{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T15:02:40Z","timestamp":1693407760644},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,4,2]],"date-time":"2015-04-02T00:00:00Z","timestamp":1427932800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11235-015-0031-8","type":"journal-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T06:34:10Z","timestamp":1428042850000},"page":"303-313","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments"],"prefix":"10.1007","volume":"60","author":[{"given":"Hua Yi","family":"Lin","sequence":"first","affiliation":[]},{"given":"Meng-Yen","family":"Hsieh","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,2]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Creese, S., Hopkins, P., Pearson, S., & Shen, Y. (2009). Data protection-aware design for cloud services. Lecture Notes in Computer Science, vol. 5931, pp. 119\u2013130. Berlin: Springer.","DOI":"10.1007\/978-3-642-10665-1_11"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Iqbal, W., Dailey, M., & Carrera, D. (2010) SLA-driven automatic bottleneck detection and resolution for read intensive multitier applications hosted on a cloud. In: Proceedings of the International Conference on Grid and Pervasive Computing, pp. 37\u201346.","DOI":"10.1007\/978-3-642-13067-0_8"},{"key":"31_CR3","unstructured":"Dean, J., & Ghemawat, S. (2004). MapReduce: Simplified data processing on large clusters. In: Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation."},{"key":"31_CR4","unstructured":"Devanbu, P., Gertz, M., Stuart, C. M., & Stubblebine, G. (August 2000). Authentic third-party data publication. In: Proceedings of the 14th IFIP 11.3 Working Conference in Database Security ."},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Mackey, G., Sehrish, S., Lopez, J., Bent, J., Habib, S., & Wang, J. (2008). Introducing map reduce to high end computing. In: Proceedings of the Petascale Data Storage Workshop Held in Conjunction with SC08.","DOI":"10.1109\/PDSW.2008.4811889"},{"key":"31_CR6","unstructured":"Ekanayake, J., Pallickara, S., & Fox, G. (2008). Mapreduce for data intensive scientific analysis. In: Proceedings of the IEEE Fourth International Conference on eScience\u201908, pp. 277\u2013284. IEEE"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., & Chehab, A. (2009). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: the Proceeding of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 711\u2013716. IEEE","DOI":"10.1109\/DASC.2009.139"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Begnum, K. (2010). Simplified cloud-oriented virtual machine management with MLN. The Journal of Supercomputing, 61(2), 251-266. doi: 10.1007\/s11227-010-0424-0 .","DOI":"10.1007\/s11227-010-0424-0"},{"key":"31_CR9","unstructured":"Yan, L., Rong, C., & Zhao, G. (2010). Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. Lecture Notes in Computer Science, vol. 5931. Berlin: Springer"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Sun, H., & Aida, K. (2010). A hybrid and secure mechanism to execute parameter survey applications on local and public cloud resources. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp. 118\u2013126. IEEE","DOI":"10.1109\/CloudCom.2010.61"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Zhou, D., Zhong, L., Wo, T., & Kang, J. (2010) CloudView: Describe and maintain resource view in cloud. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp. 151\u2013158. IEEE","DOI":"10.1109\/CloudCom.2010.26"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Miyamoto, T., Hayashi, M., & Nishimura, K. (2010). Sustainable network resource management system for virtual private clouds. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp. 512\u2013520. IEEE","DOI":"10.1109\/CloudCom.2010.63"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., & Frankel, Y. (August 1990). Threshold Crypto-Systems. In Advances in Cryptology ( Crypto\u201989), pp. 307\u2013315. New York: Springer.","DOI":"10.1007\/0-387-34805-0_28"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Stinson, D. R., & Wei, R. (August 1999). Unconditionally secure proactive secret sharing scheme with combinatorial. In: Proceeding of the 6th Annual International Workshop Selected Areas in Cryptography.","DOI":"10.1007\/3-540-46513-8_15"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Wang, G. L. (2003). Security Analysis of Several Group Signature Schemes. Lecture Notes in Computer Science, vol. 2904, pp. 252\u2013265. Berlin: Springer.","DOI":"10.1007\/978-3-540-24582-7_19"},{"issue":"3\u20134","key":"31_CR16","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s11235-010-9344-9","volume":"48","author":"M