{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T16:01:42Z","timestamp":1772899302929,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225481","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T16:00:38Z","timestamp":1602777638000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Retracted: Privacy-Cheating Discouragement: A New Homomorphic Encryption Scheme for Cloud Data Security"],"prefix":"10.1109","author":[{"given":"V.","family":"Swathi","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology,Vellore,India"}]},{"given":"M.P.","family":"Vani","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology,Vellore,India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2015.39"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.05.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2525991"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.017"},{"key":"ref4","first-page":"29","article-title":"A survey of cloud computing data integrity schemes","volume":"65","author":"faheem","year":"2017","journal-title":"Design challenges taxonomy and future trends computers & security"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","article-title":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","volume":"84","author":"muhammad baqer","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.005"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.icte.2016.08.006","article-title":"Efficient and privacy-preserving biometric identification in cloud","volume":"2","author":"changhee","year":"2016","journal-title":"ICT Express"},{"key":"ref8","first-page":"273","article-title":"Privacy-aware adaptive data encryption strategy of big data in cloud computing, in Cyber Security and Cloud Computing(CSCloud)","author":"gai","year":"0","journal-title":"2016 IEEE In Proceedings of the 3rd International Conference on"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.procs.2016.03.023","article-title":"Homomorphic Encryption for Security of Cloud Data, 7th International Conference on Communication, Computing and Virtualization 2016","volume":"79","author":"potey","year":"0","journal-title":"Procedia Computer Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417542"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0588-0"},{"key":"ref20","first-page":"91","article-title":"An Efficient Fully Homomorphic Encryption Scheme","volume":"21","author":"ahmed","year":"2019","journal-title":"International Journal of Network Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102513"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1016\/j.future.2017.07.011","article-title":"SHAMC: A Secure and highly available database system in multi-cloud environment","volume":"105","author":"liangmin","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990903"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","location":"Kharagpur, India","start":{"date-parts":[[2020,7,1]]},"end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225481.pdf?arnumber=9225481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:59:21Z","timestamp":1772830761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225481","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}