{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:29:53Z","timestamp":1743146993145,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_41","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"575-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Data Security Access Control Mechanism in Cloud Computing Environment"],"prefix":"10.1007","author":[{"given":"Chen","family":"Luo","sequence":"first","affiliation":[]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qianxuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Reddy, Y.: Big data processing and access controls in cloud environment. In: 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2018, pp. 25\u201333 (2018)","DOI":"10.1109\/BDS\/HPSC\/IDS18.2018.00019"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Mirajkar, S.B., Khatawkar, S.D.: A provenance-based access control model for securely storing data in cloud. In: 2017 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 906\u2013909 (2017)","DOI":"10.1109\/I2CT.2017.8226260"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Wang, F., Wang, H., Xue, L.: Research on data security in big data cloud computing environment. In: 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2021, pp. 1446\u20131450 (2021)","DOI":"10.1109\/IAEAC50856.2021.9391025"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Bertolissi, C., Boucelma, O., Uttha, W.: Enhancing security in the cloud: when traceability meets access control. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017, pp. 365\u2013366 (2017)","DOI":"10.23919\/ICITST.2017.8356420"},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"137594","DOI":"10.1109\/ACCESS.2019.2942649","volume":"7","author":"Q Zhang","year":"2019","unstructured":"Time and attribute based dual access control and data integrity verifiable scheme in cloud computing applications. IEEE Access  7, 137594\u2013137607 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"41_CR6","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TCC.2016.2632110","volume":"8","author":"L Gao","year":"2020","unstructured":"Gao, L., Yan, Z., Yang, L.T.: Game theoretical analysis on acceptance of a cloud data access control system based on reputation. IEEE Trans. Cloud Comput.  8(4), 1003\u20131017 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"107347","DOI":"10.1109\/ACCESS.2021.3101048","volume":"9","author":"B Celiktas","year":"2021","unstructured":"Celiktas, B., Celikbilek, I., Ozdemir, E.: A higher-level security scheme for key access on cloud computing. IEEE Access  9, 107347\u2013107359 (2021)","journal-title":"IEEE Access"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Y., Sun, Q., Ma, Y., Zhang, J., Liu, Z., Xue, J.: Security enhanced cloud storage access control system based on attribute based encryption. In: 2018 International Conference on Big Data and Artificial Intelligence (BDAI), 2018, pp. 52\u201357 (2018)","DOI":"10.1109\/BDAI.2018.8546677"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"More, P.: Cloud data security using attribute-based key-aggregate cryptosystem. In: 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), 2018, pp. 1\u20136 (2018)","DOI":"10.1109\/RICE.2018.8509077"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Wang, J., Ye, C., Ou, Y.: Dynamic data access control for multi-authority cloud storage. In: 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 2019, pp. 599\u2013608 (2019)","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00092"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Varma, A., Saxena, K., Khatri, S.K.: Preventive measures to secure issues in cloud computing. In: 2019 International Conference on Intelligent Computing and Control Systems (ICCS), 2019, pp. 504\u2013508 (2019)","DOI":"10.1109\/ICCS45141.2019.9065787"},{"issue":"3","key":"41_CR12","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1109\/TCC.2015.2415794","volume":"5","author":"D Gonzales","year":"2017","unstructured":"Cloud-trust\u2014a security assessment model for infrastructure as a service (IaaS) clouds. IEEE Trans. Cloud Comput. 5(3), 523\u2013536 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Soni, K., Kumar, S.: Comparison of RBAC and ABAC security models for private cloud. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), 2019, pp. 584\u2013587 (2019)","DOI":"10.1109\/COMITCon.2019.8862220"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Russello, G.: PU-ABE: lightweight attribute-based encryption supporting access policy update for cloud assisted IoT. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 2018, pp. 924\u2013927 (2018)","DOI":"10.1109\/CLOUD.2018.00137"},{"key":"41_CR15","doi-asserted-by":"publisher","first-page":"131534","DOI":"10.1109\/ACCESS.2019.2939299","volume":"7","author":"Q Li","year":"2019","unstructured":"Li, Q., Tian, Y., Zhang, Y., Shen, L., Guo, J.: Efficient privacy-preserving access control of mobile multimedia data in cloud computing. IEEE Access 7, 131534\u2013131542 (2019)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:12:07Z","timestamp":1685459527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}