{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:35:41Z","timestamp":1729654541244,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856692","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"176-181","source":"Crossref","is-referenced-by-count":3,"title":["Secure cloud distributed file system"],"prefix":"10.1109","author":[{"given":"Kheng Kok","family":"Mar","sequence":"first","affiliation":[]},{"given":"ZhengQing","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chee Yong","family":"Law","sequence":"additional","affiliation":[]},{"given":"Meifen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Timestamps in message-passing systems that preserve the partial ordering Australian National University Department of Computer Science","year":"1987","author":"fidge","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/1323293.1294281","article-title":"Dynamo: amazon's highly available key-value store","volume":"41","author":"decandia","year":"2007","journal-title":"ACM SIGOPS Operating Systems Review"},{"journal-title":"Microsoft","article-title":"Shared Access Signature","year":"2016","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/BFb0052348","article-title":"All-or-nothing encryption and the package transform","author":"rivest","year":"1997","journal-title":"Fast Software Encryption Third International Workshop"},{"key":"ref14","first-page":"90","article-title":"Compact proofs of retrievability","author":"shacham","year":"2008","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref16","article-title":"On the confidentiality of information dispersal algorithms and their erasure codes","author":"li","year":"2012","journal-title":"arXiv preprint arXiv 1206 4123"},{"key":"ref17","first-page":"14","article-title":"AONT-RS: blending security and performance in dispersed storage systems","author":"resch","year":"2011","journal-title":"Proceedings of the 9th USENIX Conference on File and Stroage Technologies"},{"journal-title":"Cleversafe","article-title":"The process behind Cleversafe's object storage platform","year":"0","key":"ref18"},{"key":"ref19","first-page":"136","article-title":"Secret sharing made short","author":"krawczyk","year":"1993","journal-title":"6th Annual International Cryptology Conference"},{"journal-title":"Reuters","article-title":"Exclusive: Secret contract tied NSA and security industry pioneer","year":"2013","key":"ref4"},{"journal-title":"Washington Post","article-title":"NSA seeks to build quantum computer that could crack most types of encryption","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"journal-title":"Barracuda","article-title":"A message from Rod Mathews, VP & GM, Storage Business, regarding the Copy\/CudaDrive EOL","year":"2016","key":"ref2"},{"journal-title":"Cloud Security Alliance","article-title":"The Treacherous 12_Cloud Computing Top Threats in 2016","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"International Workshop on Peer-to-Peer Systems"},{"key":"ref20","article-title":"POTSHARDS: secure long-term storage without encryption","author":"storer","year":"2008","journal-title":"2007 USENIX Annual Technical Conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925093"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856692.pdf?arnumber=7856692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:41Z","timestamp":1568836421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856692","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}