monikandan, S.: Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm. International Journal of Advanced Research in Computer and Communication Engineering 2(8), August 2013"},{"key":"12_CR12","unstructured":"http:\/\/en.wikipedia.org\/wiki\/AES_implementations"},{"key":"12_CR13","unstructured":"Wang, C., Wang, Q., Ren, K.: Ensuring Data Storage Security in Cloud Computing. IEEE (2009). 978-1-4244-3876-1"},{"issue":"3","key":"12_CR14","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.jnca.2011.03.010","volume":"35","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications 35(3), 927\u2013933 (2012)","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"12_CR15","first-page":"287","volume":"8","author":"M Nagendra","year":"2014","unstructured":"Nagendra, M., Sekhar, M.C.: Performance Improvement of Advanced Encryption Algorithm using Parallel Imputation. International Journal of Software Engineering and Its Applications 8(2), 287\u2013296 (2014)","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"12_CR16","unstructured":"Zhang, X., Wu, N., Yan, G., et al.: Hardware Implementation of Compact AES S-box. IAENG International Journal of Computer Science 42(2) (2015)"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Ubiquitous Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-287-990-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T06:08:40Z","timestamp":1700201320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-287-990-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789812879899","9789812879905"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-287-990-5_12","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 February 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}