{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:57Z","timestamp":1730227197449,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732154","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T15:57:45Z","timestamp":1478620665000},"page":"866-874","source":"Crossref","is-referenced-by-count":0,"title":["Split first encryption next model for cotenant covert channel protection"],"prefix":"10.1109","author":[{"given":"S. Rama","family":"Krishna","sequence":"first","affiliation":[]},{"given":"B. Padmaja","family":"Rani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Amazon Web Services","year":"0","key":"ref10"},{"key":"ref11","article-title":"Encryption policies for regulating access to outsourced data","volume":"35","author":"de capitani","year":"2010","journal-title":"ACM Trans Database Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2011.6076992"},{"year":"2009","key":"ref14","article-title":"Amazon web services (aws)"},{"journal-title":"Sun Microsystems Inc","article-title":"Building customer trust in cloud computing with transparent security","year":"2009","key":"ref15"},{"article-title":"Gmail disaster: Reports of mass email deletions","year":"2006","author":"arrington","key":"ref16"},{"article-title":"Payment Processor Breach May Be Largest Ever","year":"2009","author":"krebs","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref19","article-title":"Privacy-preserving audit and extraction of digital contents","author":"shah","year":"0","journal-title":"Cryptology EPrint Archive Report 2008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.19.5.2422"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046670"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130767"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.9.4.1005-1013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.21"},{"journal-title":"Dan AWS","article-title":"'Best Practices for Using Amazon S3","year":"2009","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2014.7030716"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968253"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1376-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EDCAV.2015.7060544"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732154.pdf?arnumber=7732154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T12:25:23Z","timestamp":1481113523000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732154","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}