{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T03:00:32Z","timestamp":1773457232625,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T00:00:00Z","timestamp":1495584000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11277-017-4437-3","type":"journal-article","created":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T07:07:46Z","timestamp":1495609666000},"page":"5621-5633","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases"],"prefix":"10.1007","volume":"96","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3960-6926","authenticated-orcid":false,"given":"S.","family":"Muthurajkumar","sequence":"first","affiliation":[]},{"given":"M.","family":"Vijayalakshmi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,24]]},"reference":[{"key":"4437_CR1","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Wang, C., Ren, K., Lou, W., Li, J., et al. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22, 847\u2013859.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR2","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSC.2011.24","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., et al. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5, 220\u2013232.","journal-title":"IEEE Transactions on Services Computing"},{"key":"4437_CR3","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1109\/TPDS.2011.252","volume":"23","author":"HY Lin","year":"2012","unstructured":"Lin, H. Y., Tzeng, W. G., et al. (2012). A secure erasure code-based cloud storage system with secure data forwarding. IEEE Transactions on Parallel and Distributed Systems, 23, 995\u20131003.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR4","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1109\/TPDS.2011.306","volume":"23","author":"A Bahga","year":"2012","unstructured":"Bahga, A., Madisetti, V. K., et al. (2012). Analyzing massive machine maintenance data in a computing cloud. IEEE Transactions on Parallel and Distributed Systems, 23, 1831\u20131843.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR5","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S. S. M., Wang, Q., Ren, K., Lou, W., et al. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62, 362\u2013375.","journal-title":"IEEE Transactions on Computers"},{"key":"4437_CR6","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","volume":"23","author":"Y Zhu","year":"2012","unstructured":"Zhu, Y., Hu, H., Ahn, G. J., Yu, M., et al. (2012). Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems, 23, 2231\u20132244.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR7","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1109\/TDSC.2012.49","volume":"9","author":"Y Tang","year":"2012","unstructured":"Tang, Y., Lee, P. P. C., Lui, J. C. S., Perlman, R., et al. (2012). Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing, 9, 903\u2013916.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"4437_CR8","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X., et al. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 24, 1717\u20131726.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR9","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/TSC.2012.35","volume":"6","author":"H Wang","year":"2013","unstructured":"Wang, H. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 6, 551\u2013559.","journal-title":"IEEE Transactions on Services Computing"},{"key":"4437_CR10","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TPDS.2012.331","volume":"24","author":"X Liu","year":"2013","unstructured":"Liu, X., Zhang, Y., Wang, B., Yan, J., et al. (2013). Secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1182\u20131191.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR11","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MNET.2012.6375896","volume":"26","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, K. Q., et al. (2012). Toward secure and effective data utilization in public cloud. IEEE Network, 26, 69\u201374.","journal-title":"IEEE Network"},{"key":"4437_CR12","doi-asserted-by":"crossref","first-page":"2375","DOI":"10.1109\/TPDS.2012.337","volume":"24","author":"A Barsoum","year":"2013","unstructured":"Barsoum, A., Hasan, A., et al. (2013). Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Transactions on Parallel and Distributed Systems, 24, 2375\u20132385.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR13","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TPDS.2013.20","volume":"24","author":"D Yuan","year":"2013","unstructured":"Yuan, D., Yang, Y., Liu, X., Li, W., Cui, L., Xu, M., et al. (2013). A highly practical approach toward achieving minimum data sets storage cost in the cloud. IEEE Transactions on Parallel and Distributed Systems, 24, 1234\u20131244.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR14","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/TPDS.2013.112","volume":"25","author":"CK Chu","year":"2014","unstructured":"Chu, C. K., Chow, S. S. M., Tzeng, W. G., Zhou, J., Deng, R. H., et al. (2014). Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25, 468\u2013477.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR15","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1109\/TST.2013.6522585","volume":"18","author":"J Li","year":"2013","unstructured":"Li, J., Li, B., et al. (2013). Erasure coding for cloud storage systems: A survey. Tsinghua Science and Technology, 18, 259\u2013272.","journal-title":"Tsinghua Science and Technology"},{"key":"4437_CR16","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/TPDS.2013.164","volume":"25","author":"HCH Chen","year":"2014","unstructured":"Chen, H. C. H., Lee, P. P. C., et al. (2014). Enabling data integrity protection in regenerating-coding-based cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems, 25, 407\u2013416.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"4437_CR17","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1109\/TIFS.2013.2286456","volume":"8","author":"L Zhou","year":"2013","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M., et al. (2013). Achieving secure role-based access control on encrypted data in cloud storage. IEEE Transactions on Information Forensics and Security, 8, 1947\u20131960.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4437_CR18","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/TC.2013.122","volume":"63","author":"J Cao","year":"2014","unstructured":"Cao, J., Li, K., Stojmenovic, I., et al. (2014). Optimal power allocation and load distribution for multiple heterogeneous multicore server processors across clouds and data centers. IEEE Transactions on Computers, 63, 45\u201358.","journal-title":"IEEE Transactions on Computers"},{"key":"4437_CR19","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1109\/TMM.2013.2240673","volume":"5","author":"S Ren","year":"2013","unstructured":"Ren, S., Vander Schaar, M., et al. (2013). Efficient resource provisioning and rate selection for stream mining in a community cloud. IEEE Transactions on Multimedia, 5, 723\u2013734.","journal-title":"IEEE Transactions on Multimedia"},{"key":"4437_CR20","doi-asserted-by":"crossref","first-page":"1361","DOI":"10.12785\/amis\/080353","volume":"8","author":"L Yang","year":"2014","unstructured":"Yang, L., Cai, X., et al. (2014). A game-theoretic analysis to resolve the tussle in cloud storage services. An International Journal of Applied Mathematics and Information Sciences, 8, 1361\u20131367.","journal-title":"An International Journal of Applied Mathematics and Information Sciences"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4437-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4437-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4437-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T13:55:58Z","timestamp":1506347758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4437-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,24]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["4437"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4437-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,24]]}}}