{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:53:20Z","timestamp":1771959200764,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/fgct.2016.7605062","type":"proceedings-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T20:22:52Z","timestamp":1477340572000},"page":"55-59","source":"Crossref","is-referenced-by-count":76,"title":["Data security in cloud computing"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Albugmi","sequence":"first","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]},{"given":"Madini O.","family":"Alassafi","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]},{"given":"Robert","family":"Walters","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]},{"given":"Gary","family":"Wills","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"key":"ref11","article-title":"Securing the Cloud","author":"winkler","year":"2011","journal-title":"Cloud Computer Security Techniques and Tactics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014716"},{"key":"ref13","first-page":"1","article-title":"The Notorious Nine. Cloud Computing Top Threats in 2013","year":"2013","journal-title":"Cloud Security Alliance"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427574"},{"key":"ref16","first-page":"299","author":"mather","year":"2009","journal-title":"Cloud Security and Privacy"},{"key":"ref17","first-page":"1","author":"yahya","year":"2014","journal-title":"Security Challenges in Cloud Storage"},{"key":"ref18","first-page":"13","article-title":"Home is safer than the cloud!: privacy concerns for consumer cloud storage","author":"lon","year":"2011","journal-title":"Proceedings of the Seventh Symposium on Usable Privacy and Security"},{"key":"ref19","first-page":"92","article-title":"Click Here to Cloud: End User Issues in Cloud Computing Terms of Service Agreements","author":"lipinski","year":"2013","journal-title":"International Symposium on Information Management in a Changing World"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2441113"},{"key":"ref4","author":"alharthi","year":"2015","journal-title":"An Overview of Cloud Services Adoption Challenges in Higher Education Institutions"},{"key":"ref27","first-page":"7","article-title":"Cryptanalysis and improvement of a block cipher based on multiple chaotic systems","volume":"2010","author":"qian","year":"2010","journal-title":"Math Probl Eng"},{"key":"ref3","article-title":"Identifying Cloud Computing Security Risks","volume":"1277","author":"wooley","year":"2011","journal-title":"Continuing Education"},{"key":"ref6","first-page":"562","article-title":"Security-Preserving Live Migration of Virtual Machines in the Cloud","author":"zhang","year":"2012","journal-title":"J Netw Syst Manag"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"J Netw Comput Appl"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.78"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.85"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2498\/cit.1001391"},{"key":"ref9","first-page":"12","article-title":"Enhanced data security model for cloud computing","author":"mohamed","year":"2012","journal-title":"Informatics Syst (INFOS) 2012 8th Int Conf"},{"key":"ref1","first-page":"3","article-title":"Cloud Computing Basics","volume":"1","author":"srinivas","year":"2011","journal-title":"Build Infrastruct Cloud Secur"},{"key":"ref20","author":"ransome","year":"2009","journal-title":"Books 24&#x00D7;7 I"},{"key":"ref22","author":"wang","year":"2011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0560-2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"ref23","article-title":"Security Issues on Cloud Computing","author":"shah","year":"2013","journal-title":"arXiv preprint arXiv 1308 5996"},{"key":"ref26","first-page":"583","article-title":"Cloud computing risk assessment","author":"catteddu","year":"2009","journal-title":"European Network and Information Security Agency (ENISA)"},{"key":"ref25","article-title":"Books 24&#x00D7;7, I","author":"winkler","year":"2011","journal-title":"Securing the Cloud Cloud Computer Security Techniques and Tactics"}],"event":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","location":"London, UK","start":{"date-parts":[[2016,8,17]]},"end":{"date-parts":[[2016,8,19]]}},"container-title":["2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7602797\/7605061\/07605062.pdf?arnumber=7605062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:46:11Z","timestamp":1709923571000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7605062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/fgct.2016.7605062","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}