{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T12:51:00Z","timestamp":1745499060049,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/iccworkshops50388.2021.9473876","type":"proceedings-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T16:08:20Z","timestamp":1625846900000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Performance Analysis of Cloud Computing for Distributed Data Center using Cloud-Sim"],"prefix":"10.1109","author":[{"given":"Sheher Bano","family":"Syed","sequence":"first","affiliation":[]},{"given":"Aqsa","family":"Rasul","sequence":"additional","affiliation":[]},{"given":"Talha","family":"Javed","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Rizwan","sequence":"additional","affiliation":[]},{"given":"Amoldeep","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Kapal","family":"Dev","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Magarini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107381"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/1548512919895327"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10020185"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea11010007"},{"key":"ref14","article-title":"Securing the public cloud: Host-obscure computing with secure enclaves","author":"cain","year":"2021","journal-title":"Ph D Dissertation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2071-6_3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027637"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3311790.3396624"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3386723.3387826"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989456"},{"key":"ref4","first-page":"171","article-title":"Analysis of security algorithms in cloud computing","volume":"3","author":"kaur","year":"2014","journal-title":"International Journal of Application or Innovation in Engineering & Management (IJAIEM)"},{"key":"ref3","first-page":"434","article-title":"Advanced system to protect and shared cloud storage data using multilayer steganography and cryptography","volume":"5","author":"ranjan","year":"2016","journal-title":"International Journal of Engine Research"},{"key":"ref6","first-page":"51","article-title":"Dvr control by optimized fuzzy system with genetic algorithm","volume":"9","author":"oghlan","year":"0","journal-title":"Majlesi Journal of Mechatronic Systems"},{"key":"ref5","first-page":"27","article-title":"Enhancement of cloud computing security with secure data storage using aes","volume":"6","author":"gul","year":"2017","journal-title":"International Journal of Computer Science and Mobile Computing IJCSMC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2982026"},{"key":"ref7","article-title":"Cryptography based security for cloud computing system","volume":"8","author":"agarwal","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref2","first-page":"1992","article-title":"Data security protection in cloud computing by using encryption","volume":"12","author":"mahmood","year":"2017","journal-title":"Kirkuk University Journal\/Scientific Studies (KUJSS)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60188-1_4"},{"key":"ref1","first-page":"2623","article-title":"Enhancing data security and storage in cloud computing environment","volume":"6","author":"munjal","year":"2015","journal-title":"IJCSIT"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/0013161X20926548"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HORA49412.2020.9152862"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5352108"},{"article-title":"Security hazards, attacks and its prevention techniques in cloud computing: A detail review","year":"2020","author":"patel","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICITR51448.2020.9310816"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2020.104622"},{"article-title":"Efficiency analysis of wireless networks","year":"2020","author":"oliinyk","key":"ref25"}],"event":{"name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["2021 IEEE International Conference on Communications Workshops (ICC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9473476\/9473480\/09473876.pdf?arnumber=9473876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:43:05Z","timestamp":1652182985000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9473876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iccworkshops50388.2021.9473876","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}