{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:56:17Z","timestamp":1757454977399},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10586-017-0959-4","type":"journal-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T14:57:55Z","timestamp":1496847475000},"page":"115-124","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Enhancement of data confidentiality and secure data transaction in cloud storage environment"],"prefix":"10.1007","volume":"21","author":[{"given":"K. L.","family":"Neela","sequence":"first","affiliation":[]},{"given":"V.","family":"Kavitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"959_CR1","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.procs.2014.08.053","volume":"37","author":"F Shahzad","year":"2014","unstructured":"Shahzad, F.: State-of-the-art survey on cloud computing security challenges, approaches and solutions. Sci. Direct Procedia Comput. Sci. 37, 357\u2013362 (2014)","journal-title":"Sci. Direct Procedia Comput. Sci."},{"key":"959_CR2","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","volume":"75","author":"S Singh","year":"2016","unstructured":"Singh, S., Jeong, Y.-S., Park, J.H.: A survey on cloud computing security: issues, threats and solutions. J. Netw. Comput. Appl. 75, 200\u2013222 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"959_CR3","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s11277-016-3374-x","volume":"90","author":"M Bala Krishna","year":"2016","unstructured":"Bala Krishna, M., Dugar, A.: Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel. Pers. Commun. 90(1), 381\u2013398 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"959_CR4","doi-asserted-by":"crossref","unstructured":"Divya, R., Muthukumarasamy, S: An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis. In: IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 1 October 2015. ISBN 978-1-4799-6480-2","DOI":"10.1109\/ISCO.2015.7282330"},{"issue":"2","key":"959_CR5","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TCC.2014.2359460","volume":"3","author":"J Baek","year":"2015","unstructured":"Baek, J., Vu, Q.H., Liu, J.K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233\u2013244 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"959_CR6","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"Y Sreenivasa Rao","year":"2017","unstructured":"Sreenivasa Rao, Y.: \u00c4 secure and efficient cipher text-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133\u2013151 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"959_CR7","doi-asserted-by":"crossref","unstructured":"Umanandhini, D., TamilSelvan, L., Udhayakumar, S., Vijayasingam, T.: Dynamic authentication for consumer supplies in mobile cloud environment. In: IEEE Third International Conference on Computing Communication and Networking Technologies (ICCCNT), 31 December 2012","DOI":"10.1109\/ICCCNT.2012.6395954"},{"key":"959_CR8","doi-asserted-by":"publisher","unstructured":"Chi, P.-W., Lei, C.-L.: Audit-free cloud storage via deniable attribute-based encryption. IEEE Trans. Cloud Comput. doi: 10.1109\/TCC.2015.2424882 (2015)","DOI":"10.1109\/TCC.2015.2424882"},{"key":"959_CR9","unstructured":"Lee, Y.S., Kim, N.H., Lim, H., Jo, H., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: IEEE International Conference on Computer Sciences and Convergence Information Technology (ICCIT), 10 February 2011. Electronic ISBN: 978-89-88678-30-5"},{"key":"959_CR10","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.jnca.2017.01.015","volume":"82","author":"W Shen","year":"2017","unstructured":"Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group user via the third party medium. J. Netw. Comput. Appl. 82, 56\u201364 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"959_CR11","doi-asserted-by":"crossref","unstructured":"Kalai Selvi, R., Kavitha, V.: Crypto system based authentication using CSTA in grid. Int. J. Comput. Appl. 48(22), ISSN 0975-8887 (2012)","DOI":"10.5120\/7515-0593"},{"key":"959_CR12","unstructured":"Gomathi, S., Manimegalai, D.: Keyless cryptography in grid computing using cyclic shift transposition algorithm. J. Theor. Appl. Inf. Technol. 63(1), ISSN 1992-8645 (2014)"},{"key":"959_CR13","unstructured":"Oppliger, R.: Contemporary Cryptography, 2nd edn. Artech House Computer Security Series, Norwood (2012)"},{"key":"959_CR14","unstructured":"Denso ADC: QR Code Essentials (2011)"},{"issue":"7","key":"959_CR15","first-page":"201","volume":"9","author":"W-C Wu","year":"2015","unstructured":"Wu, W.-C.: Subsampling-based image tamper detection and recovery using quick response code. Int. J. Secur. Appl. 9(7), 201\u2013216 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"959_CR16","unstructured":"Liu, Y., Yang, J., Liu, M.: Recognition of QR code with mobile phones. In: IEEE Conference on Chinese Control and Decision, 12 August 2008. Print ISSN: 1948-9439"},{"key":"959_CR17","unstructured":"Guard time. https:\/\/guardtime.com\/technology\/ksi-technology (2016)"},{"issue":"2","key":"959_CR18","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S Haber","year":"1991","unstructured":"Haber, S., Stornetta, S.: How to timestamp a digital document. J. Cryptol. 3(2), 99\u2013111 (1991)","journal-title":"J. Cryptol."},{"key":"959_CR19","unstructured":"Gandhi, V.A., Kumbharana, C.K.: Comparative study of Amazon EC2 and Microsoft Azure cloud architecture. Int. J. Adv. Netw. Appl., 117\u2013123. ISSN 0975-0290"},{"issue":"3","key":"959_CR20","first-page":"659","volume":"6","author":"Md Alam Hossain","year":"2016","unstructured":"Alam Hossain, Md, Biddut Hossain, Md, Shafin Uddin, Md, Imtiaz, SMd: Performance analysis of different cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(3), 659\u2013665 (2016)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"959_CR21","unstructured":"Jasim, O.K., Abbas, S., El-Horbaty, E.-S.M., Salem, A.-B.M.: Efficiency of modern encryption algorithms in cloud computing. Int. J. Emerg. Trends Technol. Comput. Sci. 2(6), (2013). www.ijettcs.org"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0959-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0959-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0959-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T18:33:09Z","timestamp":1569436389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0959-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["959"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0959-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,7]]}}}