{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:47:30Z","timestamp":1765486050553,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/dictap.2016.7544002","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T16:31:11Z","timestamp":1471537871000},"page":"63-69","source":"Crossref","is-referenced-by-count":9,"title":["A multi-cloud approach for secure data storage on smart device"],"prefix":"10.1109","author":[{"given":"Hassan Saad","family":"Alqahtani","sequence":"first","affiliation":[]},{"given":"Paul","family":"Sant","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"229","article-title":"To zip or not to zip: Effective resource usage for real-time compression","author":"harnik","year":"0"},{"key":"ref38","first-page":"1","article-title":"A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps","volume":"11","author":"ismail","year":"2010","journal-title":"IJ Network Security"},{"journal-title":"Google","year":"0","key":"ref33"},{"journal-title":"DropBox","year":"0","key":"ref32"},{"journal-title":"Box","year":"0","key":"ref31"},{"journal-title":"Amazon Cloud","year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5120\/616-867"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"journal-title":"OneDrive","year":"0","key":"ref35"},{"journal-title":"ICloud","year":"0","key":"ref34"},{"key":"ref10","article-title":"Nist cloud computing standards roadmap","volume":"35","author":"hogan","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583636"},{"key":"ref12","first-page":"1","article-title":"Mobile cloud computing","author":"cox","year":"2011","journal-title":"IBM developerWorks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014374"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.66"},{"journal-title":"Privacy and Security for Cloud Computing","year":"2012","author":"pearson","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.43"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2012.6366028"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24755-2_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6524-0_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2168"},{"journal-title":"Cloud Computing Automating the Virtualized Data Center","year":"2011","key":"ref3"},{"key":"ref6","first-page":"10","article-title":"Guidelines on security and privacy in public cloud computing","volume":"800","author":"jansen","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2010.35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.03.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.153"},{"key":"ref7","first-page":"536","article-title":"Survey on mobile computing security","year":"2013","journal-title":"Modelling Symposium (EMS) 2013 European"},{"journal-title":"Mobile Cloud Market by Application (Gaming Entertainment Utilities Education Productivity Business & Finance Social Networking Healthcare Travel & Navigation) & By User (Enterprise User Consumer) &#x2013; Worldwide Market Forecast and Analysis (2014&#x2013;2019)","year":"2014","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NCCA.2011.27"},{"journal-title":"The NIST Definition of Cloud Computing","year":"2011","author":"mell","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2013.161"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.47"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583635"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2012.6222759"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.7.1033-1040"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2010.20"}],"event":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","start":{"date-parts":[[2016,7,21]]},"location":"Konya, Turkey","end":{"date-parts":[[2016,7,23]]}},"container-title":["2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7533411\/7543990\/07544002.pdf?arnumber=7544002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T13:56:46Z","timestamp":1475157406000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7544002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/dictap.2016.7544002","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}