{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:07:20Z","timestamp":1773842840315,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T00:00:00Z","timestamp":1458777600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11277-016-3273-1","type":"journal-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T15:52:46Z","timestamp":1458834766000},"page":"947-960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing"],"prefix":"10.1007","volume":"90","author":[{"given":"R.","family":"Pitchai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Jayashri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Raja","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,3,24]]},"reference":[{"issue":"1","key":"3273_CR1","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCC.2015.1","volume":"2","author":"S Abolfazli","year":"2015","unstructured":"Abolfazli, S., Sanaei, Z., Tabassi, A., Rosen, S., Gani, A., & Khan, S. U. (2015). Cloud adoption in Malaysia: Trends, opportunities, and challenges. Cloud Computing, IEEE, 2(1), 60\u201368.","journal-title":"Cloud Computing, IEEE"},{"key":"3273_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.jbi.2015.05.022","volume":"56","author":"M Akg\u00fcn","year":"2015","unstructured":"Akg\u00fcn, M., Bayrak, A. O., Ozer, B., & Sa\u011f\u0131ro\u011flu, M. \u015e. (2015). Privacy preserving processing of genomic data: A survey. Journal of Biomedical Informatics, 56, 103\u2013111.","journal-title":"Journal of Biomedical Informatics"},{"key":"3273_CR3","unstructured":"Gajra, N., Khan, S. S., & Rane, P. (2015). Private cloud security: Secured user authentication by using enhanced hybrid algorithm. In 2015 IEEE Electrical insulation conference (EIC) (pp. 1\u20136). IEEE, 2015."},{"key":"3273_CR4","doi-asserted-by":"crossref","unstructured":"Guo, C., Song, Q., Zhuang, R., & Feng, B. (2015). RSAE: Ranked keyword search over asymmetric encrypted cloud data. In 2015 IEEE fifth international conference on big data and cloud computing (BDCloud) (pp. 82\u201386). IEEE, 2015.","DOI":"10.1109\/BDCloud.2015.11"},{"key":"3273_CR5","volume-title":"Privacy in a digital, networked world","author":"R Hasan","year":"2015","unstructured":"Hasan, R., & Zawoad, S. (2015). Privacy in the cloud. In\u00a0S. Zeadally,\u00a0B. Mohamad (Eds.), Privacy in a digital, networked world, USA: Springer."},{"key":"3273_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y., Peng, C., & Bai, G. (2015). Sharing health data through hybrid cloud for self-management. In 2015 IEEE international conference on multimedia and expo workshops (ICMEW) (pp. 1\u20136). IEEE, 2015.","DOI":"10.1109\/ICMEW.2015.7169808"},{"key":"3273_CR7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18\u201326.","journal-title":"Knowledge-Based Systems"},{"key":"3273_CR8","unstructured":"Liu, Z., Weng, J., Li, J., Yang, J., Fu, C., & Jia, C. (2015). Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computing, 1\u201313."},{"key":"3273_CR9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.compeleceng.2015.08.016","volume":"47","author":"D Magalh\u00e3es","year":"2015","unstructured":"Magalh\u00e3es, D., Calheiros, R. N., Buyya, R., & Gomes, D. G. (2015). Workload modeling for resource usage analysis and simulation in cloud computing. Computers & Electrical Engineering, 47, 69\u201381.","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"3273_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13063-015-0835-6","volume":"16","author":"C Ohmann","year":"2015","unstructured":"Ohmann, C., Canham, S., Danielyan, E., Robertshaw, S., Legr\u00e9, Y., Clivio, L., & Demotes, J. (2015). \u2018Cloud computing\u2019 and clinical trials: report from an ECRIN workshop. Trials, 16(1), 1\u20134.","journal-title":"Trials"},{"key":"3273_CR11","doi-asserted-by":"crossref","unstructured":"Popescu, C. (2015). Autonomous systems for telemedicine. In 2015 Ninth international conference on complex, intelligent, and software intensive systems (CISIS) (pp. 297\u2013301). IEEE, 2015.","DOI":"10.1109\/CISIS.2015.83"},{"issue":"3","key":"3273_CR12","first-page":"192","volume":"1","author":"B Preethi","year":"2015","unstructured":"Preethi, B., Shahin, M., & RamaDevi, K. (2015). Synonym query using multi-keyword search using cloud computing. International Journal of Advanced Engineering, 1(3), 192\u2013195.","journal-title":"International Journal of Advanced Engineering"},{"issue":"9","key":"3273_CR13","doi-asserted-by":"crossref","first-page":"2370","DOI":"10.1002\/cpe.3421","volume":"27","author":"R Ranjan","year":"2015","unstructured":"Ranjan, R., Buyya, R., Nepal, S., & Georgakopulos, D. (2015). A note on resource orchestration for cloud computing. Concurrency and Computation: Practice and Experience, 27(9), 2370\u20132372.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"3273_CR14","unstructured":"Raghavendra, S., Geeta, C. M., Shaila, K., Buyya, R., Venugopal, K. R., Iyengar, S. S., & Patnaik, L. M. (2015). MSSS: Most significant single-keyword search over encrypted cloud data. In 6th annual international conference on ICT: Big data, cloud and security (ICT-BDCS 2015) (pp. 43\u201348)."},{"key":"3273_CR15","doi-asserted-by":"crossref","unstructured":"Samad, J., Loke, S.W., Reed. K.\u00a0(2015) Mobile Cloud Computing. In\u00a0da Fonseca N. L. S. & Boutaba. R (Eds.), Cloud Services, Networking, and Management, John Wiley & Sons: Hoboken, NJ.","DOI":"10.1002\/9781119042655.ch7"},{"key":"3273_CR16","doi-asserted-by":"crossref","unstructured":"Shankarwar, M. U. & Pawar, A. V. (2015). Security and privacy in cloud computing: A survey. In Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (FICTA) 2014 (pp. 1\u201311). Springer.","DOI":"10.1007\/978-3-319-12012-6_1"},{"issue":"3","key":"3273_CR17","first-page":"440","volume":"21","author":"Q Xia","year":"2015","unstructured":"Xia, Q., Ni, J., Kanpogninge, A. J. B. A., & Gee, J. C. (2015). Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. Journal of Universal Computer Science, 21(3), 440\u2013453.","journal-title":"Journal of Universal Computer Science"},{"key":"3273_CR18","volume-title":"Wireless communications, networking and applications","author":"Y Xu","year":"2016","unstructured":"Xu, Y., Li, M., Hu, X., Wang, Y., & Zhang, H. (2016) Survey on privacy preserving for intelligent business recommendation in cloud In\u00a0Q.-A. Zeng (Ed.,) Wireless communications, networking and applications, India: Springer."},{"issue":"3","key":"3273_CR19","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1002\/mrm.25213","volume":"73","author":"H Xue","year":"2015","unstructured":"Xue, H., Inati, S., S\u00f8rensen, T. S., Kellman, P., & Hansen, M. S. (2015). Distributed MRI reconstruction using gadgetron-based cloud computing. Magnetic Resonance in Medicine, 73(3), 1015\u20131025.","journal-title":"Magnetic Resonance in Medicine"},{"key":"3273_CR20","doi-asserted-by":"crossref","unstructured":"Zickau, S., Beierle, F., & Denisow, I. (2015). Securing mobile cloud data with personalized attribute-based meta information. In 2015 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp. 205\u2013210). IEEE, 2015.","DOI":"10.1109\/MobileCloud.2015.14"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3273-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3273-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3273-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3273-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:18:34Z","timestamp":1559395114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3273-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,24]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["3273"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3273-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,24]]}}}