{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T18:41:21Z","timestamp":1652121681472},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T00:00:00Z","timestamp":1649808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s42979-022-01089-x","type":"journal-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T15:04:03Z","timestamp":1649862243000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deterministic Algorithm for Cloud Outsourced Data"],"prefix":"10.1007","volume":"3","author":[{"given":"Mohd","family":"Tajammul","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rafat","family":"Parveen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sumaira","family":"Asif","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"1089_CR1","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2016.05.017","volume":"72","author":"Z Deng","year":"2017","unstructured":"Deng Z, Li K, Li K, Zhou J. A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Gener Comput Syst. 2017;72:208\u201318.","journal-title":"Future Gener Comput Syst"},{"key":"1089_CR2","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei L, et al. Security and privacy for storage and computation in cloud computing. Inf Sci. 2014;258:371\u201386.","journal-title":"Inf Sci"},{"issue":"4","key":"1089_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, et al. A view of cloud computing. Commun ACM. 2010;53(4):50\u20138.","journal-title":"Commun ACM"},{"issue":"4","key":"1089_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/TNSM.2012.113012.120310","volume":"9","author":"Q Duan","year":"2012","unstructured":"Duan Q, Yan Y, Vasilakos AV. A survey on service-oriented network virtualization toward convergence of networking and cloud computing. IEEE Trans Netw Serv Manag. 2012;9(4):373\u201392.","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1089_CR5","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s41870-020-00441-9","volume":"12","author":"M Tajammul","year":"2020","unstructured":"Tajammul M, Parveen R. Auto encryption algorithm for uploading data on cloud storage. Int J Inf Technol. 2020;12:831\u20137. https:\/\/doi.org\/10.1007\/s41870-020-00441-9.","journal-title":"Int J Inf Technol"},{"issue":"5","key":"1089_CR6","first-page":"1452","volume":"8","author":"M Tajammul","year":"2019","unstructured":"Tajammul M, Parveen R. Key generation algorithm coupled with DES for securing cloud storage. Int J Eng Adv Technol. 2019;8(5):1452\u20138.","journal-title":"Int J Eng Adv Technol"},{"key":"1089_CR7","first-page":"973","volume":"2","author":"M Tajammul","year":"2019","unstructured":"Tajammul M, Parveen R. Algorithm for document integrity testing pre upload and post download from cloud storage. Int J Recent Technol Eng. 2019;2:973\u20139.","journal-title":"Int J Recent Technol Eng"},{"issue":"2","key":"1089_CR8","first-page":"4152","volume":"8","author":"M Tajammul","year":"2019","unstructured":"Tajammul M, Parveen R. Two pass multidimensional key generation and encryption algorithm for data storage security in cloud computing. Int J Recent Technol Eng. 2019;8(2):4152\u20138.","journal-title":"Int J Recent Technol Eng"},{"issue":"6","key":"1089_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi H, Joshi J, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010;8(6):24\u201331.","journal-title":"IEEE Secur Priv"},{"issue":"2","key":"1089_CR10","first-page":"5","volume":"5","author":"M Tajammul","year":"2018","unstructured":"Tajammul M, Parveen R. Comparative study of big ten information security management system standards. Int J Eng Res Comput Sci Eng. 2018;5(2):5\u201314.","journal-title":"Int J Eng Res Comput Sci Eng"},{"key":"1089_CR11","doi-asserted-by":"publisher","unstructured":"Tajammul M, Parveen R (2017) Comparative analysis of big ten ISMS standards and their effect on cloud computing. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 362\u2013367. https:\/\/doi.org\/10.1109\/IC3TSN.2017.8284506.","DOI":"10.1109\/IC3TSN.2017.8284506"},{"issue":"3","key":"1089_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.11.002","volume":"34","author":"H Rasheed","year":"2014","unstructured":"Rasheed H. Data and infrastructure security auditing in cloud computing environments. Int J Inf Manag. 2014;34(3): 364368. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2013.11.002.","journal-title":"Int J Inf Manag"},{"key":"1089_CR13","unstructured":"https:\/\/www.stackscale.com\/blog\/cloud-service-models\/."