{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:36:58Z","timestamp":1777372618753,"version":"3.51.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,8,2]],"date-time":"2015-08-02T00:00:00Z","timestamp":1438473600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10586-015-0474-4","type":"journal-article","created":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T11:49:39Z","timestamp":1438429779000},"page":"1251-1261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Ownership-guaranteed security framework for the private data in the entrusted management environment"],"prefix":"10.1007","volume":"18","author":[{"given":"SeongMin","family":"Yoo","sequence":"first","affiliation":[]},{"given":"Jinsul","family":"Kim","sequence":"additional","affiliation":[]},{"given":"JaeHyung","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jiseung","family":"Nam","sequence":"additional","affiliation":[]},{"given":"JaeCheol","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,2]]},"reference":[{"key":"474_CR1","volume-title":"2013 Internet security threat report","author":"K Haley","year":"2013","unstructured":"Haley, K., Wood, P.: 2013 Internet security threat report. Symantec Corporation, Mountain View (2013)"},{"issue":"8","key":"474_CR2","first-page":"530","volume":"4","author":"JS Shin","year":"2013","unstructured":"Shin, J.S., Yoo, S.M., Kim, S.W., Ryou, J.C., Jang, H.J.: Study on encryption methodology of optimized for digital medical imaging data. J. Next Gener. Info. Technol. 4(8), 530\u2013537 (2013)","journal-title":"J. Next Gener. Info. Technol."},{"key":"474_CR3","volume-title":"Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide","author":"OS Pianykh","year":"2011","unstructured":"Pianykh, O.S.: Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide. Springer, New York (2011)"},{"key":"474_CR4","unstructured":"U.S. Government. \u201cGuidance regarding methods for de-identification of protected health information in accordance with the health insurance portability and accountability act (HIPAA) privacy rule,\u201d Washington D. C.: U.S. Department of Health and Human Services (2012)"},{"key":"474_CR5","first-page":"219","volume-title":"PACS and imaging informatics","author":"HK Huang","year":"2010","unstructured":"Huang, H.K.: PACS and imaging informatics, pp. 219\u2013236. Wiley, Hoboken (2010)"},{"key":"474_CR6","unstructured":"Cooke, R.E. Jr, Gaeta, M.G., Kaufman, D.M. and Henrici, G. Picture archiving and communication system, U.S. Patent No. 6,574,629 (June 2003)"},{"key":"474_CR7","first-page":"8","volume":"2013","author":"J Chen","year":"2013","unstructured":"Chen, J., Qian, F., Yan, W., Shen, B.: Translational biomedical informatics in the cloud: present and future. Biomed Res. Int. 2013, 8 (2013)","journal-title":"Biomed Res. Int."},{"key":"474_CR8","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-642-13396-1_9","volume":"3","author":"JB Aupet","year":"2010","unstructured":"Aupet, J.B., Garcia, E., Guyennet, H., Lapayre, J.C., Martins, D.: Security in medical telediagnosis. Multimed. Serv. Intell. Environ. 3, 201\u2013226 (2010)","journal-title":"Multimed. Serv. Intell. Environ."},{"key":"474_CR9","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1155\/2014\/692619","volume":"2014","author":"V Stantchev","year":"2014","unstructured":"Stantchev, V., Palacios, R.C., Niedermayer, M.: Cloud Computing Based Systems for Healthcare. Sci. World J. 2014, 2 (2014)","journal-title":"Sci. World J."},{"key":"474_CR10","first-page":"6","volume-title":"The notorious nine: cloud computing top threats in 2013","author":"R Los","year":"2013","unstructured":"Los, R., Shackleford, D., Sullivan, B.: The notorious nine: cloud computing top threats in 2013, pp. 6\u201321. Cloud Security Alliance, Nevada (2013)"},{"issue":"1","key":"474_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"474_CR12","first-page":"9","volume":"2014","author":"Y Sun","year":"2014","unstructured":"Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 2014, 9 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"474_CR13","first-page":"13","volume":"2014","author":"J Wang","year":"2014","unstructured":"Wang, J., Wang, Z.: A survey on personal data cloud. Sci. World J. 2014, 13 (2014)","journal-title":"Sci. World J."},{"issue":"4","key":"474_CR14","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MNET.2010.5510914","volume":"24","author":"C Wang","year":"2010","unstructured":"Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19\u201324 (2010)","journal-title":"IEEE Netw."