Fouquet","year":"2011","unstructured":"Fouquet, M., Hoene, C., Schl\u00e4ger, M., & Carle, G. (2011). Data collection in future mobile networks. Telecommunication Systems Journal, 48(3\u20134), 289\u2013300.","journal-title":"Telecommunication Systems Journal"},{"issue":"1\u20132","key":"31_CR17","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s11235-010-9300-8","volume":"47","author":"E Altman","year":"2011","unstructured":"Altman, E., Ayesta, U., & Prabhu, B. J. (2011). Load balancing in processor sharing systems. Telecommunication Systems Journal, 47(1\u20132), 35\u201348.","journal-title":"Telecommunication Systems Journal"},{"issue":"3","key":"31_CR18","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s11235-010-9284-4","volume":"46","author":"MM Ibrahiem","year":"2011","unstructured":"Ibrahiem, M. M., Emary, E., & Hassanien, A. E. (2011). Intelligent agent in telecommunication systems. Telecommunication Systems Journal, 46(3), 191\u2013193.","journal-title":"Telecommunication Systems Journal"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Hu, J., Deng, J., & Wu, J. (2013) A green private cloud architecture with global collaboration. Telecommunication Systems Journal, 52(2), 1269\u20131279 doi: 10.1007\/s11235-011-9639-5 .","DOI":"10.1007\/s11235-011-9639-5"},{"key":"31_CR20","unstructured":"Pearson, S., Shen, Y., & Mowbray, M. (2009). A Privacy Manager for Cloud Computing (pp. 90\u2013106). Lecture Notes in Computer Science Berlin: Springer."},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Elnikety, E., Elsayed, T., & Ramadan, H .E. (2011). iHadoop: Asynchronous iterations for MapReduce. In: Proceedings of the 3rd IEE International Conference on Cloud Computing Technology and Science. IEEE","DOI":"10.1109\/CloudCom.2011.21"},{"key":"31_CR22","unstructured":"Chen, R., Gui, Y., & Gao, J. (2004). Modification on Kerberos Authentication Protocol in Grid Computing Environment (pp. 1079\u20131082). Lecture Notes in Computer Science Berlin: Springer."},{"key":"31_CR23","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/978-3-642-25986-9_77","volume":"129","author":"W Juan","year":"2011","unstructured":"Juan, W., Heng, C. M., & Kang, F. Y. (2011). An improved kerberos intra-domain authentication protocol based-on certificateless public-key cryptography. Advances in Intelligent and Soft Computing, 129, 489\u2013496.","journal-title":"Advances in Intelligent and Soft Computing"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Lin, H.-Y., Yang, C.-Y., & Hsieh, M.-Y. (2012). Secure map reduce data transmission mechanism in cloud computing using threshold secret sharing Schemes. In Advances in Intelligent and Soft Computing. Berlin: Springer","DOI":"10.1007\/978-3-642-25349-2_101"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Hsieh, M.-Y., Lin, H.-Y., Lai, C.-F., & Li, K.-C. (2011). Secure protocols for data propagation and group communication in vehicular networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1\u201316.","DOI":"10.1186\/1687-1499-2011-167"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Lin, H.-Y., & Chiang, T.-C. (2011). Efficient key agreements in dynamic multicast height balanced tree for secure multicast communications in Ad Hoc networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 382701.","DOI":"10.1155\/2011\/382701"},{"issue":"18","key":"31_CR27","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1049\/iet-com.2011.0140","volume":"5","author":"M-Y Hsieh","year":"2011","unstructured":"Hsieh, M.-Y. (2011). Data aggregation model using energy-efficient delay scheduling in multi-hop hierarchical wireless sensor networks. IET Communications, 5(18), 2703\u20132711.","journal-title":"IET Communications"},{"key":"31_CR28","unstructured":"Yeh, C.-H., Hsieh, M.-Y., & Li, K.-C. (2014). An Anonymous Communication Scheme with Non-reputation for Vehicular Ad Hoc Networks (pp. 563\u2013568). Lecture Notes in Electrical Engineering. Berlin: Springer."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-015-0031-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-015-0031-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-015-0031-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T21:17:53Z","timestamp":1566508673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-015-0031-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,2]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["31"],"URL":"https:\/\/doi.org\/10.1007\/s11235-015-0031-8","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,2]]}}}