},{"key":"1089_CR14","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS\u201907), Alexandria, Virginia, USA, October 28\u201331, 2007.","DOI":"10.1145\/1315245.1315318"},{"key":"1089_CR15","doi-asserted-by":"crossref","unstructured":"Ateniese G, Di Pietro R, Mancini L, Tsudik G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22\u201326, 2008.","DOI":"10.1145\/1460877.1460889"},{"key":"1089_CR16","doi-asserted-by":"crossref","unstructured":"Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: 14th European Symposium on Research in Computer Security (ESORICS\u201909), Saint Malo, France, September 21\u201323, 2009.","DOI":"10.1007\/978-3-642-04444-1_22"},{"key":"1089_CR17","doi-asserted-by":"publisher","unstructured":"Golle P, Mironov I (2001) Uncheatable Distributed Computations. In: Naccache D (eds) Topics in Cryptology \u2014 CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-45353-9_31.","DOI":"10.1007\/3-540-45353-9_31"},{"key":"1089_CR18","unstructured":"Monrose F, Wyckoff P, Rubin AD (1999) Distributed Execution with Remote Audit. In Ndss vol. 99, pp 3\u20135."},{"key":"1089_CR19","doi-asserted-by":"crossref","unstructured":"Wei L, Zhu H, Cao Z, Jia W, Vasilakos A. Seccloud: bridging secure storage and computation in cloud. In: 30th International Conference on Distributed Computing Systems Workshops (IEEE ICDCSW 2010), Genova, Italy, June 21\u201325, 2010.","DOI":"10.1109\/ICDCSW.2010.36"},{"issue":"4","key":"1089_CR20","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s10207-010-0110-5","volume":"9","author":"T Yuen","year":"2010","unstructured":"Yuen TH, Susilo W, Mu Y (2010) How to construct identity-based signatures without the key escrow problem. Int J Inf Sec 9(4):297\u2013311.","journal-title":"Int J Inf Secur"},{"key":"1089_CR21","unstructured":"Canetti R, Riva B, Rothblum G (2011) Verifiable computation with two or more clouds. In: Workshop on Cryptography and Security in Clouds."},{"key":"1089_CR22","doi-asserted-by":"crossref","unstructured":"Sadeghi A, Schneider T, Winandy M (2010) Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency. In: Trust and Trustworthy Computing, Berlin, Germany 21\u201323.","DOI":"10.1007\/978-3-642-13869-0_30"},{"key":"1089_CR23","doi-asserted-by":"publisher","unstructured":"Tajammul M, Parveen R (2020) To Carve out Private Cloud with Total Functionality. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp 831\u2013835. https:\/\/doi.org\/10.1109\/ICACCCN51052.2020.9362826.","DOI":"10.1109\/ICACCCN51052.2020.9362826"},{"key":"1089_CR24","unstructured":"https:\/\/blog.syncsort.com\/2018\/08\/data-security\/aes-vs-des-encryption-standard-3des-tdea\/ DES Encryption withdrawn in 2005."},{"key":"1089_CR25","unstructured":"Chuang I, Li S, Huang K, Kuo Y (2011) An effective privacy protection scheme for cloud computing. In: 13th International Conference on Advanced Communication Technology (ICACT2011), pp 260\u2013265."},{"key":"1089_CR26","doi-asserted-by":"publisher","unstructured":"Azougaghe A, Kartit Z, Hedabou M, Belkasmi M, El Marraki M (2015) An efficient algorithm for data security in Cloud storage. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp 421\u2013427. https:\/\/doi.org\/10.1109\/ISDA.2015.7489267.","DOI":"10.1109\/ISDA.2015.7489267"},{"key":"1089_CR27","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ins.2016.09.005","volume":"387","author":"Y Li","year":"2017","unstructured":"Li Y, Gai K, Qiu L, Qiu M, Zhao H. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci (NY). 2017;387:103\u201315.","journal-title":"Inf Sci (NY)"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01089-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01089-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01089-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T18:01:19Z","timestamp":1652119279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01089-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,13]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["1089"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01089-x","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"value":"2662-995X","type":"print"},{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,13]]},"assertion":[{"value":"17 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all the authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"223"}}