},{"issue":"3","key":"474_CR15","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MCOM.2014.6766088","volume":"52","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and the mobile media cloud. IEEE Commun. Mag. 52(3), 73\u201379 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"474_CR16","first-page":"11","volume":"2014","author":"F Tian","year":"2014","unstructured":"Tian, F., Gui, X., An, J., Yang, P., An, J., Yang, P., Zhao, J., Zhang, X.: Protecting location privacy for outsourced spatial data in cloud storage. Sci. World J. 2014, 11 (2014)","journal-title":"Sci. World J."},{"key":"474_CR17","first-page":"10","volume":"2014","author":"O Kwon","year":"2014","unstructured":"Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014)","journal-title":"Sci. World J."},{"key":"474_CR18","first-page":"6","volume":"2013","author":"CY Chen","year":"2013","unstructured":"Chen, C.Y., Tu, J.F.: A novel cloud computing algorithm of security and privacy. Math. Probl. Eng. 2013, 6 (2013)","journal-title":"Math. Probl. Eng."},{"key":"474_CR19","first-page":"12","volume":"2014","author":"G Noh","year":"2014","unstructured":"Noh, G., Chun, J.Y.: Sharing privacy protected and statistically sound clinical research data using outsourced data storage. J. Appl. Math. 2014, 12 (2014)","journal-title":"J. Appl. Math."},{"key":"474_CR20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1155\/2014\/146970","volume":"2014","author":"K Haufe","year":"2014","unstructured":"Haufe, K., Dzombeta, S., Brandis, K.: Proposal for a security management in cloud computing for health care. Sci. World J. 2014, 7 (2014)","journal-title":"Sci. World J."},{"key":"474_CR21","doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., Peleg, A. S. Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, pp. 491\u2013500 (2011)","DOI":"10.1145\/2046707.2046765"},{"issue":"5","key":"474_CR22","first-page":"130","volume":"4","author":"EZE Fatma","year":"2013","unstructured":"Fatma, E.Z.E., Hikal, N.A., Abou-Chadi, F.E.Z.: Secure medical images sharing over cloud computing environment. Int. J. Adv. Comput. Sci. Appl. 4(5), 130\u2013137 (2013)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"474_CR23","doi-asserted-by":"crossref","first-page":"49","DOI":"10.7472\/jksii.2014.15.2.49","volume":"15","author":"XC Yin","year":"2014","unstructured":"Yin, X.C., Thiranant, N., Lee, H.: An efficient and secure data storage scheme using ECC in cloud computing. J. Internet Comput. Serv. 15(2), 49\u201359 (2014)","journal-title":"J. Internet Comput. Serv."},{"issue":"2","key":"474_CR24","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393\u2013399 (2006)","journal-title":"Chaos Solitons Fractals"},{"key":"474_CR25","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1155\/2013\/516465","volume":"2013","author":"V Seenivasagam","year":"2013","unstructured":"Seenivasagam, V., Velumani, R.: A QR code based zero watermarking scheme for authentication of medical images in teleradiology cloud. Comput. Math. Methods Med. 2013, 16 (2013)","journal-title":"Comput. Math. Methods Med."},{"key":"474_CR26","first-page":"8","volume":"2012","author":"LT Ko","year":"2012","unstructured":"Ko, L.T., Chen, J.E., Shieh, Y.S.: Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Comput. Math. Methods Med. 2012, 8 (2012)","journal-title":"Comput. Math. Methods Med."},{"key":"474_CR27","first-page":"18","volume":"2008","author":"A Massoudi","year":"2008","unstructured":"Massoudi, A., Lefebvre, F., Vleeschouwer, C.D., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Info. Secur. 2008, 18 (2008)","journal-title":"EURASIP J. Info. Secur."},{"issue":"11","key":"474_CR28","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"474_CR29","doi-asserted-by":"crossref","unstructured":"BLAKLEY, G.R. Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"3","key":"474_CR30","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/5.993400","volume":"90","author":"E Meijering","year":"2002","unstructured":"Meijering, E.: A chronology of interpolation: from ancient astronomy to modern signal and image processing. Proc. IEEE 90(3), 319\u2013342 (2002)","journal-title":"Proc. IEEE"},{"issue":"3","key":"474_CR31","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1137\/S0036144502417715","volume":"46","author":"JP Berrut","year":"2004","unstructured":"Berrut, J.P., Trefethen, L.N.: Barycentric lagrange interpolation. Siam Rev. 46(3), 501\u2013517 (2004)","journal-title":"Siam Rev."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0474-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0474-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0474-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T19:36:16Z","timestamp":1599420976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0474-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,2]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["474"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0474-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,2]]}}}